Pillar has assembled the world's brightest minds from military intelligence and enterprise security to dismantle emerging threats in the new AI landscape. Our team’s expertise fuses deep offensive roots in traditional security (AppSec, Cloud, OS, Malware) with Frontier AI disciplines (Data Science, AI, Machine Learning). This hybrid DNA allows us to deconstruct complex attacks that cross the boundary between code, infrastructure, and autonomous systems.
Adversarial AI Research
Dissects Foundation Models and agents to identify zero-day vulnerabilities, novel jailbreaks, and prompt injection techniques.
Threat Intelligence
Monitors the wild for emerging trends in how attackers are weaponizing AI, delivering proactive insights rather than reactive alerts.
Red Teaming Operations
Simulates sophisticated attacks on AI pipelines to validate defenses and expose logic gaps that standard tools miss.
Architecting Enterprise Defense
Translates research into product capabilities, building next-gen features like the Safe MCP Registry and integrated Threat Intel feeds to secure the future of AI work.
Open Source & Supply Chain Security
Actively hunts for vulnerabilities in the open-source AI ecosystem—from coding agents to model hubs—to harden the community tools that enterprises rely on.
Our research team have identified & reported security vulnerabilities in the most popular coding agents, IDEs, model hubs and agentic workflow platforms.
What we discovered
Pillar Security researchers uncovered critical vulnerabilities in n8n, a popular open-source workflow automation platform powering numerous enterprise deployments. The vulnerabilities allowed any authenticated user to seize complete control of the server, stealing every stored credential, API key, and secret on both self hosted and cloud instances.

%20(1).webp)
n8n occupies a unique position in the automation landscape. Unlike purely no-code platforms, it embraces JavaScript expressions directly in its workflow nodes. These days, that flexibility is exactly why it's become the backbone of AI agent orchestration components for various AI-powered automation workflows.

Meet the Pillar Research Team
Schedule a deep dive with the Pillar research team to learn about our latest research and findings. Get direct access to our experts and hear about the most novel attacks we are seeing in the wild

.webp)
%20(1).webp)
.webp)

.webp)
%20(1).webp)