BrunoZero

431 posts

BrunoZero banner
BrunoZero

BrunoZero

@BrunoModificato

CTFer for: @Water_Paddler / Security auditor @osec_io my writeups: https://t.co/XurIhbWdj7 24y

Katılım Aralık 2016
423 Takip Edilen1.9K Takipçiler
Pew
Pew@TheGrandPew·
age++
QST
10
0
39
2.8K
BrunoZero retweetledi
OtterSec
OtterSec@osec_io·
Our research team achieved client RCE on Minecraft Bedrock Edition via a heap overflow to bypass ASLR and sidestep CFG. Writeup to come.
English
59
276
3K
221.3K
BrunoZero
BrunoZero@BrunoModificato·
New research, I did found many wallets /web 3 products not taking in consideration the difference between desktop env and mobile env leading to high severity issues.
OtterSec@osec_io

NEW: OAuth misconfigurations show how common dev settings can lead to account takeovers. Our second deep dive breaks down real cases where overlooking differences between desktop and mobile environments left SDKs, exchanges, and wallets open to exploits. osec.io/blog/2025-10-1…

English
0
0
5
863
BrunoZero retweetledi
OtterSec
OtterSec@osec_io·
NEW: OAuth misconfigurations show how common dev settings can lead to account takeovers. Our second deep dive breaks down real cases where overlooking differences between desktop and mobile environments left SDKs, exchanges, and wallets open to exploits. osec.io/blog/2025-10-1…
English
2
18
75
8K
BrunoZero retweetledi
OtterSec
OtterSec@osec_io·
NEW: The recent supply-chain attack on NPM exposed a fundamental vulnerability in the open-source ecosystem and the risks that lurk within our dependencies. We break down how the malware worked and practical defenses every dev should know ↓ osec.io/blog/2025-09-1…
English
2
9
38
5.7K
BrunoZero retweetledi
MetaMask 🦊
MetaMask 🦊@MetaMask·
As a MetaMask user, you do not need to be scared of the supply chain attack that took place earlier today. MetaMask has multiple layers of defense to protect our products and users: - Basic Security: We lock our versions, don't push directly to main, have manual and automated checks during the entire development lifecycle, and have robust release processes and monitored rollouts. - LavaMoat: Prevents malicious code from harming you, even if malicious code was to somehow sneak in. LavaMoat covers both the development lifecycle and runtime scenarios. - Blockaid: Flags malicious addresses nearly instantaneously, protecting you from compromised dapps. Security is paramount for MetaMask. We work tirelessly to protect you from attacks and threats, including supply chain attacks. 🧡
English
514
1K
6.6K
462.6K
BrunoZero retweetledi
OtterSec
OtterSec@osec_io·
NEW: Proof of Reserves you can verify yourself. We teamed up with @Backpack to build PoRv2, a zero-knowledge system for fast, transparent solvency checks. More on how we designed it ↓ osec.io/blog/2025-08-2…
English
23
27
143
29.2K
BrunoZero
BrunoZero@BrunoModificato·
@S1r1u5_ Wtf. Where are you going btw?
English
0
0
2
530
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
peak third-worlder hustle just to get a basic visitor visa.
s1r1us (mohan) tweet media
English
5
0
68
5.3K
BrunoZero
BrunoZero@BrunoModificato·
@xenobyte_ I think AI offers no technical improvements, it can only help with correcting English grammar
English
1
0
1
144
Melvin Kitnick 🏴‍☠️
@BrunoModificato Some improved too tho, It seems to me that people that made poor reports now are making worse ones and people that made good ones are writing even better ones
English
1
0
0
156
BrunoZero
BrunoZero@BrunoModificato·
I hope the AI hype ends soon: :'(. The quality of infosec reports and write-ups has been declining so much because of AI slop
English
2
1
21
1.8K
BrunoZero
BrunoZero@BrunoModificato·
@zhero___ Nice article, I did use x-now-route-matches to exploit a cache poison to DOS some months ago, that header can lead to interesting results on the next JS caching
English
1
0
7
1.3K
zhero;
zhero;@zhero___·
publication of my latest modest paper; Eclipse on Next.js: Conditioned exploitation of an intended race-condition - (CVE-2025-32421) enabling a partial bypass of my previous vulnerability, CVE-2024-46982 by chaining a race-condition to a cache-poisoning zhero-web-sec.github.io/research-and-t…
zhero; tweet media
English
12
121
563
59.7K
BrunoZero
BrunoZero@BrunoModificato·
@S1r1u5_ They just won’t accept the bug and will tell is next.js fault
English
2
0
9
726
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
and earn good $$ on crypto web apps. its all Next.js
English
3
0
17
2.3K
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
i am telling you, if you do it right, you can find one vulnerability on Next.js every week.
English
4
2
98
7.8K
BrunoZero retweetledi
OtterSec
OtterSec@osec_io·
NEW: A few months ago, we uncovered an authentication bypass in Web3Auth that could have led to full account takeover. In this deep dive, we break down how we found the issue and expose other authentication misconfigurations lurking in Web3. osec.io/blog/2025-07-0…
English
4
36
118
14.2K