Shielder's Avatar

Shielder

@shielder.com

InfoSec boutique. Owning things since 2014. We love to go for the extra mile, where we usually find the best 🦟🐞πŸͺ²πŸͺ³πŸ›πŸœπŸ•· the others miss. Web: https://www.shielder.com Twitter: @ShielderSec Fediverse: @shielder.infosec.exchange

51
Followers
1
Following
32
Posts
12.08.2023
Joined
Posts Following

Latest posts by Shielder @shielder.com

2025 Annual Report – OSTIF.org

Presenting our 2025 annual report! In our report, you’ll see that OSTIF's story and mission are intertwined. OSTIF will continue to fight for open source infrastructure and the privacy rights of users for as many decades as you’ll let us.

Our statement and report link: ostif.org/2025-annual-...

30.01.2026 15:06 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 1
Post image

Love breaking things just to see how they work? πŸ›πŸ”¨

​A @shielder.com delegation is on the ground at @fosdem.org, and we're looking for fellow hackers and security researchers.

​If you are passionate about securing the Open Source world, we definitely need to talk!

31.01.2026 08:29 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 1
Post image

Happy New Year, Hackers! πŸŽ†
We’re looking forward to a 2026 full of crazy exploits, instant patches, and - most importantly - YOU, the amazing human beings behind the screens.

31.12.2025 12:49 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Bootloaders acting weird? πŸ›
If you are at #39c3, catch @shielder.com's own @thezero.org to geek out over bootloader oddities and low-level vulnerabilities.

27.12.2025 13:53 πŸ‘ 0 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Want to learn more about our approach into auditing complex libraries and writing cool exploits?

πŸ—“οΈ: Dec 02

πŸ•—: 20:00 CET

RSVP: luma.com/ostif-meetup...

25.11.2025 09:15 πŸ‘ 2 πŸ” 3 πŸ’¬ 0 πŸ“Œ 1

Attending #theSAS25? Meet @paupu.bsky.social for his PAM pwnage talk!
It won't be recorded and it might *wink wink* contain a cool drop you don't want to miss πŸ‘€

26.10.2025 15:56 πŸ‘ 1 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
RomHack - Job opportunities Check for RomHack sponsor's job opportunities

πŸ‘‹πŸΏ Hackers!

Are you a Red Teaming Wizard πŸ§™πŸΏ looking for a new challenge? @shielder.com is hiring a Red Teaming Lead to join our crew!

More info ⬇️ (share appreciated) #hiring #redteaming
romhack.io/job-opportun...

07.08.2025 19:38 πŸ‘ 2 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

In partnership with @aswf.io, OSTIF and @shielder.com worked on audits of MaterialX and OpenEXR. Our deepest gratitude for this opportunity to work with incredible maintainers and cool projects such as these- read about them at our blogs: ostif.org/materialx-au..., ostif.org/openexr-audi...

31.07.2025 16:03 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Blog post: shielder.com/blog/2025/07...
Reports: github.com/ShielderSec/...

31.07.2025 15:10 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

🚨 New Open Source Audit Alert! 🚨

Shielder, with @ostifofficial.bsky.social & ASWF audited OpenEXR and MaterialX:
πŸ” 11 issues found (1 critical, 3 still to be published)
βœ”οΈ Most fixed, others planned
πŸ—£οΈ ndaprela @smaury.bsky.social @suidpit.bsky.social @thezero.org

Full details in the blog post β¬‡οΈπŸ§΅

31.07.2025 15:09 πŸ‘ 4 πŸ” 4 πŸ’¬ 1 πŸ“Œ 1
Post image

Last week Apple released MacOS 13.4 which contains a fix for a vulnerability @suidpit.bsky.social exploited to escape the Sandbox.
Update now and stay tuned for the technical details!
Ref: support.apple.com/en-us/122373

07.04.2025 08:58 πŸ‘ 9 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Post image

In Lausanne for @1ns0mn1h4ck.bsky.social? Don’t miss the chance to meet our very own @not4nhacker.bsky.social! If you're into cursed OAuth hacking techniques or breaking mobile apps, find a comfy spot -- you might be there for a while!

13.03.2025 09:43 πŸ‘ 7 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Post image

Ship happens- and that's why security audits are an important part of security efforts. We facilitated work on #Karmada thanks to support from the @cncf.io and with auditing performed by @shielder.com. You can now sea the impact of an audit for yourself at ostif.org/karmada-audi...

17.01.2025 17:29 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Shielder - Karmada Security Audit Karmada Security Audit, sponsored by the CNCF (Cloud Native Computing Foundation), facilitated by Open Source Technology Improvement Fund (OSTIF) and performed by Shielder.

🚨 New Open Source Audit Alert! 🚨

Shielder, with @ostifofficial.bsky.social & @cncf.io, audited karmada-io:
πŸ” 6 issues found (1 high, 1 medium, 2 low, 2 info)
βœ”οΈ Most fixed, others planned.
πŸ—£οΈ to @suidpit.bsky.social and @thezero.org

Full details in the blog post!

www.shielder.com/blog/2025/01...

16.01.2025 16:01 πŸ‘ 6 πŸ” 5 πŸ’¬ 0 πŸ“Œ 2
Pizza box with a infosec illustration saying "Cooking delicious exploits since 2014"

Pizza box with a infosec illustration saying "Cooking delicious exploits since 2014"

Stickers, a kway, and a medal

Stickers, a kway, and a medal

Medal saying "10 years of cyber security, still can't fix your printer"

Medal saying "10 years of cyber security, still can't fix your printer"

The best infosec swag in town.
@shielder.com

10.11.2024 23:28 πŸ‘ 5 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

Attending #TheSASCon2024 in the beautiful Bali🏝️?
Make sure not to miss @suidpit.bsky.social's talk about his novel research on the macOS 🍎 sandbox and how to bypass it.
πŸ—“οΈ Wednesday, October 23 - 15:10

22.10.2024 11:02 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Shielder - A Journey From `sudo iptables` To Local Privilege Escalation In this post, we demonstrate two techniques allowing a low privileged user to escalate their privileges to root in case they can run iptables and/or iptables-save as

For the weekend, we gift you with not one, but TWO ways to escalate `sudo iptables` (+ a couple other boring preconditions) into a r00t shell - read how @smaury.bsky.social and @suidpit.bsky.social managed to climb your friendly neighborhood πŸ”₯wall!

www.shielder.com/blog/2024/09...

20.09.2024 13:42 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 1
Post image

Our very own @suidpit.bsky.social will present his novel #macOS research at #TheSAS2024 - if you want to learn more about the macOS sandbox and how to escape it make sure to be in Bali 🏝️ from Oct 22 to Oct 25!
Learn more here: thesascon.com

29.08.2024 08:53 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

During a recent engagement Mindless hacked his way through Vtiger CRM which led to discover a privilege escalation and a SQL injection.
Learn more in the dedicated advisories:
- CVE-2024-42994 #sqli www.shielder.com/advisories/v...
- CVE-2024-42995 #privesc www.shielder.com/advisories/v...

28.08.2024 10:19 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Shielder - Boost Security Audit Boost Security Audit, sponsored by Amazon Web Services (AWS), facilitated by Open Source Technology Improvement Fund (OSTIF) and performed by Shielder.

Back in December 2023 our researchers @thezero.org @suidpit.bsky.social and Mindless performed an audit sponsored by AWS and facilitated by OSTIF on boost.
It resulted in 7 findings and 15 new fuzzers.
The report is now public, check the details here: www.shielder.com/blog/2024/05...

22.05.2024 15:01 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Preview
Introducing SecureDrop Protocol This blog post is a part of a series about our research toward the next generation of the SecureDrop whistleblowing …

In early 2023 we (@thezero.org & @smaury.bsky.social) collaborated with SecureDrop to start designing and prototyping the #E2EE messaging protocol for a future version of SecureDrop.

πŸ“„ blog post: securedrop.org/news/introdu...
πŸ’» poc code: github.com/freedomofpre...

07.05.2024 10:54 πŸ‘ 5 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Preview
Security release: Element Android 1.6.12 Hello, Today we have released a security update of Element Android to address a pair of vulnerabilities. Please upgrade to the new version (1.6.12) at your earliest convenience. The two vulnerabilitie...

Check-out the original blog post by Element too!
element.io/blog/securit...

18.04.2024 09:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Shielder - Element Android CVE-2024-26131, CVE-2024-26132 - Never Take Intents From Strangers A writeup about two intent-based Android vulnerabilities CVE-2024-26131 and CVE-2024-26132 in Element (Matrix).

Exciting news! We've just released a new blog post on mobile app security, where @suidpit.bsky.social and @thezero.org used their intent-fu to discover vulnerabilities (CVE-2024-26131, CVE-2024-26132) in Element, a @matrix.org client for Android. #writeup #CVE
www.shielder.com/blog/2024/04...

18.04.2024 09:29 πŸ‘ 3 πŸ” 3 πŸ’¬ 1 πŸ“Œ 0
Preview
Shielder - Bref Security Audit Bref Security Audit, sponsored by Amazon Web Services (AWS), facilitated by Open Source Technology Improvement Fund (OSTIF) and performed by Shielder.

We recently partnered with the Open Source Technology Improvement Fund (OSTIF) to perform a security audit sponsored by AWS on Bref. The audit resulted in 5 findings promptly addresses by @mnapoli.bsky.social.
The report is now public, check the details here: www.shielder.com/blog/2024/03...

29.03.2024 12:09 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
Post image

Hey hackers - attending #Nullcon? Pop to say hi and talk about AppSec and VR!
You can find @smaury.bsky.social @thezero.org @suidpit.bsky.social around πŸ––πŸΏ

14.03.2024 08:39 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Shielder - pgAdmin (<=8.3) Path Traversal in Session Handling Leads to Unsafe Deserialization and Remote Code Execution (RCE) pgAdmin <= 8.3 is affected by a path-traversal vulnerability while deserializing user's session in the session handling code. If the server is running on Windows, an unauthenticated attacker can load ...

During a recent Red Team Assessment @thezero.org and @smaury.bsky.social discovered a vulnerability in PostgreSQL's #PgAdmin which in the worst case allows unauthenticated attackers to run arbitrary server-side code.

Check out the #RCE advisory and patch now!
www.shielder.com/advisories/p...

08.03.2024 13:55 πŸ‘ 5 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Hey hackers! Are you attending @fosdem.bsky.social?
If you want to talk about open-source software and hardware security make sure to hit up @smaury.bsky.social and @thezero.org!

03.02.2024 04:32 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

TL;DR Product security folks: do not blindly trust the attack requirements shared by the researchers. Security researchers: when testing embedded devices make sure to mimic correctly all their configurations (i.e. the NVRAM content). 7/7

30.01.2024 13:51 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Apparently most of the researchers are either keeping an authentication bypass private or they do their research in emulated environments only and no one ever checked the vulnerabilities before issuing the CVE numbers and releasing the advisories. 6/7

30.01.2024 13:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

After some intense debugging sessions they discovered that not only that one but also a lot of other ASUS routers' vulnerabilities were probably incorrectly deemed as unauthenticated. 5/7

30.01.2024 13:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0