Brolly

60 posts

Brolly

Brolly

@coolbrolly

Security, Eagle Eye

Paris, France Katılım Eylül 2020
71 Takip Edilen4 Takipçiler
Brolly
Brolly@coolbrolly·
@Bugcrowd Absolutely agree! The crux of the matter: How to convince the triage teams (in my experience quite often the "not-so-expierenced" staff)? They are seemingly trained too often for remote issues, not what can happen when using logic errors. It's ~95 % "by design" then. Do tell! :(
English
0
0
0
6
bugcrowd
bugcrowd@Bugcrowd·
Some vulnerabilities only show up when a real person understands the business logic, chains together signals, and thinks like an attacker. In our webinar with Schibsted, Gabriel explains why bug bounty programs are a critical layer for finding the deeper exploits automated tools can miss. Keep up the great work, hackers 👏 Watch the full clip: bugcrowd.com/webinar/
English
2
1
4
695
Brolly
Brolly@coolbrolly·
What was the main reason for getting actually valid security vulnerabilities rejected, here in #Bugbounty programs VRP driven by OS companies?
English
0
0
0
15
Brolly
Brolly@coolbrolly·
@GoogleVRP Question: In scope: "unlocking Private Space without the designated lock factor" Not in scope: "secondary lockscreen bypasses". I am wondering what is correct. Dependent from coincidence? Thx for an enlightenment.
English
1
0
1
1.3K
Google VRP (Google Bug Hunters)
📣📢 Calling all Android and Chrome bug hunters 🧑‍💻🔎! We're updating our Android & Chrome VRP programs to ensure we can continue to reward the most challenging and impactful vulnerabilities researchers find in our products. For details, 👇 bughunters.google.com/blog/evolving-…
English
19
33
201
138K
Brolly
Brolly@coolbrolly·
@lukashanren1 Sometimes Google VRP needs months. In case they have no more justification why it should be still Working As Intended (contrary to their rules and security feature descriptions) it would suddenly be a "duplicate". Own experiences. More than once. For sake of "burning the bridge"?
English
1
0
2
131
Lucas Futures
Lucas Futures@lukashanren1·
Google VRP handles duplicate reports very quickly — usually within 1–3 minutes. It appears to be fully automated. Why don’t other platforms do the same?
English
2
0
17
1.2K
Brolly
Brolly@coolbrolly·
@GoogleVRP @erbbysam A pity, no answer as usual. Means, an existing issue in current Android 16 where any app could replace several Android settings activities by own activ. will stay as it is, exploitable by malicious apps. Capable of gaining user credentials. Directly in the settings task itself.
English
0
1
1
27
Brolly
Brolly@coolbrolly·
@GoogleVRP @erbbysam Hi, May you please clarify: Which vectors're meant? Attacks depend. on malic. apps are normally declined as the user's fault bcs he has installed that mal. app, issues with local-phys. access/2nd lockscr. bypass ditto as the device would be unlocked, so the user's fault
English
1
0
0
137
Google VRP (Google Bug Hunters)
📢📢📢 Attention bug hunters! The Google VRP is updating its reward model, with a focus on the impact of vulnerabilities and the sensitivity of the data involved. To this end, we're introducing two dimensions: Information Tiers and Action Criticality. 👀👇 bughunters.google.com/blog/standardi…
English
10
38
245
20.2K
Brolly
Brolly@coolbrolly·
@Google @Android > Continuing to advance Android security and privacy (...) we are ensuring that Android remains the most secure platform. We will continue (...) to keep users, their data, and their devices safe throughout 2026 and beyond. Seriously? Proposal: Listen to Security Researchers!!
English
0
0
0
656
Google
Google@Google·
We’re rolling out new updates to make your everyday @Android experience even better, including: 🤳 Screen Reactions, so you can record yourself and your screen at the same time — without switching apps or setting up a green screen 📸 An improved Instagram experience in partnership with Meta, including ultra HDR video, Night Mode integrations, brand new tools in the Edits app and more 📴 New digital wellbeing tools, like Pause Point, to help you reclaim your time and use apps more mindfully 😀 Nearly 4,000 redesigned emoji 🤝 New features to make it even easier to switch to Android from another phone, so your passwords, photos, messages, favorite apps, contacts and even your homescreen travel with you 🛜 Expanded Quick Share compatibility, so you can easily share files with more types of devices #TheAndroidShow
English
138
190
2.3K
205.7K
FreeBSD Frau
FreeBSD Frau@freebsdfrau·
Few people can look at this and tell what it is that I am doing … #FreeBSD
FreeBSD Frau tweet media
English
99
8
187
29.9K
Brolly
Brolly@coolbrolly·
@GoogleVRP Is your blog implicitly confirming what many people here seem to feel, in other words collab. preferably with a selected "elite" crowd only? These feelings may already be confirmed by yourself by not reacting to the many concerns and questions on your X channel, aren't they? 🤔
English
0
0
1
261
Brolly
Brolly@coolbrolly·
@GoogleVRP Invest ≠ go-live. 🤔 "(...) we continuously invest in the quality of our VRP programs and our relations with the external (...) community – all with the goal of ensuring that (...) products maintain the _highest_possible_ security standards and _remain_safe_ for our users."
English
0
0
1
183
Brolly
Brolly@coolbrolly·
@alisaesage Really great. Google and Android VRP are also excited in ensuring that the reporter is experiencing such a groundbreaking interpretation of their own explicit rules. At least your report got a fix.
English
0
0
0
59
Brolly
Brolly@coolbrolly·
@intigriti Eagle eyes, brain and keyboard/mouse. (Sadly this is often not compatible with triagers, as they are seemingly only trained for code, code and code. Though there are so many logic flaws exploitable just by using the aforementioned four things).
English
0
0
1
498
Intigriti
Intigriti@intigriti·
What are currently your top 3 most used bug bounty tools? 😎
English
34
1
93
14.3K
Brolly
Brolly@coolbrolly·
@0x0v1 It might depend on the skills, experiences and enthusiasm of the parties involved. Just speculation.
English
0
0
0
24
Ovi
Ovi@0x0v1·
@coolbrolly Not quite. Google won't accept bugs if Developer Mode is a requirement for the bug. They will accept bugs where the bug is affecting that component itself. Locality is accepted also. But this also affects many devices who exposed their ADB port to the internet.
English
3
0
0
145
Ovi
Ovi@0x0v1·
Today we are disclosing CVE-2026-0073: A critical no-interaction proximal/adjacent remote code execution vulnerability in adbd's ADB-over-TCP authentication path. Full technical write-up + exploit flow: barghest.asia/blog/cve-2026-…
English
4
30
106
13.4K
Brolly
Brolly@coolbrolly·
@0x0v1 Yes. My experiences are nonetheless others. The user is not allowed to trust any network, and/or developer mode as "the gate" is on. Regardless of a bug there itself and the way: remote or cable on an actually secure device (without ADB!) doesn't mind: WAI/NSI/infeasible then:(
English
1
0
0
75
Brolly
Brolly@coolbrolly·
@0x0v1 But thank you that you found it and secured the world!
English
0
0
1
70
Brolly
Brolly@coolbrolly·
Got an invite from @msftsecresponse for a researcher meeting during BlackHat 2026! 🎉 How thoughtful of them to acknowledge all that under-the-radar "collaboration". Though Vegas seems like a bit too much (away) for a quick coffee or two. 😅 #MSRC #Cybersecurity
Brolly tweet media
English
1
0
1
690
Brolly
Brolly@coolbrolly·
@sirdarckcat IMHO many misunderstandings leading to discouragement could be minimised by simply reading plus trying to understand questions, concerns and appeals, finally answering them thoroughly (less AI templates). One example would be GoogleVRP at X -- purely unanswered topics.
English
0
0
0
61
Eduardo Vela
Eduardo Vela@sirdarckcat·
For Bug Hunters, it always seemed like we were discouraging collaboration (having a private edge was a difference between $0 and hundreds of thousands of dollars). We tried everything to fix that, but with very modest successes. Another problem was predictability.. 4/🧵
English
3
0
2
1.5K
Eduardo Vela
Eduardo Vela@sirdarckcat·
Just finished a really cool visit to Singapore! Where I met with a lot of the smartest folks here in the Vulnerability Research space. We are planning to build a new security hub in Singapore. And the first team we are building is going to be focused on.. 1/?🧵
Eduardo Vela@sirdarckcat

Well this was a productive trip. 😁

English
3
6
91
12.7K
Brolly
Brolly@coolbrolly·
@sirdarckcat > And if you didn't find a "full chain", either the bug was worth nothing, or you felt like it wasn't paid properly.. Might be. But wasn't the public statement in several rules for years now that the max possible impact would count? If the entrance to the target was opened ...
English
0
0
0
28
Eduardo Vela
Eduardo Vela@sirdarckcat·
... It was common for even experienced bug hunters not to know if their bug will be rewarded, and if so, how much. Even the best bugs could be duplicates. And if you didn't find a "full chain", either the bug was worth nothing, or you felt like it wasn't paid properly.. 5/🧵
English
3
0
3
1.4K
Brolly
Brolly@coolbrolly·
@sirdarckcat Things happen. All normal in life. I am wondering why newer/younger/weird canonical IDs (1337, 1338 and others) would allegedly exist. What is the intention here? Burning the bridge for discussions? Typo? Mistriage? Personal benefits? Thx.
English
0
0
0
37
Brolly
Brolly@coolbrolly·
@sirdarckcat That is an interesting comparison. Cool. Hasn't Triage at several Google VRP's started already to believe so? The grass is green, the flowers are coloured, and the justification for not being a security vulnerability only minds the tiny ants between the grass blades.
English
0
0
0
30
Eduardo Vela
Eduardo Vela@sirdarckcat·
But everyday people also don't know how to differentiate a valid from an invalid bug. LLMs "kindof" know, but given enough encouragement they'll tell me the sky is white and the clouds are blue.. until I start to believe that too! 9/🧵
Eduardo Vela tweet media
English
2
0
4
1.1K