Jenish Sojitra

2K posts

Jenish Sojitra banner
Jenish Sojitra

Jenish Sojitra

@_jensec

$2M in bug bounty. Offensive Security researcher. Product developer who likes Building in Public. Creator of https://t.co/0N9TViCzQ4

Katılım Temmuz 2017
573 Takip Edilen24.5K Takipçiler
Sabitlenmiş Tweet
Jenish Sojitra
Jenish Sojitra@_jensec·
Last month was my highest in bug bounty so far with almost $131k in bounty. Total paid reports: 18 Average reward: $7.3k Category: most were logical findings via reversing mobile applications and discovering internal endpoints leading to code execution and missing auth etc
Jenish Sojitra tweet media
English
103
127
2.8K
236.6K
Jenish Sojitra
Jenish Sojitra@_jensec·
f4lc0n@al_f4lc0n

the figures referenced in the post are entirely misleading. There was no impact realized from this issue. Zero user funds were affected and zero addresses were compromised. My response: Are you suggesting I should have actually exploited the bug and caused real damage before coming to talk to you? For the stated vulnerability to work in practice, it would require execution of several suspicious transactions that would have an extraordinarily limited impact. My response: You should know better than anyone that on a Cosmos-based chain, a single transaction can pack multiple messages. Just one transaction is more than enough to completely drain multiple whale accounts. Injective has dynamic rate limiting functionalities which are applied automatically based on our live monitoring systems. This functionality has been live on mainnet since last year and is publicly available in our code base. My response: First, this has nothing to do with the vulnerability itself. Rate limiting doesn't stop attackers from stealing funds. It only slows them down when they try to bridge those funds over to Ethereum. Second, when I submitted my report, the mainnet configuration for this feature was not set. In other words, this feature wasn't even turned on! In addition to all of the above, this report was reviewed against the clearly defined terms of our Immunefi program. Based on those terms, issues such as those raised in this report that DO NOT impact block production or consensus are categorized outside of the Blockchain/DLT tier and carry a maximum payout of $50,000. My response: First, Immunefi has always put the impact of direct fund theft at the very top of its priority list. This is a fact that everyone knows. Second, you changed your bug bounty page after I submitted my report. Here’s the snapshot from November 8, 2025: web.archive.org/web/2025110816… . And now, there’s an extra line added to your bug bounty page: “IMPORTANT: Within the Assets in Scope table, the injective-core folder is listed for both Blockchain/DLT and Web/App due to overlap between the two within the same folder. However, for a report to be categorized as Blockchain/DLT, the resulting impact has to be directly involved with the block production process or with consensus failures. All reports not dealing directly with either of these are to be categorized as Web/App.” I’d really like to know when this line was added. and do you really value chain consensus more than users' funds? We remain committed to fair, transparent, and consistent handling of all reports, and to maintaining the highest standards of security for the ecosystem. Injective has done so since its mainnet inception in 2021 and will continue to do so in perpetuity, always putting builders and security first. My response: You never even replied to my messages, and now you’re blaming me for not requesting mediation? I can post the original report if you agree. I left many messages, but you haven't replied to a single one. ---------- Finally: Stop making excuses from every angle and trying to use technical jargon to confuse people who aren't developers. That doesn’t work anymore these days. Anyone can just ask an AI to fact-check what both of us are saying. I have no ill intentions toward your project. All I'm asking is for you to be honest and handle this transparently.

English
0
0
21
2.7K
Bojan Angjelkoski
Bojan Angjelkoski@bangjelkoski·
Security is paramount at @injective and we take our bug bounty program very seriously. First and foremost, the figures referenced in the post are entirely misleading. There was no impact realized from this issue. Zero user funds were affected and zero addresses were compromised. For the stated vulnerability to work in practice, it would require execution of several suspicious transactions that would have an extraordinarily limited impact. Injective has dynamic rate limiting functionalities which are applied automatically based on our live monitoring systems. This functionality has been live on mainnet since last year and is publicly available in our code base. In addition to all of the above, this report was reviewed against the clearly defined terms of our Immunefi program. Based on those terms, issues such as those raised in this report that DO NOT impact block production or consensus are categorized outside of the Blockchain/DLT tier and carry a maximum payout of $50,000. If the poster had requested a mediation we would explain to him the dynamic rate limiters and monitoring systems we have in place and why his stated figures are misleading. However, he did not do so. We always follow the procedures set forth by the Immunefi program and expect the submitter to do so as well. We remain committed to fair, transparent, and consistent handling of all reports, and to maintaining the highest standards of security for the ecosystem. Injective has done so since its mainnet inception in 2021 and will continue to do so in perpetuity, always putting builders and security first.
f4lc0n@al_f4lc0n

I Saved Injective's $500M. They Pay Me $50K. I like hunting bugs on @immunefi . I'm decent at it. - #1 — Attackathon | Stacks - #2 — Attackathon | Stacks II - #1 — Attackathon | XRPL Lending Protocol - 1 Critical and 1 High from bug bounties (not counting this one) Life was good. Then I found a Critical vulnerability in @injective . This vulnerability allowed any user to directly drain any account on the chain. No special permissions needed. Over $500M in on-chain assets were at risk. I reported it through Immunefi. The next day, a mainnet upgrade to fix the bug went to governance vote. The Injective team clearly understood the severity. Then — silence. For 3 months. No follow up. No technical discussion. Nothing. A few days ago, they notified me of their decision: $50K. The maximum payout for a Critical vulnerability in their bug bounty program is $500K. I disputed it. Silence again. No explanation for the reduced payout. No explanation for the 3 month ghost. No conversation at all. To be clear: the $50K has not been paid either. I've seen others share bad experiences with bug bounty payouts recently. I never thought it would happen to me. I can't force them to do the right thing. But I won't let this be forgotten. I will dedicate 10% of all my future bug bounty earnings to making sure this story stays visible — until Injective pays what I deserve. Full Technical Report: github.com/injective-wall…

English
71
38
189
176.7K
0xd0m7
0xd0m7@0xd0m7·
Just added to my Linkdin profile: hackerone HTML local injection . 10 years experience . But i continue being 10 Top hackerone all of the time ! It's to say something quite clear . Only 9 people report more than me !
0xd0m7 tweet media
English
9
4
151
7.3K
Jenish Sojitra retweetledi
vittorio
vittorio@IterIntellectus·
this is actually insane > be tech guy in australia > adopt cancer riddled rescue dog, months to live > not_going_to_give_you_up.mp4 > pay $3,000 to sequence her tumor DNA > feed it to ChatGPT and AlphaFold > zero background in biology > identify mutated proteins, match them to drug targets > design a custom mRNA cancer vaccine from scratch > genomics professor is “gobsmacked” that some puppy lover did this on his own > need ethics approval to administer it > red tape takes longer than designing the vaccine > 3 months, finally approved > drive 10 hours to get rosie her first injection > tumor halves > coat gets glossy again > dog is alive and happy > professor: “if we can do this for a dog, why aren’t we rolling this out to humans?” one man with a chatbot, and $3,000 just outperformed the entire pharmaceutical discovery pipeline. we are going to cure so many diseases. I dont think people realize how good things are going to get
vittorio tweet mediavittorio tweet mediavittorio tweet mediavittorio tweet media
Séb Krier@sebkrier

This is wild. theaustralian.com.au/business/techn…

English
2.5K
19.9K
118K
17.3M
Jenish Sojitra
Jenish Sojitra@_jensec·
We are hiring at @exodus Security team in EMEA. If you are / you know someone who is good fit, apply: (link in comment)
English
8
6
165
16K
Arshad Kazmi
Arshad Kazmi@arshadkazmi42·
I recently added subdomain takeover monitoring to issl.today, along with an API. You can now generate an API key and programmatically check whether a domain is vulnerable or potentially vulnerable to subdomain takeover. It also supports importing your HackerOne scope via API key. The system will: Import all in-scope domains Perform subdomain enumeration (including wildcards) Continuously monitor them for services that could lead to takeover Useful if you’re tracking takeover opportunities across many programs.
Jenish Sojitra@_jensec

Is there an updated version or library or API for github.com/EdOverflow/can… ?

English
2
0
23
4K
Jenish Sojitra
Jenish Sojitra@_jensec·
Biggest disadvantage of bug bounty is that your output (income) is tied directly to input(number of hours)
English
12
9
206
11.4K
Pomme
Pomme@pxmme1337·
You wake up in 2016. You just earned a $3,000 bounty. Your friends all think you’re a genius hacker. Your online bug bounty mate tells you « this shit is forever, bro » HackerOne sends you a hoodie over the mail
English
10
27
461
37.4K
Jenish Sojitra retweetledi
Intigriti
Intigriti@intigriti·
@hakluke @xnl_h4ck3r 4️⃣ JSAnalyzer JSAnalyzer by @_jensec automatically extracts API endpoints, secrets, URLs, and sensitive files from JS responses, with smart noise filtering to reduce false positives! 🤠 🔗 github.com/jenish-sojitra…
Intigriti tweet media
English
1
29
146
5.2K
Milo Smith
Milo Smith@mil0theminer·
Looks like @cluely is almost fully out of money. they have removed all affiliates other than @im_roy_lee and @neelyweely23. Those badges cost $50 a month. I think they're spending too much on engineers since most of them have the original $400k pay package. They now pay 40% less
Milo Smith tweet mediaMilo Smith tweet mediaMilo Smith tweet media
English
164
43
2.7K
1.1M
Jenish Sojitra
Jenish Sojitra@_jensec·
@SarvamAI There is no option to provide email, how will you contact those who submitted?
English
2
0
7
4.2K
Sarvam
Sarvam@SarvamAI·
Today, we're launching the Sarvam Startup Program. AI is the era for builders. We want to compound that momentum by powering the startup ecosystem with high-quality models and tools so they can create with full agency. The program provides credits, priority support, and production-ready infrastructure so startups can focus fully on building.
Sarvam tweet media
English
102
525
4.6K
167.5K
biased indian
biased indian@RakeshK32229480·
Day 5 for travelling in faridabad for my internship > Terrible road conditions at Sector 33 NHPC Chowk. >This road hosts many multinational and Indian manufacturing companies. @MCF_Faridabad fix the road as soon as possible > Add footpath & Street light as well
biased indian@RakeshK32229480

Day 4 of travelling in Faridabad today off due to Holi. I was pleasantly surprised by how good the roads are in Faridabad Especially the Faridabad–Mathura Road I apologize for giving a false impression of the city earlier.

English
259
1.1K
7.3K
217.2K
Jenish Sojitra
Jenish Sojitra@_jensec·
Crxplorer.com has served 7.17M requests in last 30 days. ~1000 scans/day. All on a free CloudFlare plan. Its crazy how good @Cloudflare supports individual teams.
Jenish Sojitra tweet media
English
3
0
53
3.4K
Akash Gupta
Akash Gupta@akashtesla·
@_jensec @Cloudflare Can we scan internal extension? . I tried scanning the loaded extension but it didn't scanned.
English
1
0
0
197
Jenish Sojitra retweetledi
Smilehacker
Smilehacker@_smile_hacker_·
This is pretty cool. Even when AI models have guardrails that prevent prompts in other languages (technically preventing you from prompting in any languages other than English), I found a way around it. A short blog on the technique is coming soon, @Sudarshana_io. Stay tuned.
Jenish Sojitra@_jensec

Prompt injection not working? Try changing your payload to Thai and Arabic languages. I was able to bypass multiple LLM runtime safeguard features, including Azure Content Filter, and received a total of $37,500 in bounties across programs.

English
0
1
18
2.5K