Faav

321 posts

Faav banner
Faav

Faav

@efaav

Developer @ https://t.co/qiMEJOTD1H (& NameMC Extras), Web developer, Bug hunter.

Florida Katılım Kasım 2024
199 Takip Edilen1.1K Takipçiler
Faav retweetledi
YS
YS@YShahinzadeh·
Feb 24, 2026 08:35PM ➜ submited Feb 24, 2026 10:46PM ➜ report was triaged Feb 25, 2026 12:23PM ➜ bug patched Mar 17, 2026 02:55PM ➜ bounty awarded
YS tweet media
English
33
13
553
14.9K
Faav retweetledi
Renwa
Renwa@RenwaX23·
I think I have completed client-side security , just one report: Self-XSS -> Drag-Drop Payload -> Scroll-To-Fragment -> Unchecked postMessage Listener -> Text Injection -> DOM-XSS -> OAuth State Misconfiguration -> Cookie Bomb -> Account Takeover @renwa/iframe-sandbox-bypass-cross-origin-drag-drop-unvalidated-postmessage-origin-cookie-bomb-to-21357a4d94f5" target="_blank" rel="nofollow noopener">medium.com/@renwa/iframe-…
Renwa tweet media
English
11
57
441
18.2K
Faav
Faav@efaav·
@davi1337_ Forgot to reply to this but you are so goated bro 🧧🧧❤️🔥🐐
English
1
0
1
78
Faav retweetledi
Joseph Thacker
Joseph Thacker@rez0__·
The past few days have been the worst triager experience of my life with @Hacker0x01. It legitimately feels like they are intentionally downgrading reports, ignoring reasons for the severity, and not explaining their decisions at all. The last part is the most infuriating.
English
26
12
216
14.6K
Faav retweetledi
Critical Thinking - Bug Bounty Podcast
New research just dropped by @alien2exe on hijacking OAuth popups via predictable window. open() targets. The chain uses iframe name collision forcing the auth flow into a controlled context, eventually linking an attacker-controlled addon to leak workspace PII and config data lab.ctbb.show/research/can-a…
English
0
30
131
6.2K
p4
p4@peeefour·
@efaav @discord_support nah bro i kept replying to my same ticket that the bot said "nah nothing we can do loser". i got like 10 or so of the same message from the nutty automation. until finally a real person saw my ticket and accepted it bc it was truly false ban
English
1
0
2
57
Faav
Faav@efaav·
Its been 4 months and I still haven't been able to be unbanned, if anyone could help or knows anyone who could help please DM me 🙏 @discord_support
Faav@efaav

I was terminated off @discord due to this user editing his messages that I replied to, and then creating mass reports. /: (He did this to a bunch of people)

English
9
3
15
968
Faav retweetledi
YS
YS@YShahinzadeh·
It's time for sharing, this is not a simple write-up, we are sharing our methodology and reasoning, detailing how we approached and hunted the flaw, I hope you like it :] blog.voorivex.team/uxss-on-samsun…
YS tweet media
Omid Rezaei@omidxrz

We got permission from the Samsung Security team to disclose this uXSS that we found in Samsung Browser, it was assigned a CVE (CVE-2025-58485) and patched. Here is the PoC, expect the write-up in the next upcoming days.

English
12
48
287
18.1K
Faav retweetledi
Jorian
Jorian@J0R1AN·
Just a few days later, there's the next blog post for @AikidoSecurity! Another framework-level vulnerability this time affecting Astro, resulting in SSRF if an unvalidated connection can be made to the webserver. Read the details here: aikido.dev/blog/astro-ful…
English
0
15
88
3.4K
Faav
Faav@efaav·
@peeefour @discord_support You just kept appealing under that same appeal category or did you try a different support category?
English
1
0
0
32
p4
p4@peeefour·
@efaav @discord_support nah bro you gotta keep pushing. i got false banned before for some similar weird shit and i thought it was over. but i was like fuck that. i just kept pushing my concern in the discord ticket. i kept getting a bot telling me the same thing. until finally i got unbanned
English
7
0
4
72
Faav retweetledi
NeM0x00
NeM0x00@Yousef39960629·
From a small mistake to make the full control over an internal ticketing system worth $$$$. Checkout my latest writeup: @NeM0x00/from-a-simple-client-side-mistake-to-full-read-write-access-of-an-internal-support-system-ebd40e4588ee" target="_blank" rel="nofollow noopener">medium.com/@NeM0x00/from-… #bugbountytips #bugbounty #bughunting
English
3
14
197
9K
Faav retweetledi
Starstrike AI
Starstrike AI@StarstrikeAI·
We took things further in hacking Gemini, and exfiltrated data via... volume settings! We also present a new technique for data exfiltration in LLM-based systems. Enjoy 🔥 Link in comments:
Starstrike AI tweet media
English
2
8
22
5.2K
Faav
Faav@efaav·
If you haven't already, please check out my blog! blog.faav.net Maybe releasing more soon
Faav tweet media
English
0
2
40
1.6K
Faav
Faav@efaav·
@brutecat How'd I miss this, crazy 🔥🔥
English
0
0
1
89
skull
skull@brutecat·
RCE on Google Cloud, writeup soon! :)
skull tweet media
English
60
119
2.5K
146.4K
Faav retweetledi
Jorian
Jorian@J0R1AN·
My first disclosed vulnerability since joining @AikidoSecurity, and it's a banger! SvelteKit + Vercel = Cache Deception. This shows how AI agents can find framework-level vulnerabilities, and that caching will continue to cause headaches. Enjoy :) aikido.dev/blog/sveltespi…
English
4
19
86
5.3K
Faav retweetledi
pashov
pashov@pashov·
🚨Claude Opus 4.6 wrote vulnerable code, leading to a smart contract exploit with $1.78M loss cbETH asset's price was set to $1.12 instead of ~$2,200. The PRs of the project show commits were co-authored by Claude - Is this the first hack of vibe-coded Solidity code?
pashov tweet media
English
318
562
4.5K
1.7M