๐๐๐๐๐ ใใชใใคใผใ
๐๐๐๐๐
191 posts

๐๐๐๐๐
@encrypted
๐ฒ๐ฝ
ๅๅ ๆฅ Aralฤฑk 2018
139 ใใฉใญใผไธญ3.8K ใใฉใญใฏใผ

@yvtweets i have trust issues and need to see the code changes in real time
English

@tylermoz Yo can you check on order ec7cecd4-c20e-4bc5-972f-d13f0fe4233f for me ๐
English

I guess I'm a coin trader now?

ty@tylermoz
Casual first few days of dogfooding buying Pokemon on Terminal
English
๐๐๐๐๐ ใใชใใคใผใ

@infosec_au @SLCyberSec @hash_kitten @assetnote Back in may I emailed their responsible disclosure email with a firewall bypass I found and I got a response a day later asking me to onboard to HackerOne so I can submit it but the bypass had been patched ๐คฃ
English

@SLCyberSec @hash_kitten @assetnote This has been silently patched now ๐ซ There's probably more WAF bypasses out there.
English

Vercel is questioning whether or not a WAF bypass is possible... Pushed an update that uses a payload from @SLCyberSec research team (specifically @hash_kitten). Payload has been running for @assetnote customers for last 18h. github.com/assetnote/reacโฆ use --vercel-waf-bypass flag

Guillermo Rauch@rauchg
@infosec_au @assetnote DMโd you. You have a working repro for bypassing Cloudflare but not Vercel. Would love to correct the record or see the evidence.
English

the other common entrepreneurial red pill is building sneaker bots
Troy Kirwin@tkexpress11
if I meet a founder ages 17-25 there is a 50% chance they cut their teeth running Minecraft servers at 10
English

I think remote browsers still doesn't solve this problem. A layer needs to be built to prevent the agents from doing unprompted tasks local or remote, a stolen session is still a stolen session even if its not all of them. Aside from that companies like Cloudflare are trying to build prompt injections / a labyrinth to mess with agents which will waste compute and time. If something isn't built many people will bankrupt themselves getting reversed ddosed by cloudflare
English

@guohao_li @browserbase the difference with local vs remote browsers is that with remote browsers you have to explicitly give it those cookies or access
English

tl;dr: letting a model control your local browser is dangerous. anyone can prompt injection and steal your cookies.
you need a remote browser thatโs isolated and intentionally given access. thatโs why weโre building @browserbase
Anthropic@AnthropicAI
Weโve developed Claude for Chrome, where Claude works directly in your browser and takes actions on your behalf. Weโre releasing it at first as a research preview to 1,000 users, so we can gather real-world insights on how itโs used.
English


Didnโt supreme do this? I remember seeing someone do a waterfall for the assets on the html page as part of the flow. Ever since I seen that I always added a handler for it and have ran into a few non sneaker sites that would set cookies on the first favicon request which was too obvious ๐
English

@sleepy__dev any sneaker site could have done this and it'd be so hard to tell ๐ญ
English

I was managing the queue for a big sneaker store in EU.
Wanted to share how I managed to block Cybersole from getting valid sessions.
I would simply check if the client ever requested the website favicon.ico file, no full request bot ever requests the favicon, also the session validity was never returned in any API endpoint, meaning they could never guessed if the session was valid.
Yes, this simple method worked, felt like sharing after a couple years because I still think to this day it is very funny.

English














