ASSUME NOTHING.
TRUST NO INPUT.
LOG EVERYTHING.
I make bugs regret existing.
HALL OF FAME
BLOG & INSIGHTS
When WebView Bites Back: The Bug That Let JavaScript Run Wild
Discovering how improper WebView implementations in Android applications can lead to arbitrary JavaScript execution and potential security risks.
How a News App Leaked OAuth Codes: A Real-World Interception Story
Discovering a critical vulnerability in an Android news application that allowed malicious apps to intercept OAuth authorization codes.
SQLi Finding and Exploitation
A detailed walkthrough of discovering and exploiting a SQL injection vulnerability that led to a significant bug bounty reward.
Unlimited Mint: The Chair Function That Could Break a Stablecoin
Analysis of a critical vulnerability in a federated token contract that allowed unlimited minting of the underlying token.
Good vs. Bad: Are We Seeing Truth or Just Our Own Biases?
Exploring the timeless philosophical debate on whether morality is objective, subjective, or something in between.
HAVE A MISSION?
Whether it's a security audit, a bug bounty inquiry, or just a technical deep dive, my secure lines are always open.