PentesterLab's Avatar

PentesterLab

@pentesterlab.com

We make learning web hacking and security easier. Online systems, code review, videos & courses that can be used to understand, test and exploit bugs!

725
Followers
0
Following
132
Posts
11.11.2024
Joined
Posts Following

Latest posts by PentesterLab @pentesterlab.com

Preview
How "Strengthening Crypto" Broke Authentication: FreshRSS and bcrypt's 72-Byte Limit As part of our CVE monitoring, we came across GHSA-pcq9-mq6m-mvmp (CVE-2025-68402), an authentication bypass in FreshRSS, a self-hosted RSS aggregator. It ...

A commit meant to "strengthen the crypto" in FreshRSS ended up removing the need for a correct password.

Why?
Longer SHA-256 nonce + bcrypt truncation at 72 bytes.

A nice example of why secure systems are about composition, not just stronger primitives.

pentesterlab.com/blog/freshrs...

10.03.2026 08:54 ๐Ÿ‘ 10 ๐Ÿ” 5 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 1
Preview
CVE-2026-29000: Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key CodeAnt AI found a critical authentication bypass in pac4j-jwt where an attacker can impersonate any user using only the RSA public key. Full PoC and disclosure.

โ›“๏ธโ€๐Ÿ’ฅ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—•๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ถ๐—ป ๐—ฝ๐—ฎ๐—ฐ๐Ÿฐ๐—ท
Another issue with a library leveragining JWT: www.codeant.ai/security-res....

08.03.2026 21:01 ๐Ÿ‘ 2 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Vibe Security Radar Tracking the security cost of vibe coding

๐Ÿ˜Ž ๐—ฉ๐—ถ๐—ฏ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฅ๐—ฎ๐—ฑ๐—ฎ๐—ฟ
A cool little project to track the security issues created by vibe coding: vibe-radar-ten.vercel.app.

08.03.2026 21:01 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
The MCP AuthN/Z Nightmare ยท Doyensec's Blog The MCP AuthN/Z Nightmare

โœจ ๐—ง๐—ต๐—ฒ ๐— ๐—–๐—ฃ ๐—”๐˜‚๐˜๐—ต๐—ก/๐—ญ ๐—ก๐—ถ๐—ด๐—ต๐˜๐—บ๐—ฎ๐—ฟ๐—ฒ
A reminder of the mess AuthN/Z with MCP is: blog.doyensec.com/2026/03/05/m....

08.03.2026 21:01 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
mitmproxy for fun and profit: Interception and Analysis of Application mitmproxy for fun and profit: Interception and Analysis of Application

๐Ÿšฅ ๐—บ๐—ถ๐˜๐—บ๐—ฝ๐—ฟ๐—ผ๐˜…๐˜† ๐—ณ๐—ผ๐—ฟ ๐—ณ๐˜‚๐—ป ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ฟ๐—ผ๐—ณ๐—ถ๐˜: ๐—œ๐—ป๐˜๐—ฒ๐—ฟ๐—ฐ๐—ฒ๐—ฝ๐˜๐—ถ๐—ผ๐—ป ๐—ฎ๐—ป๐—ฑ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€ ๐—ผ๐—ณ ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ฟ๐—ฎ๐—ณ๐—ณ๐—ถ๐—ฐ
A write-up on how to use mitmproxy: www.synacktiv.com/en/publicati....

08.03.2026 21:01 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿญ๐Ÿฌ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
A great mix of content this week!

๐Ÿ”’ ๐—œ๐—ฟ๐—ผ๐—ป๐—–๐˜‚๐—ฟ๐˜๐—ฎ๐—ถ๐—ป: ๐—” ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐—น ๐—”๐—œ ๐—”๐˜€๐˜€๐—ถ๐˜€๐˜๐—ฎ๐—ป๐˜ ๐—•๐˜‚๐—ถ๐—น๐˜ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ณ๐—ฟ๐—ผ๐—บ ๐˜๐—ต๐—ฒ ๐—š๐—ฟ๐—ผ๐˜‚๐—ป๐—ฑ ๐—จ๐—ฝ
Niels Provos (from OpenBSD's systrace) is sharing a new tool to sandbox your AI assistant: www.provos.org/p/ironcurtai....

08.03.2026 21:01 ๐Ÿ‘ 4 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
vinext: Vibe-Hacking Cloudflare's Vibe-Coded Next.js Replacement Cloudflare built a Next.js replacement in a week with AI for $1100. We pointed Hacktron at it to find what the tests missed.

โ›ˆ๏ธ ๐˜ƒ๐—ถ๐—ป๐—ฒ๐˜…๐˜: ๐—ฉ๐—ถ๐—ฏ๐—ฒ-๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐—–๐—น๐—ผ๐˜‚๐—ฑ๐—ณ๐—น๐—ฎ๐—ฟ๐—ฒ'๐˜€ ๐—ฉ๐—ถ๐—ฏ๐—ฒ-๐—–๐—ผ๐—ฑ๐—ฒ๐—ฑ ๐—ก๐—ฒ๐˜…๐˜.๐—ท๐˜€ ๐—ฅ๐—ฒ๐—ฝ๐—น๐—ฎ๐—ฐ๐—ฒ๐—บ๐—ฒ๐—ป๐˜
It's raining bugs in the cloud. A great example of agent capabilities on a never-seen-before target: www.hacktron.ai/blog/hacking....

01.03.2026 23:58 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
100+ Kernel Bugs in 30 Days High-Scale Driver Vulnerability Research with Agent Swarms

๐ŸชŸ ๐Ÿญ๐Ÿฌ๐Ÿฌ+ ๐—ž๐—ฒ๐—ฟ๐—ป๐—ฒ๐—น ๐—•๐˜‚๐—ด๐˜€ ๐—ถ๐—ป ๐Ÿฏ๐Ÿฌ ๐——๐—ฎ๐˜†๐˜€
Behind the (impressive) result, the methodology is probably the most important. Make sure you read between the lines: substack.com/home/post/p-....

01.03.2026 23:58 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Browser-Based Port Scanning in the Age of LNA

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿต, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
Mostly AI...

๐Ÿ’ป ๐—•๐—ฟ๐—ผ๐˜„๐˜€๐—ฒ๐—ฟ-๐—•๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฃ๐—ผ๐—ฟ๐˜ ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐˜๐—ต๐—ฒ ๐—”๐—ด๐—ฒ ๐—ผ๐—ณ ๐—Ÿ๐—ก๐—”
Leveraging Local Network Access to create a port scanner! wiki.notveg.ninja/tools/lna-po....

01.03.2026 23:58 ๐Ÿ‘ 2 ๐Ÿ” 3 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
PentesterLab: Learn with our JavaScript Code Review The JavaScript Code Review Badge is our badge dedicated to security code review in JavaScript. It covers the discovery of weaknesses and vulnerabilities using source code review.

6 new code review labs just dropped ๐Ÿš€
+3 for JavaScript Code Review
+3 for Python Code Review

JS: pentesterlab.com/badges/javas...

Python: pentesterlab.com/badges/pytho...

28.02.2026 04:03 ๐Ÿ‘ 5 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CVE Archeologist's field guide
Methodology and Lessons from 10 Vulnerability Analyses 
Written by Louis Nyffenegger

CVE Archeologist's field guide Methodology and Lessons from 10 Vulnerability Analyses Written by Louis Nyffenegger

As I mentioned last week I ordered some books (which got delivered this week)
CVE ARCHEOLOGIST'S FIELD GUIDE by Louis Nyffenegger @pentesterlab.com

28.02.2026 00:15 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Using threat modeling and prompt injection to audit Comet Trail of Bits used ML-centered threat modeling and adversarial testing to identify four prompt injection techniques that could exploit Perplexityโ€™s Comet browser AI assistant to exfiltrate private Gma...

๐Ÿค– ๐—จ๐˜€๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—บ๐—ผ๐—ฑ๐—ฒ๐—น๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ฝ๐—ฟ๐—ผ๐—บ๐—ฝ๐˜ ๐—ถ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ผ ๐—ฎ๐˜‚๐—ฑ๐—ถ๐˜ ๐—–๐—ผ๐—บ๐—ฒ๐˜
The team at Trail of Bits is sharing some key learnings from their audit of Comet (AI browser) blog.trailofbits.com/2026/02/20/u....

22.02.2026 22:16 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
HeroDevs Blog | CVE-2026-0603: Second-Order SQL Injection in Hibernate UPDATE/DELETE (InlineIdsOrClauseBuilder) CVE-2026-0603 is a high-severity second-order SQL injection vulnerability in Hibernate ORM caused by unsafe ID inlining during UPDATE and DELETE operations. Learn impact, root cause, and remediation.

โ˜•๏ธ ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ-๐Ÿฌ๐Ÿฒ๐Ÿฌ๐Ÿฏ: ๐—ฆ๐—ฒ๐—ฐ๐—ผ๐—ป๐—ฑ-๐—ข๐—ฟ๐—ฑ๐—ฒ๐—ฟ ๐—ฆ๐—ค๐—Ÿ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—›๐—ถ๐—ฏ๐—ฒ๐—ฟ๐—ป๐—ฎ๐˜๐—ฒ ๐—จ๐—ฃ๐——๐—”๐—ง๐—˜/๐——๐—˜๐—Ÿ๐—˜๐—ง๐—˜ (๐—œ๐—ป๐—น๐—ถ๐—ป๐—ฒ๐—œ๐—ฑ๐˜€๐—ข๐—ฟ๐—–๐—น๐—ฎ๐˜‚๐˜€๐—ฒ๐—•๐˜‚๐—ถ๐—น๐—ฑ๐—ฒ๐—ฟ)
A bit of a stretch but an interesting insight into Hibernate: www.herodevs.com/blog-posts/c....

22.02.2026 22:16 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Vulnerability Disclosure: JWT Authentication Bypass in OpenID Connect Authenticator for Tomcat โ€“ Insinuator.net

๐Ÿ˜ฑ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐——๐—ถ๐˜€๐—ฐ๐—น๐—ผ๐˜€๐˜‚๐—ฟ๐—ฒ: ๐—๐—ช๐—ง ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—•๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐—ถ๐—ป ๐—ข๐—ฝ๐—ฒ๐—ป๐—œ๐—— ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜ ๐—”๐˜‚๐˜๐—ต๐—ฒ๐—ป๐˜๐—ถ๐—ฐ๐—ฎ๐˜๐—ผ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ง๐—ผ๐—บ๐—ฐ๐—ฎ๐˜
The exact same vulnerability I found in HarbourJWT but in a much cooler target, still not fixed... insinuator.net/2026/02/jwt-....

22.02.2026 22:16 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Almost Impossible: Java Deserialization Through Broken Crypto in OpenText Directory Services โ€บ Searchlight Cyber Introduction We recently found ourselves looking into OpenText Directory Services (OTDS). We had seen it present on our customer's attack surface, and it seemed to be an interesting target. OTDS is a ...

โ˜•๏ธ ๐—”๐—น๐—บ๐—ผ๐˜€๐˜ ๐—œ๐—บ๐—ฝ๐—ผ๐˜€๐˜€๐—ถ๐—ฏ๐—น๐—ฒ: ๐—๐—ฎ๐˜ƒ๐—ฎ ๐——๐—ฒ๐˜€๐—ฒ๐—ฟ๐—ถ๐—ฎ๐—น๐—ถ๐˜‡๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต ๐—•๐—ฟ๐—ผ๐—ธ๐—ฒ๐—ป ๐—–๐—ฟ๐˜†๐—ฝ๐˜๐—ผ ๐—ถ๐—ป ๐—ข๐—ฝ๐—ฒ๐—ป๐—ง๐—ฒ๐˜…๐˜ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€
What an adventure in Java Deserialisation... slcyber.io/research-cen....

22.02.2026 22:16 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
CTFtime.org / justCTF [*] 2020 / Go-fs / Writeup CTF writeups, Go-fs

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿด, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
Java x2, Go, JWT and a sprinkling of AI

๐Ÿฆซ ๐—–๐—ง๐—™๐˜๐—ถ๐—บ๐—ฒ.๐—ผ๐—ฟ๐—ด / ๐—ท๐˜‚๐˜€๐˜๐—–๐—ง๐—™ [*] ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฌ / ๐—š๐—ผ-๐—ณ๐˜€ / ๐—ช๐—ฟ๐—ถ๐˜๐—ฒ๐˜‚๐—ฝ
A cool Golang quirk via an unintended CTF solution ctftime.org/writeup/25852.

22.02.2026 22:16 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

New lab: CVE-2026-24895 โ€” FrankenPHP Path Confusion RCE (Unicode)

People think "lowercase it" is harmless. In Unicode itโ€™s not.

Case folding can do weird mappings (Turkish i, Kelvin signโ€ฆ), and sometimes worse: UTF-8 byte length changes.

Hands-on lab: pentesterlab.com/exercises/cv...

16.02.2026 01:13 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Trailing Danger: exploring HTTP Trailer parsing discrepancies Trailing Danger: exploring HTTP Trailer parsing discrepancies

๐Ÿš› ๐—ง๐—ฟ๐—ฎ๐—ถ๐—น๐—ถ๐—ป๐—ด ๐——๐—ฎ๐—ป๐—ด๐—ฒ๐—ฟ: ๐—ฒ๐˜…๐—ฝ๐—น๐—ผ๐—ฟ๐—ถ๐—ป๐—ด ๐—›๐—ง๐—ง๐—ฃ ๐—ง๐—ฟ๐—ฎ๐—ถ๐—น๐—ฒ๐—ฟ ๐—ฝ๐—ฎ๐—ฟ๐˜€๐—ถ๐—ป๐—ด ๐—ฑ๐—ถ๐˜€๐—ฐ๐—ฟ๐—ฒ๐—ฝ๐—ฎ๐—ป๐—ฐ๐—ถ๐—ฒ๐˜€
Probably one of the lesser-known features of HTTP... Trailers. This post provides details on the feature and explains how they can be leveraged to find security issues. www.sebsrt.xyz/blog/trailin....

16.02.2026 01:13 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
RCE in Google's AI code editor Antigravity - $10000 Bounty Hacktron AI Research Team discovered a critical RCE in Googleโ€™s Antigravity IDE that lets attackers take over your system just by opening a malicious website.

๐Ÿค– ๐—ฅ๐—–๐—˜ ๐—ถ๐—ป ๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ'๐˜€ ๐—”๐—œ ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐—ฒ๐—ฑ๐—ถ๐˜๐—ผ๐—ฟ ๐—”๐—ป๐˜๐—ถ๐—ด๐—ฟ๐—ฎ๐˜ƒ๐—ถ๐˜๐˜† - $๐Ÿญ๐Ÿฌ๐Ÿฌ๐Ÿฌ๐Ÿฌ ๐—•๐—ผ๐˜‚๐—ป๐˜๐˜†
A detailed blog post on hacking Antigravity with a lot of interesting details on its inner workings. www.hacktron.ai/blog/hacking....

16.02.2026 01:13 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐Ÿคบ ๐—ช๐—ต๐—ฒ๐—ป ๐—ง๐˜„๐—ผ ๐—ฃ๐—ฎ๐—ฟ๐˜€๐—ฒ๐—ฟ๐˜€ ๐——๐—ถ๐˜€๐—ฎ๐—ด๐—ฟ๐—ฒ๐—ฒ: ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ถ๐—ป๐—ด ๐—ค๐˜‚๐—ฒ๐—ฟ๐˜† ๐—ฆ๐˜๐—ฟ๐—ถ๐—ป๐—ด ๐——๐—ถ๐—ณ๐—ณ๐—ฒ๐—ฟ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ซ๐—ฆ๐—ฆ
If you enjoy parser differential issues, you are going to love this exploit. Don't think "It's a CTF challenge" or "It's just an XSS", read between the lines to find the real gold. blog.voorivex.team/when-two-par....

16.02.2026 01:13 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Introducing Augustus: Open Source LLM Prompt Injection Tool Explore LLM fingerprinting and its role in exposing vulnerable Ollama servers online to unauthorized access risks.

โš’๏ธ ๐—œ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐—ถ๐—ป๐—ด ๐—”๐˜‚๐—ด๐˜‚๐˜€๐˜๐˜‚๐˜€: ๐—ข๐—ฝ๐—ฒ๐—ป ๐—ฆ๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ ๐—Ÿ๐—Ÿ๐—  ๐—ฃ๐—ฟ๐—ผ๐—บ๐—ฝ๐˜ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ง๐—ผ๐—ผ๐—น
Praetorian is back with another tool (one of their 12 Caesars): Augustus... Make sure you check it out! www.praetorian.com/blog/introdu....

16.02.2026 01:13 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Breaking Down CVE-2026-25049: How TypeScript Types Failed n8n's Security | hetmehta.com Deep technical analysis of CVE-2026-25049: How type confusion bypassed n8n's security patch and why TypeScript types aren't runtime security boundaries

โจ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ธ๐—ถ๐—ป๐—ด ๐——๐—ผ๐˜„๐—ป ๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ-๐Ÿฎ๐Ÿฑ๐Ÿฌ๐Ÿฐ๐Ÿต: ๐—›๐—ผ๐˜„ ๐—ง๐˜†๐—ฝ๐—ฒ๐—ฆ๐—ฐ๐—ฟ๐—ถ๐—ฝ๐˜ ๐—ง๐˜†๐—ฝ๐—ฒ๐˜€ ๐—™๐—ฎ๐—ถ๐—น๐—ฒ๐—ฑ ๐—ป๐Ÿด๐—ป'๐˜€ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†
A great explanation of the recent vulnerabilities impacting n8n. If you are working in security on TypeScript projects, it's a must read. hetmehta.com/posts/n8n-ty....

16.02.2026 01:13 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐—ฅ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐—ช๐—ผ๐—ฟ๐˜๐—ต ๐—ฅ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด - ๐—ช๐—ฒ๐—ฒ๐—ธ ๐Ÿณ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ
Parser Differential, TypeScript and AI

๐Ÿ‘‡

16.02.2026 01:13 ๐Ÿ‘ 3 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work This is what it actually took. From the person who architected and drove Chromeโ€™s Flash deprecation from proposal to the final removal inโ€ฆ

โšก๏ธ ๐—ช๐—ต๐—ฎ๐˜ ๐—ฅ๐—ฒ๐—ฎ๐—น๐—น๐˜† ๐—ž๐—ถ๐—น๐—น๐—ฒ๐—ฑ ๐—™๐—น๐—ฎ๐˜€๐—ต ๐—ฃ๐—น๐—ฎ๐˜†๐—ฒ๐—ฟ: ๐—” ๐—ฆ๐—ถ๐˜…-๐—ฌ๐—ฒ๐—ฎ๐—ฟ ๐—–๐—ฎ๐—บ๐—ฝ๐—ฎ๐—ถ๐—ด๐—ป ๐—ผ๐—ณ ๐——๐—ฒ๐—น๐—ถ๐—ฏ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ฒ ๐—ฃ๐—น๐—ฎ๐˜๐—ณ๐—ผ๐—ฟ๐—บ ๐—ช๐—ผ๐—ฟ๐—ธ
The story of the death of Adobe Flash, a must-read for AppSec practitioners. medium.com/@aglaforge/w....

08.02.2026 22:25 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Discovering Negative-Days with LLM Workflows Itโ€™s no longer just about reverse-engineering n-days. You can detect vulnerabilities in open-source repositories before a CVE is published - or even if theyโ€™re never published. Hereโ€™s how I built an L...

๐Ÿฆ ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด ๐—ก๐—ฒ๐—ด๐—ฎ๐˜๐—ถ๐˜ƒ๐—ฒ-๐——๐—ฎ๐˜†๐˜€ ๐˜„๐—ถ๐˜๐—ต ๐—Ÿ๐—Ÿ๐—  ๐—ช๐—ผ๐—ฟ๐—ธ๐—ณ๐—น๐—ผ๐˜„๐˜€
That's something I toyed with in 2012 (Monitoring repositories for Fun and Profit - Ruxcon 2012), I used basic rules at the time. Obviously, having LLMs is a game changer for this kind of workload: spaceraccoon.dev/discovering-....

08.02.2026 22:25 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Scalable research tooling for agent systems - KnifeCoat Intro Hello neighbours! There is still little literature on designing offensive research systems and the tools that those systems use. Two likely explanations for this are that teams have internal toโ€ฆ

๐Ÿ› ๏ธ ๐—ฆ๐—ฐ๐—ฎ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ฟ๐—ฒ๐˜€๐—ฒ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐˜๐—ผ๐—ผ๐—น๐—ถ๐—ป๐—ด ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—ด๐—ฒ๐—ป๐˜ ๐˜€๐˜†๐˜€๐˜๐—ฒ๐—บ๐˜€
A great post on how to scale tooling for agent: knifecoat.com/Posts/Scalab....

08.02.2026 22:25 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Boost LLM Security: automated Red Teaming at Scale with Promptfoo Find access-control flaws in LLM apps using Promptfoo plugins and strategies.

๐Ÿšจ ๐—”๐—ป ๐—ถ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ผ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—Ÿ๐—Ÿ๐—  ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ฒ๐—ฎ๐—บ๐—ถ๐—ป๐—ด
Promptfoo is a neat tool to add to your red teaming arsenal: blog.nviso.eu/2026/02/05/a....

08.02.2026 22:25 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

โ™ฆ๏ธ ๐—–๐—ผ -๐—ฅ๐—ฒ๐—ฑ๐—ง๐—ฒ๐—ฎ๐—บ: ๐—ข๐—ฟ๐—ฐ๐—ต๐—ฒ๐˜€๐˜๐—ฟ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐˜† ๐—ฎ๐—ป๐—ฑ ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐˜„๐—ถ๐˜๐—ต ๐—Ÿ๐—Ÿ๐—  ๐—”๐—ด๐—ฒ๐—ป๐˜๐˜€
If you are working on a "LLM based hacker", you are going to want to read this: arxiv.org/pdf/2602.02164.

08.02.2026 22:25 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐Ÿค– ๐—˜๐˜ƒ๐—ฎ๐—น๐˜‚๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—บ๐—ถ๐˜๐—ถ๐—ด๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—ด๐—ฟ๐—ผ๐˜„๐—ถ๐—ป๐—ด ๐—ฟ๐—ถ๐˜€๐—ธ ๐—ผ๐—ณ ๐—Ÿ๐—Ÿ๐— -๐—ฑ๐—ถ๐˜€๐—ฐ๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐Ÿฌ-๐—ฑ๐—ฎ๐˜†๐˜€
This section resumes it: "Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models": red.anthropic.com/2026/zero-da....

08.02.2026 22:25 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

๐Ÿคฟ ๐—ฆ๐—ต๐—ฎ๐—ธ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐— ๐—–๐—ฃ ๐—ง๐—ฟ๐—ฒ๐—ฒ: ๐—” ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐——๐—ฒ๐—ฒ๐—ฝ ๐——๐—ถ๐˜ƒ๐—ฒ
You may think "just another MCP bug" but this post is actually worth reading: blog.voorivex.team/shaking-the-....

08.02.2026 22:25 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0