SpecterOps Selected for OpenAI’s Trusted Access for Cyber Program
Key Takeaways
- SpecterOps has been named to OpenAI’s inaugural Trusted Access for Cyber (TAC) cohort (alongside Nvidia, CrowdStrike, JPMorgan Chase, and Bank of America and others) giving verified defenders governed access to advanced AI models for legitimate security use cases.
- Frontier AI is compressing the window between vulnerability discovery and exploitation. As adversaries use AI to move faster, detection alone is no longer sufficient. The more important question is what attackers can reach once they’re in, and whether those paths have already been closed.
- TAC enables SpecterOps to advance Identity Attack Path Management at machine speed, modeling how frontier AI reasons about chained permissions, lateral movement, and privilege escalation across AD, Entra, Okta, GitHub, and macOS environments.
The News
On April 16, OpenAI announced its Trusted Access for Cyber (TAC) program, naming SpecterOps among the inaugural cohort alongside organizations including Nvidia, CrowdStrike, JPMorgan Chase, and Bank of America. TAC gives verified defenders governed access to advanced cyber-capable models for legitimate security use cases, with access scaled through identity verification and tiered controls.
SpecterOps was selected because of our adversary tradecraft work: years of frontline experience with red teams and defenders at some of the largest enterprises and government agencies in the world, including OpenAI itself. We were also selected because of our pioneering approach to attack path management with BloodHound, which helps defenders eliminate the pathways to critical assets. The value we bring to this program goes beyond vulnerability discovery, with a focused understanding of what happens after a foothold is established, and the pathways attackers use to move laterally, escalate privilege, and reach critical assets. That distinction is why TAC matters to us.
Learn more about the OpenAI Trusted Access for Cyber program
Frontier models change the calculus for defenders
For years, defenders have relied on the friction built into the offensive cycle. Finding an exploitable vulnerability takes time. Weaponizing it takes more. Moving from initial access to a high-value target requires navigating an environment that defenders understand better than the attacker does, at least at first.
Frontier AI models like GPT-5.4-Codex promise to vastly accelerate the process of uncovering and patching vulnerabilities. At the same time, adversaries continue to get more effective at leveraging AI to exploit vulnerabilities, move laterally, accelerate privileges, and inflict damage.
As the window between vulnerability and exploitation window gets smaller, detection alone is not enough. The more important question becomes: once an attacker gets in, what can they reach? And how do you foreclose those paths before the question becomes urgent?
SpecterOps thinks like the adversary
SpecterOps models enterprise environments the way attackers do. We don’t look at intended access. We show you where the rules bend and break.
The attack paths we identify are not theoretical and rarely hinge on a single critical failure. A compromised developer account inherits GitHub permissions that expose CI secrets. A helpdesk role grants token access into Okta. Jamf, a device management platform, provides code execution on endpoints tied to privileged sessions. Individually, each permission may look reasonable but chained together they form a path to critical assets.
What makes this problem difficult isn’t visibility into any one system – it’s understanding how permissions, identities, and trust relationships compound across platforms. That emergent risk is what adversaries exploit and what Identity Attack Path Management is designed to eliminate.
OpenAI’s Trusted Access for Cyber program helps us research, understand, and model these relationships with speed and scale that enhances solutions like BloodHound to better manage them.
BloodHound Enterprise now maps those cross-platform paths directly, with support for AD, Entra, Okta, GitHub, and macOS environments. With OpenGraph for BloodHound Enterprise, we continue to expand the identity platforms we map. The goal is to model not just what access was intended, but what control those permissions collectively afford when an adversary chains them together. TAC accelerates our ability to understand how frontier AI reasons about those same relationships, what paths it would identify or exploit, and what logic defenders need to close them.
The question that matters
As machine identities multiply and trust relationships compound across increasingly complex enterprise environments, it gets harder to answer the question of what happens when access is abused. That question also becomes much more consequential.
TAC allows us to work at the same scale and speed as the threats we model. This is how defenders must operate going forward and why SpecterOps is shaping that future.