About:

With nearly a decade immersed in the cybersecurity and bug bounty ecosystem, the author has worked as a bug hunter, vulnerability researcher, and security professional.

Website:

Specializations:

Subscribe to RSS:
Better-Hub's security flaws expose users to XSS attacks, unauthorized access to private data, and OAuth token leaks, posing significant risks to developers.
Harden-Runner's egress filtering can be bypassed via DNS over TCP and DNS over HTTPS, exposing vulnerabilities in its security measures.
A critical design flaw in BullFrog's egress filtering allows attackers to bypass security measures by exploiting shared infrastructure, posing significant risks in CI workflows.
BullFrog's enable-sudo feature fails to prevent Docker access, allowing privilege escalation despite intended security measures.
BullFrog's vulnerability to DNS over TCP allows attackers to exfiltrate data by exploiting its failure to inspect all DNS messages in a single TCP packet.
The post outlines CVE-2026-25598, demonstrating how attackers can bypass outbound connection detection in GitHub Actions using specific UDP techniques.
Two critical vulnerabilities in Hono's JWT/JWKS verification can lead to authentication bypass, necessitating explicit algorithm settings in the latest patch.
A critical vulnerability in ElysiaJS's cookie signing logic allows unauthorized access, which is demonstrated through a proof of concept and subsequently fixed in a newer version.
AI-powered SAST tools like ZeroPath can significantly enhance vulnerability detection in complex applications, but they are not a replacement for human security engineers.
The article discusses the critical role of the Domain Name System (DNS) in the internet's infrastructure and highlights potential vulnerabilities, particularly focusing on a case of DNS hijacking that affected over 1.6 million dom...
This research investigates the security risks associated with DNS configuration errors, particularly focusing on the common typo of substituting .net with .ne in nameserver (NS) records. The study, inspired by a real incident invo...
The blog post provides an in-depth exploration of Attack Surface Management (ASM), detailing the various components that constitute an organization's attack surface, including forgotten subdomains, cloud services, APIs, and third-...
A methodology for leveraging LLMs to effectively identify security vulnerabilities in codebases through minimal scaffolding and targeted exploration is presented, supported by case studies.
Complexity is an illusion shaped by our descriptions, and mastering the right vocabulary and abstractions can simplify understanding of complex topics.
The blog post discusses the inadequacies of current AI security testing methodologies, emphasizing that traditional pentesting approaches are insufficient for AI systems due to their unique attack surfaces and vulnerabilities. It ...
The article discusses the impact of AI-generated vulnerability reports on the open-source software (OSS) security landscape. The author, with a decade of experience in the bug bounty industry, highlights the rise of 'AI slop'—inva...
The post emphasizes that becoming a proficient security researcher requires more than just reading or completing easy labs. It argues that while reading provides surface-level understanding, true comprehension comes from hands-on ...
The blog post discusses the Trojan War's historical context and draws a parallel to modern AI challenges, particularly focusing on the limitations of large language models (LLMs) in detecting vulnerabilities in code. It describes ...
Individual actions may seem small, but they are vital for maintaining civilization and can lead to significant change over time.
The post discusses the importance of applying knowledge in real-life scenarios, particularly in the field of security research and architecture. It emphasizes the need to move beyond basic memorization and encourages readers to en...
Four critical vulnerabilities in Parse Server expose security flaws related to the readOnlyMasterKey, allowing unauthorized access and data manipulation, which have since been patched.
The author reflects on their five-year journey at HackerOne, highlighting the importance of teamwork, effective leadership, and continuous learning. They emphasize that personal growth is influenced by supportive colleagues and a ...
The post discusses effective learning strategies, emphasizing that learning is a finite resource that can be depleted. It highlights the importance of aligning study times with peak mental energy, using short focused bursts of stu...