ars4c retweetledi
ars4c
566 posts

ars4c retweetledi
ars4c retweetledi
ars4c retweetledi
ars4c retweetledi

Found an IDOR vulnerability but the IDs are UUIDs? Don't drop the report yet.
1️⃣ Find leaked UUIDs
- Use a tool like gau/waybackurl to dump URLs from that target, see if any valid UUIDs are leaked in the URLs and try them (be careful with write/delete operations ⚠️)
- Search more sources, like GitHub, Postman public workspaces, GitLab snippets, Pastebin etc for leaked UUIDs
2️⃣ Find an UUID oracle
- Search for your UUID in proxy responses, look around the app functionality to see if the UUIDs might be leaked in some other way, things like search, autocomplete, user lookup, mentions...
- Investigate collaboration features like "share" or "invite". These features may reveal the other user's UUID.
- Check old API versions (/api/v1/*, /api/1.1/*)
If these don't work, keep digging, think weird.
English

Cybersecurity experts right now
OpenAI@OpenAI
Introducing Daybreak: frontier AI for cyber defenders. Daybreak brings together the most capable OpenAI models, Codex, and our security partners to accelerate cyber defense and continuously secure software. A step toward a future where security teams can move at the speed defense demands.
English
ars4c retweetledi

SECURITY ADVISORY — TanStack npm packages
A supply-chain compromise affecting 42 @tanstack/* packages (84 versions total) was published to npm earlier today at approximately 19:20 and 19:26 UTC. Two malicious versions per package.
Status: ACTIVE — packages are deprecated, npm security engaged, publish path being shut down.
Severity: HIGH — payload exfiltrates AWS, GCP, Kubernetes, and Vault credentials, GitHub tokens, .npmrc contents, and SSH keys.
If you installed any @tanstack/* package between 19:20 and 19:30 UTC today, treat the host as potentially compromised:
• Rotate cloud, GitHub, and SSH credentials immediately
• Audit cloud audit logs for the last several hours
• Pin to a prior known-good version and reinstall from a clean lockfile
Detection — the malicious manifest contains:
"optionalDependencies": {
"@tanstack/setup": "github:tanstack/router#79ac49ee..."
}
Any version with this entry is compromised. The payload is delivered via a git-resolved optionalDependency whose prepare script runs router_init.js (~2.3 MB, smuggled into each tarball at the package root).
Unpublish is blocked by npm policy for most affected packages due to existing third-party dependents. All 84 versions are being deprecated with a SECURITY warning, and npm security has been engaged to pull tarballs at the registry level.
Full technical breakdown, complete package and version list, and rolling status updates:
github.com/TanStack/route…
Credit to the security researcher for responsible disclosure.
English
ars4c retweetledi

Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation github.com/shuvonsec/clau…
English
ars4c retweetledi

Bug write-up for "Google AI Studio XSS" ndevtk.github.io/writeups/2026/… (ノ*・ω・)ノ
English
ars4c retweetledi
ars4c retweetledi

The AI existential crisis incoming
anthony@asusevski
is this what dario sees when he keeps saying SWE will be automated
English
ars4c retweetledi
ars4c retweetledi
























