128 posts

゚ banner
゚

@osyyn

just your random internet fella on the internet

가입일 Haziran 2020
281 팔로잉11 팔로워
Discord Previews
Discord Previews@DiscordPreviews·
Discord is working on a new collectible item for their shop: Profile Frames Profile Frames appear around and above your profile card. On mobile, only the top part will be visible.
Discord Previews tweet media
English
129
605
13.2K
670K
゚
@osyyn·
@LocalBateman this is definitely a video that a twitter account can post
English
0
1
40
5.8K
゚
@osyyn·
@xyz3va yippee, this worked!
゚ tweet media゚ tweet media
English
0
0
0
319
゚
@osyyn·
@shitposts_mp4 we should beat these people up with kettles
゚ tweet media
English
0
0
14
442
゚
@osyyn·
@PolytoriaGame i am coffin, this would be cool to get i guess
English
0
0
0
13
゚ 리트윗함
Polytoria
Polytoria@PolytoriaGame·
To our new users, your chance to win the unique Sky Blue Fedora is here! To enter: 1⃣ Retweet and like this post 2⃣ Follow us at @PolytoriaGame 3⃣ Comment your Polytoria username below Four winners will be announced in 14 days. Good luck! polytoria.com/store/27315 #Giveaway
Polytoria tweet media
English
1.9K
1.6K
3.2K
174.8K
゚
@osyyn·
do you guys ever close an app, then open it again 5 seconds later for no discernible reason
English
0
0
0
20
Alan
Alan@TheCanadianGTR·
Xbox has confirmed the ACTUAL file size of GTA 6. It is 676.7 GB. #GTA6 #GTAVI
Alan tweet mediaAlan tweet media
English
2.4K
2.4K
77.7K
9.8M
゚
@osyyn·
@BunMinden @AnkitSi70755453 @TheCanadianGTR My system doesn't use too much RAM on startup. I do try not to run too many things in the background to prevent slowdowns, though. Hope I get some RAM for Christmas.
English
1
0
4
231
゚
@osyyn·
@otomir23 @simplygandan well that was a fucking lie. i can't believe you would lie on the internet. you're despicable
English
0
0
0
15
✿ damir
✿ damir@otomir23·
hey chatgpt generate me a story that never happened
✿ damir tweet media
Peter Girnus 🦅@gothburz

Someone found an RCE on my website yesterday. CVE-2025-55182. React2Shell. I don't have a bug bounty program. I never asked for a security assessment. I woke up to a DM: "Hey I found a critical vulnerability in your site. I only ran the exploit to verify it worked. Here's my PayPal for the bounty." Bounty? I checked my logs. Forty-seven requests to my RSC endpoint. Something, something ... Prototype pollution payloads. They used the GitHub script. The one with 2,000 stars. The one that runs id automatically "for verification purposes." They spawned a shell on my production server. uid=1001(nextjs) gid=65533(nogroup) They took a screenshot. They posted it on Twitter. "Popped a Shell on a Live Website 🚀💀 #BugBounty #CVE-2025-55182 #YOLO" They got 84781 likes. My customers' data was on that server. I asked them to delete the screenshots. They said "I removed the domain name, you should be thanking me." Thanking them. For unauthorized access to my production infrastructure. For running arbitrary commands on systems I own. For posting proof of exploitation for clout. They called it "responsible disclosure." I called my lawyer. They called me "ungrateful." I called the FBI. Now they're in my DMs explaining that "this is how the industry works" and I "don't understand pen testing." A pen what? I understand it perfectly. I understand that running react2shell-ultimate.py against random websites isn't research. I understand that "I removed the identifying info" doesn't undo the unauthorized access. I understand that #BugBounty doesn't apply when there's no bounty program. I understand that finding my site on Shodan doesn't constitute authorization. Their followers are defending them now. "Presumption of innocence." "You don't know if it was authorized." "The screenshots were redacted." Three hundred people are calling me a bootlicker for reporting a crime. Someone said I should be grateful they didn't deploy a cryptominer. The bar is underground. I just wanted to run a small Next.js app. I didn't ask to be someone's proof-of-concept. I didn't consent to being their "first" I didn't sign up for an unscheduled penetration test from a stranger with a GitHub account. There is no safe harbor for spraying public exploits at random websites. There is no legal protection for "I was just verifying the vulnerability." There is no ethical framework where unauthorized prototype pollution is a favor. But sure. Thank you for your service. You found a CVE that was already public. Using a tool someone else wrote. Against a target that never authorized you. And you posted about it on main. For likes. Hero.

English
11
12
1K
36.8K