vulnX

961 posts

vulnX banner
vulnX

vulnX

@vuln_X

Not just hunting bugs — sharing the map. 🗺️ Daily appsec resources, bug bounty tips, tools & writeups to level up your security game 🕵️‍♂️ @vuln_X

Katılım Şubat 2021
281 Takip Edilen7.3K Takipçiler
Logan Sec
Logan Sec@LoganOpSec·
@vuln_X This is exactly why IDOR testing shouldn’t stop at user_id=123. Test nested objects, arrays, duplicated keys, JSON type changes, and places where auth checks one value but the backend logic later trusts another. That mismatch is where the real bugs show up.
English
1
0
1
103
vulnX
vulnX@vuln_X·
Bug Bounty tip 🧵 Don't just swap IDs — wrap them. ❌ {"Account": 1111} ✅ {"Account": {"Account": 3333}} Auth validates the outer key. Business logic executes the inner one. Scanners miss it. You won't. #BugBounty #IDOR #APIHacking
English
1
29
159
4.5K
vulnX
vulnX@vuln_X·
@ZackKorman @rez0__ Frustration with vendors is real—but dropping sensitive details publicly only harms users. That’s not accountability, that’s recklessness. Calling it out like @rez0__ did is absolutely valid.
English
0
0
2
138
Zack Korman
Zack Korman@ZackKorman·
Security people: This behavior is completely unacceptable. I don't care that you sent a few emails and got ignored. You don't get to drop this info publicly and put these users at greater risk. He's been called out by multiple people (@rez0__) and is doubling down. Not cool.
Zack Korman tweet media
English
49
13
252
75.4K
impulsive
impulsive@weezerOSINT·
this man called me blackhat on his timeline to 71k people. in the dms he told me he's "not claiming i released some secret technique" so which is it? he had the platform to help get this fixed. contact the company, escalate the report, connect me with the right people. instead he chose to start a public fight over disclosure timelines and guess what? the company rotated the key. 25 days of private emails got nothing. one public tweet got it fixed. Joseph Thacker you know what you was doing when you made this post, you are a grown man instigating tl wars isn't there anything else you could be doing with your time right now?
impulsive tweet mediaimpulsive tweet media
English
19
5
182
32.5K
TESS
TESS@ArmanSameer95·
🧵 Absolutely not worried about any Anthropic update at all, here’s why. There’s a pattern with Anthropic releases: • Users report drops in reasoning + benchmark performance • Outputs get shorter / lower-effort by default • Behavior shifts due to hidden changes (system prompts, caching, etc.) Then the explanation is always the same: “Not a downgrade — just settings, cost/latency tradeoffs, or prompting.” But from a user POV, if each update requires more effort to get the same quality, that is degradation. The real issue isn’t just the model — it’s the growing gap between advertised capability and default experience.
Claude@claudeai

Claude Security is now in public beta for Claude Enterprise customers. Claude scans your codebase for vulnerabilities, validates each finding to cut false positives, and suggests patches you can review and approve.

English
2
0
27
1.7K
vulnX
vulnX@vuln_X·
→ POST /register → arbitrary redirect_uri accepted? → state param → does it encode redirect_uri? decode it. → send captured SaaS-layer URL to different browser → does it work? → MCP token → JWT? decode for raw credentials. → consent cookie → __Host- prefix missing?
English
0
0
0
113
vulnX
vulnX@vuln_X·
4/5) State-session binding? Bypassable. Cookie is anonymous — anyone generates one. No __Host- = injectable via subdomain XSS. SameSite=Lax doesn't block top-level navigation. Inject your cookie → state validates → code is yours.
English
1
0
0
118
vulnX
vulnX@vuln_X·
🧵 How I'd 1-Click Takeover Any MCP OAuth Proxy — And Why PKCE Is Irrelevant👇
English
1
0
1
354
Insider Wire
Insider Wire@InsiderWire·
#BREAKING: Anthropic’s AI coding agent ‘Claude’ reportedly wiped a company’s production database and backups in 9 seconds.
English
364
944
7.7K
1.2M
vulnX
vulnX@vuln_X·
If an app fetched PDFs via ?url=http://internal.corp/file.pdf — classic SSRF setup. Bypass? Enumerate internal PDF subdomains. Swap the file ID → other users' docs. SSRF + IDOR chained. 🔥 #bugbounty #SSRF
English
0
2
10
622
Jenish Sojitra
Jenish Sojitra@_jensec·
One way to deal with AI spam reports would be to make program private with limited researchers and keep VDP only public. I know a couple of program managers are already considering this
English
8
1
97
5.9K
vulnX
vulnX@vuln_X·
A hostname that returns NXDOMAIN publicly isn't necessarily dead. Internal DNS resolvers may still serve it perfectly. internal-api.corp → NXDOMAIN externally internal-api.corp via SSRF → valid HTTP response 💀 Never skip non-resolvable hostnames in your SSRF payload list.
English
0
0
2
286
vulnX
vulnX@vuln_X·
Always grab the Swagger/OpenAPI spec first. /swagger/v1/swagger.json Some with no auth. That's not documentation — that's a treasure map. curl -s "target.com/swagger/v1/swa…" | wc -c Know your surface before you test it. 🗺️ #BugBounty #recon
English
0
4
17
1.2K