Seven

41 posts

Seven banner
Seven

Seven

@bvmies

라타타타, 울린 심장

Katılım Kasım 2020
77 Takip Edilen37 Takipçiler
Seven retweetledi
🧸°
🧸°@phamhanies·
newjeans youtube archive • 160+ GB • up to 4k resolution • avail subtitles: eng (might add more. kindly drop your suggestions!) 📂drive.google.com/drive/folders/…
🧸° tweet media
English
101
2.3K
13K
316.1K
Seven retweetledi
۟
۟@hyegums·
missing newjeans
۟ tweet media
English
23
2.9K
14.6K
234.6K
Seven retweetledi
impulsive
impulsive@weezerOSINT·
Click up is not the only multibillion dollar funded AI company exposing your data. Fireflies.ai allows anyone with an unauthenticated request download the FULL Call audio and video + including emails to every participant and an AI summary of your private meeting. Below is a Disney meeting Call summary and how they're deciding to improve or fire the janitors who leave dirty toilets. That's just a small segment of the meeting.
impulsive tweet mediaimpulsive tweet media
impulsive@weezerOSINT

i went to clickup.com. opened the page source. found a hardcoded API key in the javascript. copied it. sent one GET request. got back 959 email addresses and 3,165 internal feature flags. employees from Home Depot. Fortinet. Autodesk. Tenable. Rakuten. Mayo Clinic. Permira. Akin Gump. government workers from Wyoming, Arkansas, North Carolina, Montana, Queensland Australia, and New Zealand. a Microsoft contractor. 71 clickup employees. fortinet sells enterprise firewalls. tenable makes Nessus, the vulnerability scanner half the industry runs. their employees emails are exposed because clickup hardcoded a third party API key in a javascript file that loads before you even log in. this was first reported to clickup through hackerone on January 17, 2025. its now April 2026. the key has not been rotated. i just pulled the response five minutes ago. every email is still there. clickup raised $535 million at a $4 billion valuation. claims 85% of the Fortune 500 use their platform. looks like the proof is in the page source.

English
13
47
448
60.8K
Seven retweetledi
impulsive
impulsive@weezerOSINT·
i went to clickup.com. opened the page source. found a hardcoded API key in the javascript. copied it. sent one GET request. got back 959 email addresses and 3,165 internal feature flags. employees from Home Depot. Fortinet. Autodesk. Tenable. Rakuten. Mayo Clinic. Permira. Akin Gump. government workers from Wyoming, Arkansas, North Carolina, Montana, Queensland Australia, and New Zealand. a Microsoft contractor. 71 clickup employees. fortinet sells enterprise firewalls. tenable makes Nessus, the vulnerability scanner half the industry runs. their employees emails are exposed because clickup hardcoded a third party API key in a javascript file that loads before you even log in. this was first reported to clickup through hackerone on January 17, 2025. its now April 2026. the key has not been rotated. i just pulled the response five minutes ago. every email is still there. clickup raised $535 million at a $4 billion valuation. claims 85% of the Fortune 500 use their platform. looks like the proof is in the page source.
impulsive tweet mediaimpulsive tweet mediaimpulsive tweet mediaimpulsive tweet media
English
179
650
6.5K
1.3M
Seven retweetledi
m ✰
m ✰@mar3uss·
New jeans really supposed to be at Coachella right now man
English
110
6.9K
41.7K
1.1M
Seven retweetledi
ye
ye@kanyewest·
I know it takes time to understand the sincerity of my commitment to make amends I take full responsibility for what’s mine but I don’t want to put my fans in the middle of it My fans are everything to me Looking forward to the next shows See you at the top of the globe 🌏
English
4.5K
19.1K
178.3K
5.4M
Seven
Seven@bvmies·
@yeunrlsd The album cover makes it 100x more funnier
English
0
0
24
1.9K
yeunrlsd
yeunrlsd@yeunrlsd·
We blocked BTS on apple music too 💀😭
yeunrlsd tweet media
English
40
330
7.1K
185K