hack_n_code's profile picture. Tester of pens, AI prompt connoisseur.  Terrible Speller. All thoughts are my own 💭

Vinay⚡

@hack_n_code

Tester of pens, AI prompt connoisseur. Terrible Speller. All thoughts are my own 💭

Vinay⚡ memposting ulang

💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible. The vulnerability lets…

wiz_io's tweet image. 💥 Wiz Research has uncovered a critical Redis vulnerability that's been hiding for 13 years

We found RediShell (CVE-2025-49844): an RCE bug in Redis that affects every version of Redis out there. It's rated CVSS 10 - the highest severity possible.

The vulnerability lets…

Vinay⚡ memposting ulang
TMTLongShort's tweet image.

Vinay⚡ memposting ulang

every ai app today

rare_jpg's tweet image.


Vinay⚡ memposting ulang

I'm improving my co-hacking AI system (built on Claude Code). One of the coolest new things I added to it was @browserbase's MCP server. It only took 20 seconds to add, and now it can take UI-based actions on any website. Here Claude used it to make a ChatGPT account: 😝

rez0__'s tweet image. I'm improving my co-hacking AI system (built on Claude Code). One of the coolest new things I added to it was @browserbase's MCP server. It only took 20 seconds to add, and now it can take UI-based actions on any website.

Here Claude used it to make a ChatGPT account:
😝

Vinay⚡ memposting ulang

Lavamoat. It was literally built for supply chain attacks. It would've prevented the malicious code from monkey patching globals (`xmlhttprequest`, `fetch`, `window.ethereum`) at runtime. It's free. Tell your favorite dapp dev. npmjs.com/package/@lavam…


Vinay⚡ memposting ulang

treat your code like bonsai, ai makes it grow faster, you have to prune it from time to time to keep its structure and establish the overall design


Vinay⚡ memposting ulang

appsec engineers be like, "surely noone can bypass ssl pinning on iOS, no one can reverse-engineer iOS binaries, no need to ratelimit the mobile API!" lmeow

gf_256's tweet image. appsec engineers be like, "surely noone can bypass ssl pinning on iOS, no one can reverse-engineer iOS binaries, no need to ratelimit the mobile API!" lmeow

Vinay⚡ memposting ulang

WhatsApp 0-day exploited in the wild

h4x0r_dz's tweet image. WhatsApp 0-day exploited in the wild

Vinay⚡ memposting ulang

Prompt engineering feels like doing science experiments, have a variety of inputs their corresponding intended outputs, and come up with a scoring system to evaluate the accuracy, then we slowly work on our prompt to maximize the accuracy score while balancing time + cost.


Vinay⚡ memposting ulang

Novel jailbreak discovered. Not only does OpenAi putting your name in the system prompt impact the way GPT responds, but it also opens the model up to a prompt INSERTION. Not injection. You can insert a trigger into the actual system prompt, which makes it nigh indefensible.

LLMSherpa's tweet image. Novel jailbreak discovered.

Not only does OpenAi putting your name in the system prompt impact the way GPT responds, but it also opens the model up to a prompt INSERTION.

Not injection.

You can insert a trigger into the actual system prompt, which makes it nigh indefensible.
LLMSherpa's tweet image. Novel jailbreak discovered.

Not only does OpenAi putting your name in the system prompt impact the way GPT responds, but it also opens the model up to a prompt INSERTION.

Not injection.

You can insert a trigger into the actual system prompt, which makes it nigh indefensible.

Vinay⚡ memposting ulang

AI agents that can browse the Web and perform tasks on your behalf have incredible potential but also introduce new security risks. We recently found, and disclosed, a concerning flaw in Perplexity's Comet browser that put users' accounts and other sensitive info in danger.

brave's tweet image. AI agents that can browse the Web and perform tasks on your behalf have incredible potential but also introduce new security risks.

We recently found, and disclosed, a concerning flaw in Perplexity's Comet browser that put users' accounts and other sensitive info in danger.

Vinay⚡ memposting ulang

When you make money, the first thing you have to do is "fix your health issues." All other things can wait.


Vinay⚡ memposting ulang

I recently discovered a critical race condition vulnerability at a multi-million dollar investment firm! The vulnerability allowed attackers to execute a single-packet attack that bypassed financial controls, potentially enabling: ✅ Purchasing stocks worth twice the available…


Vinay⚡ memposting ulang

Just published my first blog post "Cache Deception + CSPT: Turning Non Impactful Findings into Account Takeover" You can read the full write-up here: zere.es/posts/cache-de…


Vinay⚡ memposting ulang

🚨 You Forgot, I Remembered: Mass DNS Takeovers and Thousands at Risk Over 40,000 domains on DigitalOcean’s Cloud DNS were taken over using serverless automation & OSINT. Full research 👇 smaranchand.com.np/2025/07/you-fo… #CloudSecurity #DNS #DigitalOcean #AppSec #BugBounty


Vinay⚡ memposting ulang

we're never getting AGI

sporadicalia's tweet image. we're never getting AGI

Vinay⚡ memposting ulang

Vibe-coded AI startup 2025

Hesamation's tweet image. Vibe-coded AI startup 2025

Vinay⚡ memposting ulang

😭😭😭😭😭😭😭

newbie_567's tweet image. 😭😭😭😭😭😭😭

Vinay⚡ memposting ulang

🕵️‍♂️ 🎩 The desync endgame has just begun. New expert lab has just dropped. Straight from @albinowax’s #BHUSA talk: Understand the latest request smuggling techniques, sharpen your skills, unlock new bounties, and solidify your organization’s defenses with the new expert lab ⬇️…

PortSwigger's tweet image. 🕵️‍♂️ 🎩 The desync endgame has just begun. New expert lab has just dropped.

Straight from @albinowax’s #BHUSA talk: Understand the latest request smuggling techniques, sharpen your skills, unlock new bounties, and solidify your organization’s defenses with the new expert lab ⬇️…

Vinay⚡ memposting ulang

🚨 One container in Amazon ECS can now hijack all others’ AWS creds on the same EC2 host. Researchers exposed a stealthy privilege escalation chain called ECScape — no exploit, just abusing AWS internals. Amazon: "Working as designed." Details → thehackernews.com/2025/08/resear…

TheHackersNews's tweet image. 🚨 One container in Amazon ECS can now hijack all others’ AWS creds on the same EC2 host.

Researchers exposed a stealthy privilege escalation chain called ECScape — no exploit, just abusing AWS internals.

Amazon: "Working as designed."

Details → thehackernews.com/2025/08/resear…

Loading...

Something went wrong.


Something went wrong.