Available for fractional engagements

Security review for teams shipping AI agents and MCP servers

I take on a small number of fractional retainers and focused reviews each quarter — for engineering teams building MCP servers, deploying LLM agents with real tool access, or designing auth and permission boundaries for AI features.

What you're hiring

I lead a team at Dropbox focused on AI agent security and the developer tooling that makes secure defaults the easy path. Outside that role, I've spent the last few years inside the MCP and agent security problem from a few different angles — research, vulnerability disclosure, framework design, and shipping production code.

The short version: you're hiring someone who has audited MCP servers, found and disclosed real bugs, written code that other teams now depend on, and thinks about prompt injection as a control-flow problem rather than a content-filtering one.

Engagement options

Most engagements start with a free 30-minute scoping call. From there we land on one of these shapes — usually the retainer for teams shipping multiple AI features, and a one-off review for teams getting ready to launch a single system.

How an engagement runs

Same shape for both retainers and one-off reviews — the difference is mostly duration and how many cycles we do.

01

Scope call

30 minutes, free, no obligation. You walk me through what you're building, what you're worried about, and what an outside reviewer would need to be useful. I tell you whether this is a fit and roughly what shape the engagement would take.

02

Materials review

Code, design docs, threat-model sketches, prior security work — whatever you'd hand to a security reviewer at a larger company. I work asynchronously through it before we talk synchronously, so the working sessions are spent on judgment calls rather than orientation.

03

Working sessions

Synchronous time with whoever owns the system. We test assumptions, walk through adversarial scenarios, and pull on threads that look promising. This is where most of the value lands — the report just makes it durable.

04

Written findings

Prioritized recommendations anchored to specific files, components, or workflows, with rationale. Severity, exploitability, and recommended fix for each. Re-readable by people who weren't in the room.

Is this a fit?

Good fit

  • Building an MCP server, custom or productized, and want it audited before launch.
  • Shipping LLM-driven agents with real tool access — file I/O, code execution, third-party APIs, customer data.
  • Designing auth or permission boundaries for AI features (OAuth flows, capability tokens, scoped credentials, just-in-time access).
  • Threat-modeling tool-use patterns, multi-agent workflows, or RAG/retrieval pipelines before they reach production.
  • Adopting a vendor security tool (Lakera, prompt firewalls, etc.) and want a sober read on what it actually covers.

Probably not a fit

  • Pure ML model security — adversarial perturbations, model extraction, training-data poisoning. Different specialty.
  • Active incident response or breach investigation. Call a DFIR firm; I'll come in after the fire is out.
  • Compliance certifications (SOC 2, HIPAA, ISO 27001). I can help with security controls, not the audit itself.
  • Penetration tests against production infrastructure unrelated to AI. There are better firms for that, and I'd refer you.

Have a system in mind?

Send a short note — what you're building, what you're worried about, rough timeline. I'll reply within a couple of days with whether it sounds like a fit and what the next step would be.

Based in the US. Comfortable working with teams in Pacific through Central European time zones. Engagements paid by invoice (Stripe or ACH); SoW available on request.