Aman Rawat

90 posts

Aman Rawat banner
Aman Rawat

Aman Rawat

@theamanrawat

...

India Katılım Ekim 2017
350 Takip Edilen614 Takipçiler
Aman Rawat retweetledi
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
We cut LLM costs by 59% with prompt caching on Neo. Key moves: → 3 breakpoints with deliberate TTLs → Moved dynamic content out of the prefix to the tail → Stable templates, byte-identical across all users → Provider routing for cache locality 7% to 84% cache hit rate. Full breakdown: projectdiscovery.io/blog/how-we-cu…
English
0
9
23
2.3K
Aman Rawat retweetledi
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
Finding vulns is getting easier. But proving them is still the hard part. We ran Neo against popular open source repos and got back 22 confirmed CVEs (auth bypasses, RCEs, sandbox escapes) each with working exploits and real evidence. New blog breaks down 5 of the most interesting findings 👉 projectdiscovery.io/blog/everyone-… Heading to #RSAC? Try Neo yourself at Booth 3131 → projectdiscovery.io/events/rsac-20…
ProjectDiscovery tweet media
English
0
16
100
13.1K
Aman Rawat retweetledi
pwnmachine 👾
pwnmachine 👾@princechaddha·
After our last experiment scanning vibe-coded apps, we turned Neo loose on popular and trending open-source projects over the past few weeks. Neo found 50+ bugs with 22 already assigned CVEs. It’s becoming clear that finding bugs with LLMs isn’t the real challenge validation and noise reduction are. That’s where Neo stands out, delivering production-ready results with under 10% false positives and continuously improving
pwnmachine 👾 tweet media
English
1
3
16
1.8K
Aman Rawat retweetledi
pwnmachine 👾
pwnmachine 👾@princechaddha·
How Neo found an SSRF vulnerability in Faraday.. 👾
pwnmachine 👾 tweet media
English
1
5
30
4.6K
Aman Rawat retweetledi
pwnmachine 👾
pwnmachine 👾@princechaddha·
We built three full-stack apps using Claude Code, Codex, and Cursor - a healthcare portal, a banking platform, and an insurance claims system. The prompts were casual, exactly how people actually vibe code. No mention of security, nothing intentionally broken. Then we threw four security scanners at them Neo, Claude, Invicti and Snyk and manually verified every single finding. The results genuinely surprised us. 70 exploitable vulnerabilities across three apps. Unlimited money creation in the banking app. Any user could create admin accounts in the insurance platform. Patient records accessible to anyone in the healthcare portal. All Critical and High severity. All shipped out of the box. But what really got me was the scanner gap. Neo found 62 of 70 vulnerabilities with only 5 false positives. Snyk found literally zero valid issues. The difference between these tools isn't incremental it's the difference between finding the bugs that matter and walking away with a false sense of security. Full blog with the stats is live. The detailed research paper with exact prompts, methodology, all the findings, and the apps themselves is coming soon.
pwnmachine 👾 tweet media
English
35
41
404
46.7K
Aman Rawat
Aman Rawat@theamanrawat·
I've achieved the 3rd rank on @SynackRedTeam in the last 30 days in India!
Aman Rawat tweet media
English
2
0
55
4.2K
Aman Rawat retweetledi
ProjectDiscovery
ProjectDiscovery@pdiscoveryio·
⏰ It's new docs time! 📝 ProjectDiscovery has updated our docs site and it's 😍. check it out here: buff.ly/3ua7qbN
English
0
3
10
3.2K
Prateek Tiwari
Prateek Tiwari@prateek_0490·
Hello, CTF Lovers! We conducted an internal CTF competition at @zomato, and we're considering making it public to everyone to have some fun in solving some brain-twisting stuff. Let us know in this thread if any of you would be interested in participating. #ctf #infosec
English
129
14
285
59.7K
Hax
Hax@Madara_Hax0r·
@theamanrawat can you provide a poc for this cve since its old now
English
1
0
0
57