Sincerely BOJ

4.3K posts

Sincerely BOJ banner
Sincerely BOJ

Sincerely BOJ

@beeohjay

Full Stack Software Engineer👨‍💻 | Building @sellenda_ng | Talent Manager @djlitwak | Alumni @alx_africa

Lagos Nigeria. Katılım Şubat 2013
3.8K Takip Edilen2K Takipçiler
Ogbeni
Ogbeni@OgbeniAdugbo·
I had a discussion with this gentleman and if you will like to be part of the investment, kindly send me a dm and you will be sent a link. Many people are enthusiastic about this and the guy is opened to coming together to scale it up. Lets invest and make money! @Equityoyo
Ogbeni@OgbeniAdugbo

@Equityoyo @LNCtoday So why can’t few of us get to work with this guy and provide this to small small circle of buildings?? We can crowdsource funding. Please can you link me up with this guy? Thank you

English
6
4
8
1.1K
Sincerely BOJ retweetledi
Name cannot be blank
Name cannot be blank@hackSultan·
If you’re vibecoding anything, paste the prompt below In your prompt box and let your agent do a security sweep. [ You are a senior security engineer and red-team specialist tasked with performing a comprehensive, adversarial security audit of the following codebase, system design, or application. Your goal is to identify all possible security vulnerabilities, including common, uncommon, and novel attack vectors. Assume the system will be deployed in a hostile environment with motivated attackers. --- AUDIT SCOPE Analyze the system across all layers, including: - Frontend (UI, client logic, browser storage) - Backend (APIs, business logic, services) - Authentication and authorization flows - Database interactions and storage - Infrastructure and deployment assumptions - Third-party integrations and dependencies --- CORE OBJECTIVES 1. Identify critical, high, medium, and low severity vulnerabilities 2. Detect logic flaws, not just known patterns 3. Surface chained attack paths (multi-step exploits) 4. Highlight unknown or unconventional weaknesses 5. Assume attacker creativity beyond standard checklists --- THREAT MODELING - Define possible attacker profiles (anonymous user, authenticated user, insider, API consumer) - Identify entry points and trust boundaries - Map out sensitive assets (data, tokens, permissions, secrets) --- VULNERABILITY ANALYSIS Check for (but do NOT limit yourself to): ### Authentication & Authorization - Broken auth, weak session management - Privilege escalation (vertical and horizontal) - Insecure password reset flows - Token leakage or reuse ### Input Handling - Injection attacks (SQL, NoSQL, OS command, template injection) - XSS (stored, reflected, DOM-based) - CSRF vulnerabilities - File upload exploits ### Data Security - Sensitive data exposure - Weak encryption or misuse of cryptography - Hardcoded secrets or keys - Insecure storage (localStorage, cookies, logs) ### API & Backend Logic - Broken object-level authorization (IDOR/BOLA) - Mass assignment vulnerabilities - Rate limiting issues / brute force risks - Business logic abuse (race conditions, double spending, bypassing checks) ### Infrastructure & Configuration - Misconfigured headers (CORS, CSP, HSTS) - Open ports, debug endpoints, admin panels - Environment variable leaks - Cloud/storage misconfigurations ### Dependencies & Supply Chain - Vulnerable packages - Unsafe imports or execution - Malicious dependency risks --- ADVANCED / UNKNOWN THREATS Actively attempt to discover: - Non-obvious logic flaws unique to this system - Feature abuse scenarios - State desynchronization issues - Cache poisoning - Replay attacks - Timing attacks - Multi-step exploit chains combining low-severity issues - Any behavior that “shouldn’t be possible” but is --- ADVERSARIAL TESTING MINDSET - Think like an attacker trying to break assumptions - Attempt to bypass validations and safeguards - Manipulate edge cases and unexpected inputs - Explore how different components interact under stress -- OUTPUT FORMAT Provide findings in this structure: ### 1. Vulnerability Summary - Total issues by severity ### 2. Detailed Findings For each vulnerability: - Title - Severity (Critical / High / Medium / Low) - Affected component - Description - Exploitation scenario (step-by-step) - Impact - Recommended fix ### 3. Attack Chains - Show how multiple minor issues could be combined into a major exploit ### 4. Secure Design Recommendations - Architectural improvements - Safer patterns and best practices --- IMPORTANT INSTRUCTIONS - Do NOT assume the code is safe - Do NOT skip analysis due to missing context, infer risks where needed - Be exhaustive and paranoid in your review - If unsure, flag it as a potential risk and explain why ]
English
112
449
3.4K
365.6K
Sincerely BOJ
Sincerely BOJ@beeohjay·
It’s Wednesday, post your work here let’s make a thread
English
0
0
0
5
Julien Barbier 🙃❤️🏴‍☠️ 七転び八起き
After 3 incredible years and 1.6M students later, my journey at ALX Africa has come to an end. It has been a life-changing experience, during which I made a lot of friends, worked with an incredibly dedicated team, and met so many talented students. A few numbers. We scaled from a few thousand students to 1.6M students on our platform. Students loved it and many of them took more than one course: 4M total! For the famous #ALX_SE Software engineering program, our SE students made an average of 2,000 commits and our checker reviewed 180M of their projects. That’s 2B lines of code… and that was before Claude Code. They actually wrote these themselves (unless Kimba said otherwise :) A big thank you to all my SE team mates, I am so proud of what we have accomplished, and I will really miss you all. Thank you to Fred for the trust he put in me and always supporting my crazy new and disruptive ideas. Thank you to my students. It was an honor to work with you, watch you struggle but relentlessly move forward, no matter what, until you got this job. To those who are still struggling finding this job, keep pushing forward. Don’t let go. You got this. You all have worked so hard and I am so proud of you. You are the greatest thing I've ever been part of and I can't wait to see what impact you will have on the world. It’s your turn to shine now, and hopefully for some of you to give back to the community whenever you are in a position to. I hope you’ll keep sharing the good news with me when you get this internship, this job, or when you launch your company. These messages are everything to me. In any case, I’ll be watching you from afar, and you can count on me to continue answering all your LinkedIn and X messages. Can’t conclude without ALX Africa’s signature: continue to “Do Hard Things”. Remember who you are, where you are coming from, and where you set out to go. I’ll see you there soon. With love. J PS: Want to know what's next for me? Drop your email here: forms.gle/uXkakKduHgx9tp…
English
84
78
507
18.4K
Sincerely BOJ
Sincerely BOJ@beeohjay·
@jbarbier @alx_africa @sellenda_ng racking in revenue last year. Solo-handedly built Sellenda and I have been proud of my struggles in SWE program. It was heavenly of ride really 😊 Do you remember @expressrescueng ?? Let’s say I paused because apparently the average Nigerian mechanic uses a feature phone 🥲 and
English
1
0
0
31
Sincerely BOJ retweetledi
Nav Toor
Nav Toor@heynavtoor·
🚨 Someone just turned your WiFi router into a full-body surveillance system. No cameras. No wearables. No video. Just radio waves. It's called RuView. It uses the WiFi signals already in your room to detect human poses, track breathing, measure heart rate, and see through walls. Not a concept. Not a research paper. Working code you can run right now. Here's what this thing actually does: → Tracks full 17-point body pose using only WiFi signals → Detects breathing rate (6-30 BPM) without touching anyone → Measures heart rate (40-120 BPM) from across the room → Sees through walls, furniture, and debris up to 5 meters deep → Tracks multiple people simultaneously with zero identity swaps → Self-learns from raw WiFi data. No labeled datasets needed Here's how it works: WiFi signals pass through your room and hit the human body. The body scatters those signals differently based on position, breathing, even heartbeat. RuView reads that scattering pattern and reconstructs everything. A mesh of 4 ESP32 nodes ($48 total) gives you 360-degree coverage with 12 measurement links, 20 Hz updates, and sub-30mm precision. Here's the wildest part: It has a disaster response mode called WiFi-Mat. It detects survivors trapped under rubble through concrete walls, classifies injury severity using START triage protocol, and estimates 3D position. The kind of tool that saves lives after earthquakes. The Rust implementation processes 54,000 frames per second. That's 810x faster than the Python version. The entire Docker image is 132 MB. The AI model fits in 55 KB of memory. Runs on an $8 ESP32 chip. Train once, deploy in any room. No retraining. No recalibration. 1,100+ tests. SHA-256 verified capability audit. 22.4K GitHub stars. 2.7K forks. MIT License. 100% Open Source.
Nav Toor tweet media
English
252
1.7K
5.9K
586.7K
Cindy☘️
Cindy☘️@Indemosyd·
"Don't date older women" The older women:
English
521
721
16.3K
750.9K
Sincerely BOJ retweetledi
The Rebirth
The Rebirth@rebirthodyssey·
The Industry Advisors lineup for Rebirth 3.0 is now complete and well stacked! We’ve gathered elite voices from across Web3, DeFi, Forex, community building, product scaling, career acceleration, high yield farming, narrative trading, and disciplined execution. These are people who’ve built real systems, made real money, and know exactly how to help others start winning long term. By the way, we are still wondering who the mystery advisor could be🤔... Secure your birthlist pass before it closes in two days!
The Rebirth tweet media
The Rebirth@rebirthodyssey

We are deliberately surrounding this ecosystem with experienced industry minds and decision-makers whose role is not to teach theory, but to shape direction, challenge assumptions, and strengthen outcomes. These Industry Advisors will contribute strategic insight across all web3 niches ensuring that you remain aligned with how real systems operate outside classrooms and communities. Now tell us, which Idolo do you want to hear from @ Rebirth3 ?

English
111
130
201
24.9K
Sincerely BOJ
Sincerely BOJ@beeohjay·
@ChelseaFC I hope Jao Pedro doesn’t start tonight 🙏🏽 All he knows how to do is lose the ball and do wrong passes
English
0
0
0
26
Bola Ahmed Tinubu
Bola Ahmed Tinubu@officialABAT·
On this Holy day, I wish all Christians in Nigeria and around the world a Merry Christmas. I thank God for the opportunity to serve as the leader of our great country, and I pray for peace in our land, especially between individuals of differing religious beliefs. I stand committed to doing everything within my power to enshrine religious freedom in Nigeria and to protect Christians, Muslims, and all Nigerians from violence. ~ Bola Ahmed Tinubu .@NigeriaGov .@NGRPresident .@cannigeria .@CANmedia_ .@NigCatholicNet .@OfficialNBCHQ .@anglicanCONig #MCN #UMCN #ECWA .@realDonaldTrump
Bola Ahmed Tinubu tweet mediaBola Ahmed Tinubu tweet mediaBola Ahmed Tinubu tweet media
English
2.9K
2K
9.9K
1.3M
Sincerely BOJ retweetledi
Cruise Dev
Cruise Dev@cruise_dev·
How I almost got hacked by
English
1
2
3
138