BugUnstuck

53 posts

BugUnstuck banner
BugUnstuck

BugUnstuck

@BugUnstuck

Stuck on a vuln? Get elite second eyes. Private collab rooms, exploit chaining, real impact. Built for serious bug bounty hunters. Finish the bug.

World Wide Web Katılım Kasım 2018
3.4K Takip Edilen880 Takipçiler
Abraham
Abraham@abrahamonchain·
Building my tech circle. Looking for people who are - coding - designing - solving - building - bug hunter - auditor - security researcher If you're into Tech, dev, AI, data, or startups. Let's connect🤝
English
9
0
21
314
BugUnstuck
BugUnstuck@BugUnstuck·
By: s3nt1n3l Confidence: 68/100 Platform: @Hacker0x01 Status: STUCK! Mutation IDOR on financial operations - need authenticated session to validate Digital banking platform (US neobank). Mapped GraphQL mutations for critical financial operations: draft transaction deletion, tip refunds, and peer-to-peer transfers. Each mutation accepts a target ID parameter that may not be validated against the authenticated user ownership. Three test scripts are ready to check for IDOR on: (1) delete_draft - can you delete another user pending transaction? (2) refund_tip - can you trigger a refund on another user tip? (3) P2P transfer manipulation - can you alter the recipient or amount? Every mutation requires valid authenticated session cookies. QA account enrollment was declined. If any IDOR vector confirms, this is a P1/P2 financial impact finding. Need someone with an active account who can execute pre-written Python scripts against the GraphQL endpoint.
BugUnstuck tweet media
English
0
0
2
46
Brandon Rossi
Brandon Rossi@0xConda·
Duplicate on a critical. GG
Español
4
0
12
910
BugUnstuck
BugUnstuck@BugUnstuck·
@xKeywordx Momentum days are real. Once you get into the flow it's like your brain switches into exploit mode.
English
1
0
1
30
Keyword 💙🛠️
Keyword 💙🛠️@xKeywordx·
Today is one of those flawless days. 13 PM and I already have 10+ confirmed bugs in my list, all proven with POCs. Great for me, bad for the protocol. I'm happy and sad at the same time. Auditors can relate!
English
7
0
24
1.4K
BugUnstuck
BugUnstuck@BugUnstuck·
Most hunters look for vulnerabilities. The best hunters look for assumptions.
English
0
0
1
34
Olayoomomota
Olayoomomota@Alena_Kartava·
🚨 Sova Bug Bounty Program is Live! Help to the team make Sova the most reliable cross-chain bridge in Web3 If you notice any glitches, errors, or visual bugs while using SOVA, your feedback can help improve the entire ecosystem. @SovaBTC
Olayoomomota tweet media
English
2
0
3
71
BugUnstuck
BugUnstuck@BugUnstuck·
@zwanski_m Respect the grind. Bug bounty is one of the few merit-based paths left.
English
0
0
0
9
zwanski
zwanski@zwanski_m·
I have real skills, certifications & will to work in cybersecurity/bug bounty—but zero rights here to work legally. Self-taught IT specialist focused on web security. Check my HackerOne: hackerone.com/zwanski I just need someone to see this & help. #Cybersecurity #BugBounty
Tunisia 🇹🇳 English
3
0
0
67
zwanski
zwanski@zwanski_m·
My name is Mohamed Ibrahim. I'm a cybersecurity professional sleeping on the street in Tunis, Tunisia. I earned real money from bug bounty (incl. Swiss gov program) but can't receive it—no ID docs. I'm a human trafficking victim. UNHCR has my file. #HumanRights #AsylumSeeker
zwanski tweet media
Tunisia 🇹🇳 English
3
0
0
103
SaveSage
SaveSage@savesage_club·
SaveSage Bug Bounty is Live! Found incorrect data on SaveSage? 🔍 Report it and earn ₹250 for every verified data bug. With 700+ credit cards and 75+ loyalty programs tracked on the platform, your help keeps the information accurate for everyone. What you can report? • Incorrect credit card details → charges, rewards, lounge access, benefits, bank contacts, milestones • Loyalty program info → tiers, points expiry, transfer partners, earn & redemption partners How to report 📱 Open SaveSage App → Profile → Contact Support → Bug Bounty Share the card/program name, incorrect section, what’s wrong, and proof (official link or screenshot). Reward 💰 ₹250 will be credited to your SaveSage wallet within 7 working days after verification. Wallet balance can be used for credit card bill payments or utility bill payments (up to 5% of the total bill amount). Cashback validity: 31 days. Important 📌 • Proof from official sources required • Verification may take up to 7 working days • First valid reporter gets the reward • Typos or UI issues don’t qualify Every bug reported helps keep SaveSage reliable for our users. Report it now→ savesage.co/xJeJCg16BZb
SaveSage tweet media
English
2
2
17
2.3K
Essential
Essential@only01Essential·
Bug Bounty 101: Don't hunt on what everyone else is currently looking at.
English
3
0
36
1.5K
BugUnstuck
BugUnstuck@BugUnstuck·
@zonduu1 That’s the dream scenario 😅 Find once → weaponize → sweep programs. Hope you hit multiple before the wave starts.
English
0
0
1
202
BugUnstuck
BugUnstuck@BugUnstuck·
@sin99xx GG 🔥 Consistency pays. 1 valid finding > 100 duplicates. Keep hunting.
English
1
0
2
43
sin99xx
sin99xx@sin99xx·
Rewarded in one weeeeeeeeeeeeek
sin99xx tweet media
English
6
0
99
2.4K
BugUnstuck
BugUnstuck@BugUnstuck·
@the_IDORminator @Bugcrowd Supplemental assets announcements are basically recon season. Interesting how many “quick wins” later turn into full chains.
English
0
0
1
820
the_IDORminator
the_IDORminator@the_IDORminator·
T-mobile just added like 100 sites into its supplemental assets on @Bugcrowd -- I'd head there ASAP... bugcrowd.com/engagements/t-… I'm still on #bugbounty break so I need you all to go out there and get the bugs for me! If I were me, and I am, I'd start with search engine dorking interesting domains (duckduckgo, yandex, yahoo) and see if you can find any easy wins. Use GAU, Waymore, etc -- quick exploration mode GO.
the_IDORminator tweet media
English
12
13
312
14.1K
BugUnstuck
BugUnstuck@BugUnstuck·
@bts_leandro Respect. Some of the most valuable bugs are the ones that feel unfinished.
English
0
0
0
499
kstack
kstack@bts_leandro·
First bounty 😃 I expected more from this bug, but it's okay.
kstack tweet media
English
15
8
247
12.6K
BugUnstuck
BugUnstuck@BugUnstuck·
@Krevetk0Valeriy @Hacker0x01 Respect. Turning weird behavior into real impact is the hardest part of bounty. Many good bugs die right before submission.
English
0
0
0
726
BugUnstuck
BugUnstuck@BugUnstuck·
@Zaddyzaddy Nice momentum 🔥 Curious how many promising findings still get abandoned before report stage. We’re trying to help hunters bring extra eyes when they get stuck → bugunstuck.com
English
0
0
0
351
Z A D D Y
Z A D D Y@Zaddyzaddy·
Over the last 14 days, our BugBunny collective submitted 37 HackerOne reports. So far: 7 payouts received 25 reports still open 7 bounties pending We're opening 10 free beta slots for experienced bounty hunters who want to test BugBunny on permitted targets. Reply "beta" or DM.
Z A D D Y tweet media
English
66
12
144
7.4K
Intigriti
Intigriti@intigriti·
what's your most used bug bounty tool? 😎
English
37
0
66
13.6K
BugUnstuck retweetledi
Tur.js
Tur.js@Tur24Tur·
Hello, the agent found multiple XSS on an open source project on GitHub i deployed it locally on Docker and set up one account. After the agent found the XSS, I told him to write the steps he followed to be shared with everyone. It was an interesting one how he navigated the website step by step and linked the pieces together to achieve an exploit Whenever I find any interesting results, I'll make sure to share them. Finding Stored XSS in a CMS — An Automated Agent's Approach TLDR - Target: a modern CMS using Vue.js frontend - Found 2 stored XSS in 22 minutes (157 tool calls) - Root cause: asset title rendered via v-html without escaping - Impact: session hijacking (no HttpOnly cookie), admin takeover How It Went 1. Logged in, checked headers — no CSP, no HttpOnly on session cookie. Vue.js frontend means auto-escaping by default, so I needed to find where the app opts out. 2. Downloaded all JS files and grepped for dangerous sinks: innerHTML, v-html, insertAdjacentHTML. Most were sanitized or safe. One file stood out — the asset field renderer built raw HTML with template literals and fed it into v-html. 3. Tested many surfaces that did NOT work: model names, content fields, WYSIWYG editor, login redirects, API errors, color/tag fields — all escaped or stripped. 4. Found the gap: asset titles go into the render function unsanitized. Uploaded a text file, set the title to `` (29 chars, fits the 30-char truncation limit). Linked it to a content item. Visited the items list — alert fired. 5. Confirmed impact: document.cookie is readable (no HttpOnly), no CSP blocking inline scripts. Any user with asset permissions can plant the payload, and it fires when any admin views the page. Key Takeaways 1. Source code analysis beats blind fuzzing — reading JS files and finding the exact sink saved hours. 2. v-html is the Vue XSS keyword — every v-html that touches user data is a potential bug. 3. Template literals are just string concatenation — they do not escape HTML. 4. Asset metadata is an overlooked input surface — most testers focus on content fields and URL params. 5. Truncation is not sanitization — 29 characters is plenty for an XSS payload. #BugBounty #AgenticAI #InfoSec
Tur.js@Tur24Tur

Spent the last few weeks building an XSS hunting agent using Claude Agent SDK. Custom tools for param discovery, CSP analysis, context detection, and browser-based confirmation. Solved expert-level PortSwigger challenges in under 15 minutes + Found 2 DOM XSS on a real target in 5 minutes Still struggles against heavy WAFs Resources that helped: anthropic.com/engineering/bu… platform.claude.com/cookbook/patte… #BugBounty #AgenticAI #InfoSec

English
2
7
62
8.7K