stuxf

45 posts

stuxf

stuxf

@stuxfdev

co-founder and ceo @verialabs (yc f25) | hack things @smiley_ctf

가입일 Eylül 2025
147 팔로잉292 팔로워
고정된 트윗
stuxf
stuxf@stuxfdev·
We spun out of the #1 hacking team in the US and built AI that finds what even the best hackers miss. During one engagement, it found 6 different ways to take over any user's account on a popular webapp. Completely autonomously. Then suggested fixes for every single one. Today we're announcing @verialabs' $3.2M seed, backed by @ycombinator, @gokulr, @paulg, and @woloski (co-founder of Auth0), and many other great investors. DM me if you want to know what we'd find in your app.
stuxf tweet media
English
24
19
235
52.3K
Hahnbee Lee
Hahnbee Lee@hahnbeelee·
nick is pushing me to share more of my writing publicly. dipping my toes into it by leaking my own internal memo
Hahnbee Lee tweet media
English
9
0
97
5.1K
stuxf 리트윗함
.;,;.
.;,;.@smiley_ctf·
We just qualified 2 teams for DiceCTF Finals, with one of our teams getting 2nd place overall! Congrats @BunkyoWesterns on winning and we'll see everyone in NYC! insert line about llms ruining ctfs here
.;,;. tweet media
English
2
7
29
4.1K
stuxf
stuxf@stuxfdev·
Went to @ycombinator startup school last year, ended up having dinner w/ visiting partner @aroraharshita33 decided to apply for the fall batch and got in after :) if you're at all interested in startups, highly recommend applying, free sf trip and a life changing two days
Y Combinator@ycombinator

Startup School is back! Hear from Jensen Huang, @sama, @alexandr_wang, @JeffDean, and more. Join a hand-selected group of top CS students, researchers, and engineers for two days of talks, sessions with YC partners, and hands-on robotics demos, right here in San Francisco.

English
5
8
40
15K
stuxf
stuxf@stuxfdev·
@theo You can find these pretty easily by looking at unsolved problems from recent CTFs, they typically match your criteria of being programmatically verifiable and not being able to be solved by an LLM
English
0
0
0
1.2K
Georgios Konstantopoulos
Georgios Konstantopoulos@gakonst·
looking to work with more LLM auditors for @tempo - pls DM me with your tool & proof of it working in real projects!
English
29
3
114
17K
stuxf
stuxf@stuxfdev·
We spun out of the #1 hacking team in the US and built AI that finds what even the best hackers miss. During one engagement, it found 6 different ways to take over any user's account on a popular webapp. Completely autonomously. Then suggested fixes for every single one. Today we're announcing @verialabs' $3.2M seed, backed by @ycombinator, @gokulr, @paulg, and @woloski (co-founder of Auth0), and many other great investors. DM me if you want to know what we'd find in your app.
stuxf tweet media
English
24
19
235
52.3K
wen
wen@wen_rahme·
@MetorialAi takes security seriously.
wen tweet media
English
2
0
4
102
stuxf
stuxf@stuxfdev·
@TheGregYang you should make a list of your favorite movies and/or books! especially as you watch more of these
English
0
0
0
112
stuxf 리트윗함
Veria Labs
Veria Labs@verialabs·
We hacked a Times Square billboard! jk! @brexHQ put us up there for YC F25. Back to actually finding security vulnerabilities.
English
2
3
20
2.4K
stuxf
stuxf@stuxfdev·
@peer_rich @vrexec great points, most vibe coded internal apps end up being horribly insecure because it’s just not as much of a priority
English
0
0
0
19
VEO
VEO@vrexec·
So I made my own private meeting scheduling / call booking website using Claude (hosted/rendered inside Lovable). It took probably about 6 hours of total dedicated time and about $100 in compute credits. I will never use any other call scheduling service again... ever in my entire life. Why is everyone not doing this? Help me understand. "Mid" SaaS is dead forever. Short it all.
English
31
2
64
185.5K
stuxf
stuxf@stuxfdev·
@thdxr agents are what convinced me to stay with nix instead of moving off
English
0
0
1
183
zefram.eth
zefram.eth@boredGenius·
Introducing CallMe, a minimal plugin that lets Claude Code call you on the phone. Start a task, walk away. Your phone/watch rings when Claude is done, stuck, or needs a decision. Free & open source (MIT). Underlying API costs are cents per minute of call.
zefram.eth tweet media
English
276
442
6.8K
1M
stuxf 리트윗함
Cayden Liao
Cayden Liao@Cayden_Liao·
🧵 Broke Eigen Network's zkVM Found a missing check in its FRI implementation that lets attackers forge arbitrary proofs.
English
1
2
5
845
stuxf 리트윗함
.;,;.
.;,;.@smiley_ctf·
We're officially top 3 in the world on CTFtime for 2025, up from 13th last year! yay This year, we also: - hosted the first ever smileyCTF, with 1,000+ teams playing - went to in-person CTFs in Switzerland, Las Vegas, NYC * 2 - qualified for SECCON and LakeCTF 2026 finals
.;,;. tweet media
English
2
8
36
4.6K
stuxf
stuxf@stuxfdev·
@handotdev 45 mins is an incredibly fast time to go from notification to fix. great work handling this, most companies take weeks for vulns far worse than this
English
0
0
6
1.4K
Han Wang
Han Wang@handotdev·
Over the past few days, I asked our team to intentionally stay away from social media to focus on our customers. We put out an initial statement from our blog, but did not draw enough attention to it. Now that the dust has started to settle, I want to share our perspective on what happened. What happened? We messed up. We overlooked a foundational design flaw that put many of our customers at risk. This was a serious mistake, and we take full responsibility. It is our duty to holdup high security standards, and we failed to meet those standards. We should have known better and done better. The timeline of events On November 12, 2025, we were notified that security researchers discovered a cross-site scripting vulnerability. This meant that a static asset (images, pdfs, svgs, etc...) that gets uploaded to one customer's project could be accessed from another customer’s domain. All alarm bells went off. Within 45 minutes of being notified, we deployed a fix to production and immediately began auditing all assets across our entire platform. While we did not uncover any exploitation through this vulnerability, we contacted every possible at risk customer by 10:25 PM that day. Over the following weeks, we’ve worked with the researches, to not only address the initial vulnerability, but to identify and fix several others. The people who helped us I want to thank @xyz3va, @MDLcsgo, and @hackermondev, who brought this issue to our attention and worked alongside us over the past few weeks to not only to fix the issue, but make our vulnerability known to strengthen better security practices everywhere. I am genuinely grateful for their work in helping us secure our systems. What we're doing now We're expanding our bug bounty program (linked below) significantly, and continuing to put resources in our security infrastructure and practices. This incident made clear that we need to do more, and we will. To our customers: thank you for your patience and your trust. We know trust is earned, and we're committed to earning it back. - Han
English
29
22
444
96.9K
stuxf
stuxf@stuxfdev·
@CristiVlad25 @Xbow if you’re doing it right you can burn upwards of $2000 in tokens per hour
English
0
0
0
435
Mehul Mohan
Mehul Mohan@mehulmpt·
I have spent the last 4 hours understanding React2Shell deeply (video soon). The exploit itself is relatively complex to piece together, but the code that enables that exploit is a hot mess. This RCE issue was there for multiple months. Crazy to think about it.
English
7
5
186
10.4K