Ron Masas

319 posts

Ron Masas banner
Ron Masas

Ron Masas

@RonMasas

trying to predict the next token to make you think i’m a security researcher.

Katılım Eylül 2015
236 Takip Edilen1.5K Takipçiler
Sabitlenmiş Tweet
Ron Masas
Ron Masas@RonMasas·
I found 2 stored XSS vulnerabilities in ChatGPT. The XSS bug was the easy part, but sharing it required bypassing CSP, leveraging a mass assignment issue for client-side path traversal (thanks @ctbbpodcast) to force a request to a BFLA endpoint. 🧵 [1/5]
Ron Masas tweet media
English
14
158
794
75.8K
Ron Masas
Ron Masas@RonMasas·
@danpacary Incredible work. Are you planning to release the code? 🙂
English
1
0
1
142
Ron Masas retweetledi
Daniel Isaac
Daniel Isaac@danpacary·
I got a 1T (trillion) parameter model running on my MacBook Pro. Kimi-K2. 1.029T params. ~1 TB raw weights. 524 GB converted. ~1.7 tok/s. Yesterday it was 671B. Today it's 1T. Same laptop. Same M4 Max. No cloud. When I say we: I mean Claude and me.
Daniel Isaac tweet media
English
72
95
1.4K
128.8K
Gal Weizman
Gal Weizman@WeizmanGal·
Prompt Forcing / Forced Prompt Injection is a missing item in the class of how AI based applications can be attacked It isn’t a direct / indirect prompt injection, where the prompt/ctx is being polluted by the attacker - it is simply the action of forcing a complete prompt upon the receiving system from an inferior position In 2026 this notion will become clearer
English
1
2
3
570
Ron Masas
Ron Masas@RonMasas·
Trying to fix prompt injection for LLMs is like trying to fix social engineering in humans.
English
0
0
4
106
Ron Masas
Ron Masas@RonMasas·
I made a tiny pet that lives on your Dock, modeled after the Claude Code mascot, vibe coded with Claude Code, of course. 😁
English
18
5
583
277K
Ron Masas retweetledi
Yohann Sillam
Yohann Sillam@SillamYohann·
⚠️ I found a Stored #XSS nested inside the OAuth credentials configuration. Because n8n makes these credentials shareable, a threat actor can easily propagate this attack vector to any victim they choose ! Full write-up here ➝ lnkd.in/e5Y_VdE7
English
1
1
3
194
Gal Weizman
Gal Weizman@WeizmanGal·
קצת אסקפיזם: היום התפרסם מחקר שלי שאני גאה בו מאוד, בו אני מדגים איך תוסף פשוט לדפדפן יכל להשתלט על האינטגרציה החדשה של gemini אל תוך chrome, מה שאפשר לאותו תוסף לבצע ״הסלמת הרשאות״ ולגשת למצלמה, מיקרופון, צילומי מסך וקבצים על המחשב של המשתמש 👇
Gal Weizman@WeizmanGal

A vulnerability[HIGH] I found allowed to leverage an extension to hijack the new "Gemini Live in Chrome" pane This could allowed attackers to: * Steal / invoke prompts * Access media 📷🎙️ * Leak PII * Take screenshots * Access OS files & folders But the story is much bigger 🧵

עברית
2
0
17
1.2K
Ron Masas
Ron Masas@RonMasas·
@moxie Which model + size powers Confer?
English
0
0
0
351
Moxie Marlinspike
Moxie Marlinspike@moxie·
Confer now supports encrypted attachments. Explore medical records, financial statements, legal documents -- without transmitting any of it to the data lake that will be plumbed by future subpoenas, hackers, and advertisers.
English
8
9
133
23.4K
Ron Masas
Ron Masas@RonMasas·
@thedawgyg What do you think the security impact is? This sounds more like chasing a technicality
English
1
0
0
414
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Anyone know if Google/Chrome VRP pay's for denial of service vulns? Like a webpage thats able to crash the renderer tab?
English
9
0
48
10.5K
Ron Masas
Ron Masas@RonMasas·
Watching @rebane2001’s games made me want to play something on my phone like in the old days, with real physical buttons and not just tapping glass. So I started looking into whether a browser can detect hardware button presses. Turns out it can’t. Neither iOS nor Android expose system volume or volume-button events to the web. To solve that the game plays a high-frequency tone (around 18 kHz), listens to it through the microphone, and runs an FFT in real time. Press the volume buttons, the tone gets louder or quieter, and that delta becomes the input that controls the game. It’s a dumb idea that works surprisingly well. The volume buttons end up acting like an analog controller, entirely inside the browser. You can try it here (tested on iOS only): ultrasonic.breakpoint.sh github.com/masasron/Ultra… Don’t use headphones. Avoid using it near dogs or other sound-sensitive animals. If you can hear the tone (some people can, some phones leak), lower the gain or stop.
English
1
1
2
271
Ron Masas
Ron Masas@RonMasas·
I made a browser game that uses your phone’s volume buttons as the controller.
English
2
0
2
454
Ron Masas
Ron Masas@RonMasas·
@AmitSchendel did you actually try this? cvereports.com/reports/CVE-20… This honestly looks fully AI-generated. The ProxyServlet it talks about doesn’t even exist in the versions it claims are vulnerable. The “exploit PoC” on GitHub is just as weird: github.com/Ashwesker/Ashw… It literally copies the made-up “Vulnerable Logic Simulation” concept from your report, stuffs a fake command prefix into an HTTP header, and calls it an exploit. This fucking AI slop must end.
English
0
0
4
518
Phith0n
Phith0n@phithon_xg·
CVE-2025-54068 is the #React2Shell of the Laravel world.🚩 Just like Next.js Server Actions, Livewire bridges the frontend/backend gap automatically. But blindly deserializing state from the client? That leads to RCE. 👇Try the exploit via Vulhub: github.com/vulhub/vulhub/… #Vulhub
Phith0n tweet mediaPhith0n tweet media
English
10
84
526
47.5K
Moxie Marlinspike
Moxie Marlinspike@moxie·
@RonMasas Yes, the provider (me) can't see the inference. I'll do a technical writeup soon =)
English
1
0
31
1.5K
Moxie Marlinspike
Moxie Marlinspike@moxie·
I've been building Confer: private AI chat where your conversations are end-to-end encrypted so that only you can access them. It's still new, but I've been using it every day and beta testing it with friends. Let me know what's missing! confer.to/blog/2025/12/c…
English
61
80
417
69.2K
Ron Masas
Ron Masas@RonMasas·
I really enjoyed the CTF. See you next year!
Wiz@wiz_io

zeroday.cloud 2025?… UNREAL. 2 days. $340k in prizes 🤑 Live exploits on stage that literally shook the room. THANK YOU to everyone who came! You made history. You made the cloud safer.

English
0
0
0
284
Ron Masas retweetledi
Wiz
Wiz@wiz_io·
zeroday.cloud 2025?… UNREAL. 2 days. $340k in prizes 🤑 Live exploits on stage that literally shook the room. THANK YOU to everyone who came! You made history. You made the cloud safer.
English
0
6
41
3K