mav

980 posts

mav banner
mav

mav

@MavLevin

0day security researcher sharing my work. prev: anthropic, unit 8200, stanford, trail of bits

San Francisco, CA Katılım Mart 2018
829 Takip Edilen3.2K Takipçiler
mav
mav@MavLevin·
@thsottiaux and codex team: can you allow changing Permissions/yolo mode during a turn? geminicli has ctrl-y shortcut to disable/enable yolo mode
English
0
0
0
321
mav
mav@MavLevin·
@hohnjeyer looking forward to sending you more of my slop ;)
English
1
0
1
108
John Heyer 🦆
John Heyer 🦆@hohnjeyer·
My tolerance for slop is slowly but surely increasing as my confidence in coding models increases!
English
3
0
1
137
mav
mav@MavLevin·
@theonejvo @theonejvo thanks for highlighting my work and explaining the benefit!!
English
1
0
2
172
mav
mav@MavLevin·
@ImNotTheWolf thanks for highlighting my work! :)
English
1
0
3
1.4K
ImNotTheWolf
ImNotTheWolf@ImNotTheWolf·
Massive security update necessary for EVERYONE that is using clawdbot. It's a backdoor that bypasses EVERYTHING. It even bypasses locally hosted set-ups with auths stored in sandbox containers. 💀💀 If you are using OpenClaw / Moltbot / Clawdbot, this update is NON-NEGOTIABLE!
International Cyber Digest@IntCyberDigest

‼️🚨 An ex-Anthropic engineer just published a 1-click remote code execution exploit for OpenClaw (formerly Moltbot and ClawdBot). The attack occurs in milliseconds after the victim visits a webpage, giving the attacker access to Moltbot and the system it's running on. The victim does not need to type anything or approve any prompts.

English
3
1
8
2.8K
mav
mav@MavLevin·
@inf0stache thanks dude! love that you enjoyed the writeup
English
0
0
3
79
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 An ex-Anthropic engineer just published a 1-click remote code execution exploit for OpenClaw (formerly Moltbot and ClawdBot). The attack occurs in milliseconds after the victim visits a webpage, giving the attacker access to Moltbot and the system it's running on. The victim does not need to type anything or approve any prompts.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
68
176
1.1K
226.2K
mav
mav@MavLevin·
we @depthfirstlabs found 1-Click RCE in OpenClaw (aka MoltBot / ClawdBot) ! full vuln & exploit details 👇
mav tweet mediamav tweet media
English
6
25
120
12.8K
depthfirst
depthfirst@depthfirstlabs·
depthfirst found a 1-Click RCE in Moltbot from a logic flaw. Read the walkthrough to see how we understand codebases to find complex vulnerabilities. DM us if you’d like a demo
depthfirst tweet media
mav@MavLevin

we @depthfirstlabs found 1-Click RCE in OpenClaw (aka MoltBot / ClawdBot) ! full vuln & exploit details 👇

English
2
3
11
858
mav
mav@MavLevin·
when the disclosure was published, I found another team found this bug too!
English
1
0
6
1.1K
Kyla Guru
Kyla Guru@GuruDetective·
Theory, Tradecraft, TTPs, Threat actor — who knew cyber had so many T’s?! Had so much fun at @SANSInstitute Cyber Threat Intelligence summit this week in DC! 🏛️ shared a behind the scenes look at the evolving threats and defenses we’re building at A\! #cyber #anthropic
Kyla Guru tweet media
English
1
0
1
250
mav
mav@MavLevin·
my latest blog post is out! I share a race condition vuln I found in blockchain infra moving $billions/month mavlevin.com/2026/01/18/fla…
mav tweet media
English
1
3
17
997