h0wl (@h0wlu) 's Twitter Profile
h0wl

@h0wlu

🛡️@redteampl Co-founder
🦉@BlackOwlSec Founder
🧜‍♀️@WarConPL Co-founder
👨‍🔬Fuzzing
🕵️Web2 & Web3 Security
🪽Angel Investor

ID: 585633925

linkhttps://overflow.pl calendar_today20-05-2012 12:31:30

2,2K Tweet

4,4K Followers

1,1K Following

h0wl (@h0wlu) 's Twitter Profile Photo

Most likely would be downgraded to medium or low due to ,unlikely scenario, requiring interaction etc. so nah not an easy 4k 😂

sudo rm -rf --no-preserve-root / (@pcaversaccio) 's Twitter Profile Photo

TL;DR: A dev machine of Safe was compromised. This allowed access to AWS and their S3 bucket. A malicious JavaScript was pushed to the bucket and eventually distributed. The malicious JS code targeted specifically the Bybit contract address. The JS code changes the content of the

TL;DR: A dev machine of Safe was compromised. This allowed access to AWS and their S3 bucket. A malicious JavaScript was pushed to the bucket and eventually distributed. The malicious JS code targeted specifically the Bybit contract address. The JS code changes the content of the
Patrick Collins (@patrickalphac) 's Twitter Profile Photo

This statement is contradictory and slightly misleading. The frontend of the Safe UI WAS actually compromised, as they confirmed a developer at Safe{Wallet} had their computer hacked. I guess technically, their frontend "had no vulnerabilities," but was compromised.

This statement is contradictory and slightly misleading.

The frontend of the Safe UI WAS actually compromised, as they confirmed a developer at Safe{Wallet} had their computer hacked.

I guess technically, their frontend "had no vulnerabilities," but was compromised.
xyzeva (@xyz3va) 's Twitter Profile Photo

how to gain code execution on millions of people and hundreds of popular apps and of course, firebase was (partially) the cause kibty.town/blog/todesktop/

Rami McCarthy (@ramimacisabird) 's Twitter Profile Photo

😺 Cat's out of the bag We've updated our blog post on the `tj-actions` / `reviewdog` incident to disclose the target. We also have new details on the root cause of the `reviewdog` element. h/t Shay Berkovich for a ton of leg work here

😺 Cat's out of the bag

We've  updated our blog post on the `tj-actions` / `reviewdog` incident to  disclose the target. We also have new details on the root cause of the  `reviewdog` element.

h/t <a href="/sshaybbc/">Shay Berkovich</a> for a ton of leg work here
h0wl (@h0wlu) 's Twitter Profile Photo

Yeah, I reported address bar spoofing to them 2 months ago. It was also $100, but I declined the generous offer because they wanted to sign a contract that sounded like an NDA. Still not fixed btw.

Dedaub (@dedaub) 's Twitter Profile Photo

Last September our team disclosed a *live*, critical vulnerability on Bedrock. The report was responsibly shared to both Bedrock | BR is LIVE and Security Alliance Unfortunately, the report was leaked and the vulnerability was exploited for $2m by a former employee of a Seal member org ↓