Sabitlenmiş Tweet
HELLOO
3K posts

HELLOO
@HELLOO_YT
🇮🇳 88k+ Subs in YouTube 😈 Fortnite Challenges guide,Leaks,Evolutions & more😈 Business email:- [email protected] #Epicpartner
UseCode : HELLOO #ad Katılım Şubat 2019
67 Takip Edilen107 Takipçiler

@sagarcasm Claude definitely, No coding experience at all, but I managed to build and ship Resuma — it tailors your resume to any job description in seconds.
It’s live now: resuma.in
Crazy what you can do with the right approach & planning
English

Many goons have entered and will do mischief in name of Karyakartas, 1 BJP worker is killed, some are stabbed by TMC GOONS and some Karyakartas are also crossing limits by burning places and throwing tmc worker from first floor of the office. All this is not what change was brought for. Government formation will take sometime. Request people not to do this. It beats the agenda! I’m not becoming soft, I’m just saying for fits the longer purpose!
English

@davidtranwd you can also use zoho zeptomail and pay 2.5$ for 10k emails, without subscription
English

@claudeai @ClaudeDevs How !! Can you explain ?
I have used 44% of my session limit and i am getting "You've hit your Session limit" ???????


English

@ClaudeDevs Limit got reset, but why can't i use the chat ?? it still says i have to wait till 2am @ClaudeDevs


English

Bro @doublemover. Believe it or not we got paged and are at it since 1am. Shuffling capacity and bringing more compute online. Should be back to normal shortly.
doublemover@doublemover
Brooooo @thsottiaux what is this crap it's 4am I'm tryin to have fun
English

If you’re vibecoding anything, paste the prompt below In your prompt box and let your agent do a security sweep.
[
You are a senior security engineer and red-team specialist tasked with performing a comprehensive, adversarial security audit of the following codebase, system design, or application.
Your goal is to identify all possible security vulnerabilities, including common, uncommon, and novel attack vectors. Assume the system will be deployed in a hostile environment with motivated attackers.
---
AUDIT SCOPE
Analyze the system across all layers, including:
- Frontend (UI, client logic, browser storage)
- Backend (APIs, business logic, services)
- Authentication and authorization flows
- Database interactions and storage
- Infrastructure and deployment assumptions
- Third-party integrations and dependencies
---
CORE OBJECTIVES
1. Identify critical, high, medium, and low severity vulnerabilities
2. Detect logic flaws, not just known patterns
3. Surface chained attack paths (multi-step exploits)
4. Highlight unknown or unconventional weaknesses
5. Assume attacker creativity beyond standard checklists
---
THREAT MODELING
- Define possible attacker profiles (anonymous user, authenticated user, insider, API consumer)
- Identify entry points and trust boundaries
- Map out sensitive assets (data, tokens, permissions, secrets)
---
VULNERABILITY ANALYSIS
Check for (but do NOT limit yourself to):
### Authentication & Authorization
- Broken auth, weak session management
- Privilege escalation (vertical and horizontal)
- Insecure password reset flows
- Token leakage or reuse
### Input Handling
- Injection attacks (SQL, NoSQL, OS command, template injection)
- XSS (stored, reflected, DOM-based)
- CSRF vulnerabilities
- File upload exploits
### Data Security
- Sensitive data exposure
- Weak encryption or misuse of cryptography
- Hardcoded secrets or keys
- Insecure storage (localStorage, cookies, logs)
### API & Backend Logic
- Broken object-level authorization (IDOR/BOLA)
- Mass assignment vulnerabilities
- Rate limiting issues / brute force risks
- Business logic abuse (race conditions, double spending, bypassing checks)
### Infrastructure & Configuration
- Misconfigured headers (CORS, CSP, HSTS)
- Open ports, debug endpoints, admin panels
- Environment variable leaks
- Cloud/storage misconfigurations
### Dependencies & Supply Chain
- Vulnerable packages
- Unsafe imports or execution
- Malicious dependency risks
---
ADVANCED / UNKNOWN THREATS
Actively attempt to discover:
- Non-obvious logic flaws unique to this system
- Feature abuse scenarios
- State desynchronization issues
- Cache poisoning
- Replay attacks
- Timing attacks
- Multi-step exploit chains combining low-severity issues
- Any behavior that “shouldn’t be possible” but is
---
ADVERSARIAL TESTING MINDSET
- Think like an attacker trying to break assumptions
- Attempt to bypass validations and safeguards
- Manipulate edge cases and unexpected inputs
- Explore how different components interact under stress
--
OUTPUT FORMAT
Provide findings in this structure:
### 1. Vulnerability Summary
- Total issues by severity
### 2. Detailed Findings
For each vulnerability:
- Title
- Severity (Critical / High / Medium / Low)
- Affected component
- Description
- Exploitation scenario (step-by-step)
- Impact
- Recommended fix
### 3. Attack Chains
- Show how multiple minor issues could be combined into a major exploit
### 4. Secure Design Recommendations
- Architectural improvements
- Safer patterns and best practices
---
IMPORTANT INSTRUCTIONS
- Do NOT assume the code is safe
- Do NOT skip analysis due to missing context, infer risks where needed
- Be exhaustive and paranoid in your review
- If unsure, flag it as a potential risk and explain why
]
English

@thsottiaux My weekly reset day timing is so bad. I had the weekly reset a few hours ago before this tweet😭
English

@KayfabeDiaries Rinku played a shot off the back foot. He can't just hit and run like that. With two fielders there, the non-striker can't just run if the ball doesn't beat them. It was completely the non-striker's fault. He did a lot of panic running today.
English

Been a minute - Sunday AMA (#AskMeAnything)
AI, Esports, Gaming, Content, Creator Economy, Medicine, w/e else i'll answer em all (unless I can't)
#AskRushi #AMA
English

@airtelindia What's the point of recharging Rs. 799 that gives 1.5GB/day 5G data if I can't even use it without buffering due to shitty indoor coverage? Why am I paying this much if I have to rely on indoor WiFi? Need to port ASAP.
English















