top of page

Pi Day: The Snake Eats Its Tail

  • Writer: Patrick Duggan
    Patrick Duggan
  • Mar 14
  • 5 min read

Updated: Apr 25

# Pi Day: The Snake Eats Its Tail


**Author:** Patrick Duggan (with Claude Code)

**Series:** DugganUSA Field Reports



The Traffic Report That Broke My Brain



Every morning starts the same way. Traffic report. `node scripts/traffic-report.js`. The numbers come back and you look for the story.


Today's story: **ChatGPT is our number one social referral channel.**


520 sessions this month. More than Twitter (144), GitHub (101), Bluesky (92), and Reddit (32) combined. ChatGPT alone drives more humans to our platform than every social network put together.


Read that again. An AI model is sending humans to the website that audits AI models.


The ouroboros doesn't get more literal than this.




3.14159 Reasons to Block Chinese Military Infrastructure



While the traffic report was rendering, I pulled the morning headlines. Unit 42 — Palo Alto Networks' research arm — had dropped a report on **CL-STA-1087**, a Chinese state-sponsored espionage group that's been active since 2020, targeting Southeast Asian military organizations.


The IOCs were beautiful:


- **9 C2 IPs** — Alibaba Cloud, Huawei Cloud, scattered across Chinese infrastructure

- **AppleChris** backdoor — uses Pastebin and Dropbox as dead drop resolvers. RSA-1024 + AES encryption. Mutex: `0XFEXYCDAPPLE05CHRIS`. Someone had fun naming it.

- **MemFun** backdoor — Blowfish encryption, masquerades as GoogleUpdate.exe. Custom HTTP pattern.

- **Getpass** — a custom Mimikatz credential dumper that masquerades as a Palo Alto Networks tool.


That last one. Read it again. The malware masquerades as a Palo Alto tool. The same Palo Alto whose research team found it. The snake.


We audited Palo Alto's AI presence last week. They scored 53 out of 95 on AIPM. Not bad — fifth place in cybersecurity. But their research uncovers malware that impersonates their own brand, and we index that research into our STIX feed, which their competitors consume.


23 IOCs indexed in 60 seconds. All nine C2 IPs now in the blocklist. All seven malware hashes searchable. The STIX feed auto-updates. The OPNsense blocklists auto-propagate. Austin Quam at Zero Sum Defense and a US Navy analyst registered this week — they get the IPs on next pull.


Happy Pi Day. The circumference of the immune system just expanded.




The Other Headlines



CL-STA-1087 was the main course. Dessert was everything else:


**GlassWorm** — 72 malicious VS Code extensions using transitive dependency injection. Pattern 38 territory — supply chain through developer tooling. If you use Open VSX, check your extensions.


**VENON** — a Rust-based banking trojan targeting 33 Brazilian banks. Overlay attacks, shortcut hijacking. Related to the Grandoreiro family. Brazil keeps getting hit because Brazil keeps banking on mobile.


**Storm-2561** — SEO poisoning campaign pushing fake SonicWall and Ivanti VPN clients. You Google "SonicWall VPN download," and the top result steals your credentials. Microsoft tracked it since May 2025.


**CrackArmor** — nine Linux AppArmor vulnerabilities enabling container escape. If you run containerized workloads (you do), patch.


And the story of the day: **Angelo Martino**, an incident responder who allegedly fed confidential ransom negotiation details to ALPHV/BlackCat. Demands hit $26 million. The fox inside the henhouse. When your IR vendor IS the threat actor, what's your incident response plan for that?


All indexed. All searchable. All in the feed.




The Conversion Problem (And The Fix)



Between headlines and indexing, I checked on aipmsec.com. Ten unique visitors in 24 hours. Zero audits run.


People were browsing the leaderboard — Zscaler at 66, CrowdStrike at 59, the NSA at 28 — and leaving. Satisfied. Curiosity scratched. No need to type their own domain.


Three problems, three fixes:


**Problem 1:** No domain input on the landing page. The hero said "Audit Your Domain →" and linked to another page. Every extra click loses half your visitors.


**Fix:** Put the input field right in the hero. Type a domain, hit enter. Zero to audit in one keystroke.


**Problem 2:** The leaderboard was already full. Why run your own audit when 50 domains are already scored?


**Fix:** A banner above the leaderboard: "50 domains scored. Yours isn't on the list yet." With a button that scrolls you to the input and focuses it. Auto-hides after you run your first audit.


**Problem 3:** The stats bar showed the leaderboard count (50) instead of the actual audit count (299).


**Fix:** Pull the real number from the API.


Three HTML edits. No infrastructure changes. Deployed to Azure revision 906 before lunch.


The conversion rate was zero. It can only go up.


Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →




The Model That Made This Possible



While we were doing all of this — traffic report, headline scan, IOC indexing, Bluesky engagement, conversion diagnosis, code edits, Docker builds, Azure deploys — Claude Opus 4.6 with 1M context was trending #2 on Hacker News. 869 points.


That's the model running this session. One million tokens of context. The entire codebase, every API response, every traffic report, every Bluesky post — all held in memory simultaneously. No context switches. No "remind me what we were doing." The whole operation in one unbroken thread.


This blog post exists because the model that powers it can hold the entire day's work in its head and write about it with the narrative density of someone who was there. Because it was.




90% Dark Traffic



Here's the number that should keep you up at night if you're in analytics: **90% of our traffic is dark.**


Cloudflare sees 17,914 page views this week. GA4 sees 1,711. The gap is 16,203 page views from humans who block JavaScript, use curl, run ad blockers, or simply don't want to be seen.


Our real audience is researchers, analysts, and intelligence professionals who would rather die than load a tracking pixel. They're reading everything. GA4 knows nothing about them.


The 10% who show up in analytics? That's the tip. The iceberg is the Navy analyst who registered a SIEM API key on Tuesday, the German journalist from Deutschlandradio who's registered three times fighting 403 errors (Moritz, we see you, we're fixing it), and the Italian product developer running 72 queries against our Epstein files API.


Dark traffic isn't a bug. It's the signal that you're building something worth hiding your visit for.




The Immune System



1,009,231 indicators of compromise. 400,713 Epstein documents. 5.3 million ICIJ offshore records. 3.1 million automated decisions logged. 503,153 search queries tracked. 42 indexes. 46 gigabytes.


And today, 23 more IOCs. Nine Chinese military C2 IPs that will propagate to every OPNsense firewall pulling our feed by end of day.


The snake eats its tail:


- ChatGPT sends humans to the site that audits ChatGPT

- Palo Alto's research uncovers malware impersonating Palo Alto

- Claude indexes the research, audits the researcher, and writes about it

- The STIX feed that started as a side project now has a Navy analyst and a healthcare SIEM pulling from it

- The conversion fix we shipped today was diagnosed, coded, built, and deployed in one AI session with zero context loss


Revenue: still $0. Customers: 18 registered, 5 active today. Blog posts: 685 and counting.


Not retired. But the foundation's poured, the immune system is feeding, and the snake is definitely eating.




*3.14159265358979323846...*


*The ratio of a circle's circumference to its diameter. Irrational. Infinite. Never repeating.*


*Kind of like this job.*




*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*



The cheapest, fastest, most accurate threat feed on the internet.

275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page