William Bowling

217 posts

William Bowling banner
William Bowling

William Bowling

@wcbowling

Head of Assurance at @zellic_io, a.k.a vakzz when doing bug bounties and CTFs with @pb_ctf - https://t.co/9bjECLAwXg

Tasmania, Australia Katılım Temmuz 2013
416 Takip Edilen6.2K Takipçiler
Sabitlenmiş Tweet
William Bowling
William Bowling@wcbowling·
Here’s a writeup of the recent ExifTool bug (CVE-2021-22204) I discovered while working on the #bugbounty program at @gitlab! Issue was in the DjVu module but can be embedded it most other formats. Make sure to patch GitLab and ExifTool! devcraft.io/2021/05/04/exi…
English
11
257
643
0
William Bowling retweetledi
cts🌸
cts🌸@gf_256·
V12 is now live for open beta. It can: - Find valuable bugs - Generate working, runnable PoC - Generate patch and test the PoC against it In our testing during audits at Zellic, Zenith, and Code4rena we've been consistently impressed. Best of all: it's free. (Don't abuse it!)
cts🌸 tweet media
pashov@pashov

@claudeai Impressive. Very nice. Now do this, but for smart contracts

English
20
75
491
115.3K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
Last month, Zellic researcher @farazsth98 gave an internal talk on pwning Linux kernel. He teased an exploit he'd be submitting to a 0day challenge. Today, @farazsth98 and his teammate just won $40,000 for a Linux kernel 0-day! Congratulations Faith!
Zellic tweet media
Wiz@wiz_io

Team CCC (@u1f383 & @farazsth98): Team CCC dropped a Linux Kernel 0-day vulnerability that won them 3rd place (tied) and $40,000. Clean exploit, big win, and stronger Linux security.

English
2
25
374
36.1K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
Bad auditors miss obvious bugs. We built an AI tool that finds them. Introducing V12: the only autonomous Solidity auditor that actually finds Highs and Criticals. We'll be releasing it for free. V12 finds Crits in Zellic audits, High/Mediums in Cantina, and a bug in Pendle.
Zellic tweet media
English
78
136
725
243.2K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
You’re probably using WebViews wrong. There are a million ways to use a WebView wrong. Properly securing a WebView is hard. In this thread, we’ll cover common vulnerabilities in wallet WebView implementations and the ways to properly secure WebViews.
Zellic tweet media
English
1
39
244
25.2K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
How to spot misleading audit competition metrics Competitions are crowdsourced audits, where auditors compete to find bugs in a set timeframe. Last year, we acquired @code4rena which does these. We've also seen tons of misleading sales pitches. Here's what to watch out for: 🧵
Zellic tweet media
English
12
55
285
114.7K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
With the rise of AI agents, we expect new bugs, but we’ve instead found old bugs in disguise. Let’s look at two old-school bugs we found while looking at elizaOS: • An SSRF allowing internal services to be accessed • An LFI allowing host files to be read Let’s dive in 🧵
Zellic tweet media
English
1
12
72
17.2K
William Bowling retweetledi
kamensec
kamensec@kamensec·
Just completed my 10th audit as a contractor @zellic_io and these are my top favourite things about this place: 1. They have a diverse and deep talent pool. World top Web security, Cosmos, Rust, Golang, MOVE. They have experts in every direction I want to move into (pun definitely unintended). 2. I still get to be independent, get my own clients, work with other teams. This keeps me fresh, accountable, and at the top of my game. 3. Every time I have asked for a specific type of contract, it magically shows up in my schedule. These past 4 months I've done countless bridges (EVM, OP, Cosmos), Client implementations in rust, governance, staking, etc. Keen to see what they throw at me next!
English
4
8
79
7.1K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
What happens when Random() isn’t random? Here’s how popular projects, including Proton Wallet and the Dart SDK were all affected by the same underlying weakness we uncovered in the Dart/Flutter ecosystem. All issues found were responsibly disclosed with the vendors. Let’s go 🧵👇
GIF
English
4
30
151
19.2K
William Bowling retweetledi
Solidity
Solidity@solidity_lang·
✨ Our judges also decided to give a special mention to @wcbowling for his submission in which the bug allows a `multisig` storage variable to be overwritten, allowing the `emergencyWithdraw` function to be called by an attacker. Read @PatrickAlphaC’s thoughts on this submission! soliditylang.org/blog/2024/10/1…
English
2
6
18
11.3K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
Version 0.11.0 of gnark was just released, which fixes two vulnerabilities in the Groth16 backend reported by Zellic (CVE-2024-45039, CVE-2024-45040). These affect the soundness and ZK property of generated proofs. Read on for more details and how to check if you're vulnerable.
Zellic tweet media
English
2
22
132
33K
William Bowling
William Bowling@wcbowling·
@ajxchapman Disabling the sandbox also skips setting RLIMIT_DATA on linux, might be able to detect this by creating buffers until it fails, eg on by box `b=[];try{for(i=0;i<64;i++){b.push(new ArrayBuffer(0x40000000))}}catch(e){}` gives 13 when sandboxed vs 15 without source.chromium.org/chromium/chrom…
English
1
0
17
971
Alex Chapman
Alex Chapman@ajxchapman·
Is anyone aware of ways to detect whether the Chrome sandbox is enabled from an uncompromised renderer? I had assumed timing Mojo call responses would be enough to detect it, but my (basic) tests showed little reliable difference 🤔
English
2
1
12
5K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
Zellic has moved forward to the final voting phase for @arbitrum's Security Council! We ask delegates to vote for Zellic as the Security Council furthers our mission to maximize TVL and extends our commitment to Arbitrum and its ecosystem. Vote here: tally.xyz/gov/arbitrum/c…
English
0
7
26
7.2K
William Bowling retweetledi
perfect blue
perfect blue@pb_ctf·
2023 was another great year for the team! 🎉 Blue Water, a collab between perfect blue and @Water_Paddler, placed 1st in CTFtime globally!🏆 🥇1st place in 6 CTFs 💻Hosted a successful pbctf 2023 In the past, we also placed first in 2020 and 2021.✌ Looking forward to 2024!🎆
perfect blue tweet media
English
1
15
103
28.1K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
The dangers of integer truncation: How the Zellic team found a critical vulnerability in the @AstarNetwork. This bug allowed an attacker to drain certain LP contracts on the Astar-EVM, with no bugs required in the contracts. Read more: 🧵👇
Zellic tweet media
English
3
41
221
72.3K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
Meet Cairo, the native language of Starknet. In this thread we'll: ✅ Introduce Cairo & Starknet ✅ Explore the security features of Cairo ✅ Examine potential pitfalls when writing contracts in Cairo ✅ Give you things to consider when writing secure code Let's dig in👇🧵:
Zellic tweet media
English
5
11
33
11K
Gareth Heyes \u2028
Gareth Heyes \u2028@garethheyes·
Can you use a tagged template string without parentheses to call fetch and pass a cookie? E.g: fetch`/${document.cookie}` This doesn't work. Can you solve it? We've previously blogged about this. Best answer wins an Ebook copy of JavaScript for hackers. leanpub.com/javascriptforh…
English
3
12
56
22.8K
William Bowling
William Bowling@wcbowling·
@joaxcar Potentially use X-SendFile or X-Accel-Redirect for LFI if it goes through a proxy?
English
1
2
14
937
Johan Carlsson
Johan Carlsson@joaxcar·
If I can control response headers on a service, which ones can be abused? Like "Set-Cookie" to set cookies on the domain, "Location" for redirects, and CORS headers to loosen restrictions. What more? The victim is the visitor, I control the response on the target domain. (no XSS)
English
12
2
40
14.3K
William Bowling retweetledi
Zellic
Zellic@zellic_io·
Earlier this morning, @safemoon's Liquidity Pool was compromised and USD 8.9M worth of tokens were withdrawn. After looking at the transaction trace and the recent contract changes, we can tell you what happened:
English
2
6
44
12.9K
William Bowling
William Bowling@wcbowling·
@joaxcar Cheers! Finding a CSP bypass for that one was quite a challenge :D
English
1
0
4
662