News
CertiK Exposes the Security Gap No One in OpenClaw's Marketplace Wants to Talk A...
CertiK researchers prove OpenClaw's ClawHub marketplace can be bypassed via plausible but exploitable Skills, achieving arbitrary...
Reverse-Engineering Zomato Food Rescue: MQTT, Server-Driven UI, and a Headless M...
How I intercepted Zomato's Android traffic, found MQTT credentials in plain JSON, and built a real-time monitor to win Food Rescue...
The PS5 Controller Hack That Exposed Seven Thousand Living Rooms
A simple project to use a PS5 controller on a robot vacuum accidentally exposed 7,000 homes.
Ransomware Doesn't Need to Lock Your Files Anymore — Here's Why That's Terrifyin...
Ransomware is evolving from "lock your files and demand payment" to "steal everything and threaten to leak it." About 50% of attac...
The Zero-Day Deduction
While testing a tax software API for a bug bounty, I discovered a critical Insecure Direct Object Reference (IDOR). By changing a...
Catch Secrets in Real Time on GitHub with EnvScanner 2.0 and AI
EnvScanner 2.0 is a lightweight tool for monitoring GitHub secrets. It uses Google Gemini API to validate secrets. The code is ava...
