๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ญ๐ฏ, ๐ฎ๐ฌ๐ฎ๐ฒ
Only one entry but definitely worth reading!
โ๏ธ ๐ฅ๐ฒ๐บ๐ผ๐๐ฒ ๐๐ผ๐บ๐บ๐ฎ๐ป๐ฑ ๐๐
๐ฒ๐ฐ๐๐๐ถ๐ผ๐ป ๐ถ๐ป ๐๐ผ๐ผ๐ด๐น๐ฒ ๐๐น๐ผ๐๐ฑ ๐๐ถ๐๐ต ๐ฆ๐ถ๐ป๐ด๐น๐ฒ ๐๐ถ๐ฟ๐ฒ๐ฐ๐๐ผ๐ฟ๐ ๐๐ฒ๐น๐ฒ๐๐ถ๐ผ๐ป
This one is a real tour de force: flatt.tech/research/pos....
Posts by PentesterLab
๐งโ๐ Learning of the day for me, once again thanks to @pentesterlab.com (for the presentation of the behavior and the code review lab) and Claude (for the detailed explanation).
#appsec #appsecurity
๐ ๐๐ง๐ ๐ถ๐ ๐ฑ๐ฒ๐ฎ๐ฑ*
A good rant on the impact of AI on CTF... k3ng.xyz/blog/ctf-is-....
๐ง ๐ฆ๐ฎ๐๐ต๐ถ๐ธ๐ผ
Sashiko is an agentic Linux kernel code review system that monitors public mailing lists to thoroughly evaluate proposed Linux kernel changes. sashiko.dev.
๐ ๏ธ ๐๐๐ผ๐ธ๐ฒ๐๐๐ โ ๐ฆ๐ผ๐น๐๐ถ๐ป๐ด ๐๐ต๐ฒ ๐ฉ๐ฒ๐ป๐ฑ๐ผ๐ฟ ๐๐ฒ๐ฝ๐ฒ๐ป๐ฑ๐ฒ๐ป๐ฐ๐ ๐ฃ๐ฟ๐ผ๐ฏ๐น๐ฒ๐บ ๐ถ๐ป ๐ฅ๐
Reversing Java and C# applications just became a lot easier thanks to the SearchLight Cyber team (ex: Assetnote): slcyber.io/research-cen....
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ญ๐ฎ, ๐ฎ๐ฌ๐ฎ๐ฒ
AI doing research, AI killing CTF
๐ค ๐ง๐ฒ๐๐๐ถ๐ป๐ด ๐๐ ๐ณ๐ผ๐ฟ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต: ๐ฐ ๐๐ฝ๐ฝ๐ฟ๐ผ๐ฎ๐ฐ๐ต๐ฒ๐ & ๐ช๐ต๐ฒ๐ฟ๐ฒ ๐ ๐๐ฎ๐ถ๐น๐ฒ๐ฑ
If you can only read one thing this week, make it this article: xclow3n.github.io/post/7.
Example of execution.
๐งโ๐ Learning of the day for me thanks to @pentesterlab.com (for the presentation of the behavior and the code review lab) and Claude (for the detailed explanation):
#appsec #appsecurity
A commit meant to "strengthen the crypto" in FreshRSS ended up removing the need for a correct password.
Why?
Longer SHA-256 nonce + bcrypt truncation at 72 bytes.
A nice example of why secure systems are about composition, not just stronger primitives.
pentesterlab.com/blog/freshrs...
โ๏ธโ๐ฅ ๐๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐๐๐ฝ๐ฎ๐๐ ๐ถ๐ป ๐ฝ๐ฎ๐ฐ๐ฐ๐ท
Another issue with a library leveragining JWT: www.codeant.ai/security-res....
๐ ๐ฉ๐ถ๐ฏ๐ฒ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฅ๐ฎ๐ฑ๐ฎ๐ฟ
A cool little project to track the security issues created by vibe coding: vibe-radar-ten.vercel.app.
โจ ๐ง๐ต๐ฒ ๐ ๐๐ฃ ๐๐๐๐ต๐ก/๐ญ ๐ก๐ถ๐ด๐ต๐๐บ๐ฎ๐ฟ๐ฒ
A reminder of the mess AuthN/Z with MCP is: blog.doyensec.com/2026/03/05/m....
๐ฅ ๐บ๐ถ๐๐บ๐ฝ๐ฟ๐ผ๐
๐ ๐ณ๐ผ๐ฟ ๐ณ๐๐ป ๐ฎ๐ป๐ฑ ๐ฝ๐ฟ๐ผ๐ณ๐ถ๐: ๐๐ป๐๐ฒ๐ฟ๐ฐ๐ฒ๐ฝ๐๐ถ๐ผ๐ป ๐ฎ๐ป๐ฑ ๐๐ป๐ฎ๐น๐๐๐ถ๐ ๐ผ๐ณ ๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ง๐ฟ๐ฎ๐ณ๐ณ๐ถ๐ฐ
A write-up on how to use mitmproxy: www.synacktiv.com/en/publicati....
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ญ๐ฌ, ๐ฎ๐ฌ๐ฎ๐ฒ
A great mix of content this week!
๐ ๐๐ฟ๐ผ๐ป๐๐๐ฟ๐๐ฎ๐ถ๐ป: ๐ ๐ฃ๐ฒ๐ฟ๐๐ผ๐ป๐ฎ๐น ๐๐ ๐๐๐๐ถ๐๐๐ฎ๐ป๐ ๐๐๐ถ๐น๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ณ๐ฟ๐ผ๐บ ๐๐ต๐ฒ ๐๐ฟ๐ผ๐๐ป๐ฑ ๐จ๐ฝ
Niels Provos (from OpenBSD's systrace) is sharing a new tool to sandbox your AI assistant: www.provos.org/p/ironcurtai....
โ๏ธ ๐๐ถ๐ป๐ฒ๐
๐: ๐ฉ๐ถ๐ฏ๐ฒ-๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด ๐๐น๐ผ๐๐ฑ๐ณ๐น๐ฎ๐ฟ๐ฒ'๐ ๐ฉ๐ถ๐ฏ๐ฒ-๐๐ผ๐ฑ๐ฒ๐ฑ ๐ก๐ฒ๐
๐.๐ท๐ ๐ฅ๐ฒ๐ฝ๐น๐ฎ๐ฐ๐ฒ๐บ๐ฒ๐ป๐
It's raining bugs in the cloud. A great example of agent capabilities on a never-seen-before target: www.hacktron.ai/blog/hacking....
๐ช ๐ญ๐ฌ๐ฌ+ ๐๐ฒ๐ฟ๐ป๐ฒ๐น ๐๐๐ด๐ ๐ถ๐ป ๐ฏ๐ฌ ๐๐ฎ๐๐
Behind the (impressive) result, the methodology is probably the most important. Make sure you read between the lines: substack.com/home/post/p-....
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ต, ๐ฎ๐ฌ๐ฎ๐ฒ
Mostly AI...
๐ป ๐๐ฟ๐ผ๐๐๐ฒ๐ฟ-๐๐ฎ๐๐ฒ๐ฑ ๐ฃ๐ผ๐ฟ๐ ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ถ๐ป๐ด ๐ถ๐ป ๐๐ต๐ฒ ๐๐ด๐ฒ ๐ผ๐ณ ๐๐ก๐
Leveraging Local Network Access to create a port scanner! wiki.notveg.ninja/tools/lna-po....
6 new code review labs just dropped ๐
+3 for JavaScript Code Review
+3 for Python Code Review
JS: pentesterlab.com/badges/javas...
Python: pentesterlab.com/badges/pytho...
CVE Archeologist's field guide Methodology and Lessons from 10 Vulnerability Analyses Written by Louis Nyffenegger
As I mentioned last week I ordered some books (which got delivered this week)
CVE ARCHEOLOGIST'S FIELD GUIDE by Louis Nyffenegger @pentesterlab.com
๐ค ๐จ๐๐ถ๐ป๐ด ๐๐ต๐ฟ๐ฒ๐ฎ๐ ๐บ๐ผ๐ฑ๐ฒ๐น๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐ฝ๐ฟ๐ผ๐บ๐ฝ๐ ๐ถ๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐ผ ๐ฎ๐๐ฑ๐ถ๐ ๐๐ผ๐บ๐ฒ๐
The team at Trail of Bits is sharing some key learnings from their audit of Comet (AI browser) blog.trailofbits.com/2026/02/20/u....
โ๏ธ ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ฌ๐ฒ๐ฌ๐ฏ: ๐ฆ๐ฒ๐ฐ๐ผ๐ป๐ฑ-๐ข๐ฟ๐ฑ๐ฒ๐ฟ ๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ถ๐ป ๐๐ถ๐ฏ๐ฒ๐ฟ๐ป๐ฎ๐๐ฒ ๐จ๐ฃ๐๐๐ง๐/๐๐๐๐๐ง๐ (๐๐ป๐น๐ถ๐ป๐ฒ๐๐ฑ๐๐ข๐ฟ๐๐น๐ฎ๐๐๐ฒ๐๐๐ถ๐น๐ฑ๐ฒ๐ฟ)
A bit of a stretch but an interesting insight into Hibernate: www.herodevs.com/blog-posts/c....
๐ฑ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐ถ๐๐ฐ๐น๐ผ๐๐๐ฟ๐ฒ: ๐๐ช๐ง ๐๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐๐๐ฝ๐ฎ๐๐ ๐ถ๐ป ๐ข๐ฝ๐ฒ๐ป๐๐ ๐๐ผ๐ป๐ป๐ฒ๐ฐ๐ ๐๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ผ๐ฟ ๐ณ๐ผ๐ฟ ๐ง๐ผ๐บ๐ฐ๐ฎ๐
The exact same vulnerability I found in HarbourJWT but in a much cooler target, still not fixed... insinuator.net/2026/02/jwt-....
โ๏ธ ๐๐น๐บ๐ผ๐๐ ๐๐บ๐ฝ๐ผ๐๐๐ถ๐ฏ๐น๐ฒ: ๐๐ฎ๐๐ฎ ๐๐ฒ๐๐ฒ๐ฟ๐ถ๐ฎ๐น๐ถ๐๐ฎ๐๐ถ๐ผ๐ป ๐ง๐ต๐ฟ๐ผ๐๐ด๐ต ๐๐ฟ๐ผ๐ธ๐ฒ๐ป ๐๐ฟ๐๐ฝ๐๐ผ ๐ถ๐ป ๐ข๐ฝ๐ฒ๐ป๐ง๐ฒ๐
๐ ๐๐ถ๐ฟ๐ฒ๐ฐ๐๐ผ๐ฟ๐ ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ๐
What an adventure in Java Deserialisation... slcyber.io/research-cen....
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ด, ๐ฎ๐ฌ๐ฎ๐ฒ
Java x2, Go, JWT and a sprinkling of AI
๐ฆซ ๐๐ง๐๐๐ถ๐บ๐ฒ.๐ผ๐ฟ๐ด / ๐ท๐๐๐๐๐ง๐ [*] ๐ฎ๐ฌ๐ฎ๐ฌ / ๐๐ผ-๐ณ๐ / ๐ช๐ฟ๐ถ๐๐ฒ๐๐ฝ
A cool Golang quirk via an unintended CTF solution ctftime.org/writeup/25852.
New lab: CVE-2026-24895 โ FrankenPHP Path Confusion RCE (Unicode)
People think "lowercase it" is harmless. In Unicode itโs not.
Case folding can do weird mappings (Turkish i, Kelvin signโฆ), and sometimes worse: UTF-8 byte length changes.
Hands-on lab: pentesterlab.com/exercises/cv...
๐ ๐ง๐ฟ๐ฎ๐ถ๐น๐ถ๐ป๐ด ๐๐ฎ๐ป๐ด๐ฒ๐ฟ: ๐ฒ๐
๐ฝ๐น๐ผ๐ฟ๐ถ๐ป๐ด ๐๐ง๐ง๐ฃ ๐ง๐ฟ๐ฎ๐ถ๐น๐ฒ๐ฟ ๐ฝ๐ฎ๐ฟ๐๐ถ๐ป๐ด ๐ฑ๐ถ๐๐ฐ๐ฟ๐ฒ๐ฝ๐ฎ๐ป๐ฐ๐ถ๐ฒ๐
Probably one of the lesser-known features of HTTP... Trailers. This post provides details on the feature and explains how they can be leveraged to find security issues. www.sebsrt.xyz/blog/trailin....
๐ค ๐ฅ๐๐ ๐ถ๐ป ๐๐ผ๐ผ๐ด๐น๐ฒ'๐ ๐๐ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฒ๐ฑ๐ถ๐๐ผ๐ฟ ๐๐ป๐๐ถ๐ด๐ฟ๐ฎ๐๐ถ๐๐ - $๐ญ๐ฌ๐ฌ๐ฌ๐ฌ ๐๐ผ๐๐ป๐๐
A detailed blog post on hacking Antigravity with a lot of interesting details on its inner workings. www.hacktron.ai/blog/hacking....
๐คบ ๐ช๐ต๐ฒ๐ป ๐ง๐๐ผ ๐ฃ๐ฎ๐ฟ๐๐ฒ๐ฟ๐ ๐๐ถ๐๐ฎ๐ด๐ฟ๐ฒ๐ฒ: ๐๐
๐ฝ๐น๐ผ๐ถ๐๐ถ๐ป๐ด ๐ค๐๐ฒ๐ฟ๐ ๐ฆ๐๐ฟ๐ถ๐ป๐ด ๐๐ถ๐ณ๐ณ๐ฒ๐ฟ๐ฒ๐ป๐๐ถ๐ฎ๐น๐ ๐ณ๐ผ๐ฟ ๐ซ๐ฆ๐ฆ
If you enjoy parser differential issues, you are going to love this exploit. Don't think "It's a CTF challenge" or "It's just an XSS", read between the lines to find the real gold. blog.voorivex.team/when-two-par....
โ๏ธ ๐๐ป๐๐ฟ๐ผ๐ฑ๐๐ฐ๐ถ๐ป๐ด ๐๐๐ด๐๐๐๐๐: ๐ข๐ฝ๐ฒ๐ป ๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ ๐๐๐ ๐ฃ๐ฟ๐ผ๐บ๐ฝ๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ง๐ผ๐ผ๐น
Praetorian is back with another tool (one of their 12 Caesars): Augustus... Make sure you check it out! www.praetorian.com/blog/introdu....
โจ ๐๐ฟ๐ฒ๐ฎ๐ธ๐ถ๐ป๐ด ๐๐ผ๐๐ป ๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฒ-๐ฎ๐ฑ๐ฌ๐ฐ๐ต: ๐๐ผ๐ ๐ง๐๐ฝ๐ฒ๐ฆ๐ฐ๐ฟ๐ถ๐ฝ๐ ๐ง๐๐ฝ๐ฒ๐ ๐๐ฎ๐ถ๐น๐ฒ๐ฑ ๐ป๐ด๐ป'๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐
A great explanation of the recent vulnerabilities impacting n8n. If you are working in security on TypeScript projects, it's a must read. hetmehta.com/posts/n8n-ty....
๐ฅ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต ๐ช๐ผ๐ฟ๐๐ต ๐ฅ๐ฒ๐ฎ๐ฑ๐ถ๐ป๐ด - ๐ช๐ฒ๐ฒ๐ธ ๐ณ, ๐ฎ๐ฌ๐ฎ๐ฒ
Parser Differential, TypeScript and AI
๐