mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#bugbounty

6 posts5 participants0 posts today
Discernible<p>🪲 New Security Communication Drill: The Bug Bounty Researcher's Perspective</p><p>Join us tomorrow for an interactive security communication drill that flips the script on traditional security exercises. Instead of focusing on the vendor side, we'll put participants in the shoes of security researchers navigating the challenges of vulnerability disclosure.</p><p>This hands-on scenario will challenge you to:</p><p>🐛 Navigate security assessments with limited visibility into internal architectures</p><p>🐞 Build credibility when you have less system context than internal teams</p><p>🐛 Communicate effectively through multi-layered teams (triage vendors vs. security engineers)</p><p>🐞 Balance respect for internal expertise while confidently advocating for your findings</p><p> 🐛 Manage disclosure expectations under tight time constraints</p><p>🐞 Push for security improvements without full visibility into compensating controls</p><p>Whether you're a security researcher, bug bounty program manager, or security engineer, this drill offers valuable insights into improving communications in the vulnerability disclosure process from both sides.</p><p>🗓️ Date: Wednesday, April 23 <br>🕰️ Time: 12pm ET <br>🗺️ Location: Discernible Drills Slack </p><p>🔥 Subscribe to Join: DiscernibleInc.com/drills</p><p><a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/SecurityCommunications" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityCommunications</span></a></p>
Bug Bounty Shorts<p>Uncover a stealthy XSS vulnerability that can execute in any user's authenticated session, learn how an attacker could craft a sophisticated ACSRF attack, and discover valuable insights on application-wide exploitation <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a></p><p><a href="https://melotover.medium.com/escalating-impact-full-account-takeover-in-microsoft-via-xss-in-login-flow-f160fa79b008?source=rss------bugbounty-5" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">melotover.medium.com/escalatin</span><span class="invisible">g-impact-full-account-takeover-in-microsoft-via-xss-in-login-flow-f160fa79b008?source=rss------bugbounty-5</span></a></p>
Vasileiadis A. (Cyberkid)<p>Top Web Application PenTesting Tools by Category ⚔️</p><p>🔖Hashtags:<br><a href="https://defcon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://defcon.social/tags/PentestingTools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PentestingTools</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://defcon.social/tags/WebAppSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebAppSecurity</span></a> <a href="https://defcon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://defcon.social/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p><p>⚠️Disclaimer:<br>This content is for educational purposes only. Only use these tools in environments where you have proper authorization. Hacking without permission is illegal and unethical.</p>
Vasileiadis A. (Cyberkid)<p>SQL Injection (SQLi) 💉 – Everything You Need to Know</p><p>What is SQL Injection?<br>SQL Injection is a code injection technique that allows attackers to interfere with the queries an application makes to its database.</p><p>Types of SQLi:</p><p>1. In-band SQLi – Most common and easy to exploit.</p><p>2. Blind SQLi – Data isn’t visibly returned but can still be extracted through inference.</p><p>3. Out-of-band SQLi – Uses external servers to get results (less common but powerful).</p><p>4. Time-Based Blind SQLi – Server delay used to infer info from the database.</p><p>Attack Scenarios:<br>▫️Bypassing logins<br>▫️Dumping database contents<br>▫️Modifying or deleting data<br>▫️Escalating privileges<br>▫️Accessing admin panels</p><p>Common SQLi Targets:<br>🔹Login forms<br>🔹Search boxes<br>🔹URL parameters<br>🔹Cookies<br>🔹Contact or feedback forms</p><p>How to Prevent SQLi:<br>▪️Use parameterized queries<br>▪️Employ ORM frameworks<br>▪️Sanitize all user inputs<br>▪️Set least privilege for DB users<br>▪️Use Web Application Firewalls (WAF)</p><p>♦️Red Team Tip<br>Test all user input points, especially where data touches the database. Think beyond login forms—SQLi hides in unexpected places.</p><p>🔖Hashtags:<br><a href="https://defcon.social/tags/SQLInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SQLInjection</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://defcon.social/tags/RedTeam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeam</span></a> <a href="https://defcon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://defcon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a></p><p>⚠️Disclaimer:<br>This content is for educational purposes only. Always perform security testing with explicit permission. Unauthorized testing is illegal and unethical.</p>
Vasileiadis A. (Cyberkid)<p>Everything About SQL Injection 💉</p><p>What is SQL Injection?<br>SQL Injection is a web vulnerability that lets attackers manipulate database queries. This can lead to unauthorized access, data leaks, or even full control of the system.</p><p>🔬Types of SQL Injection</p><p>1️⃣ Classic SQLi – Injecting raw SQL commands.<br>2️⃣ Blind SQLi – No errors, but the response changes.<br>3️⃣ Time-Based SQLi – Uses response delays to extract data.<br>4️⃣ Union-Based SQLi – Merges malicious queries with valid ones.<br>5️⃣ Out-of-Band SQLi – Exfiltrates data through DNS, HTTP, etc.</p><p>♦️Potential Impact<br>▫️Access &amp; dump sensitive data<br>▫️Bypass login systems<br>▫️Alter or delete database entries<br>▫️Full system compromise</p><p>🔰Common Entry Points<br>▫️Login forms<br>▫️Search inputs<br>▫️Contact forms<br>▫️URL query parameters</p><p>Defense Strategies 🛡<br>✅ Use parameterized queries<br>✅ Validate &amp; sanitize inputs<br>✅ Apply least privilege to DB accounts<br>✅ Monitor logs for anomalies<br>✅ Perform regular security audits</p><p>📀Image Description (for visual):<br>🔹A sleek cyber-themed layout with:<br>🔹A hacker icon injecting code<br>🔹A login form being exploited<br>🔹Database icons showing exposed data<br>🔹A shield labeled “Prepared Statements” blocking the attack</p><p>🔖Tags<br><a href="https://defcon.social/tags/SQLInjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SQLInjection</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://defcon.social/tags/WebSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebSecurity</span></a> <a href="https://defcon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://defcon.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://defcon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://defcon.social/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://defcon.social/tags/DatabaseSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DatabaseSecurity</span></a> <a href="https://defcon.social/tags/HackerTips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerTips</span></a></p><p>⚠️Disclaimer<br>This content is for educational and ethical purposes only. Do not attempt to exploit vulnerabilities without proper authorization. Always follow legal and ethical guidelines when testing or learning about cybersecurity.</p>
César Pose<p>If <span class="h-card" translate="no"><a href="https://infosec.exchange/@Jhaddix" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Jhaddix</span></a></span> says so, you can be sure. 😜😅😅😅</p><p><a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkweb</span></a> <a href="https://infosec.exchange/tags/darkwebforums" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>darkwebforums</span></a> <a href="https://infosec.exchange/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a> <a href="https://infosec.exchange/tags/feds" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>feds</span></a> <a href="https://infosec.exchange/tags/hackers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackers</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a></p>
Blue Headline - Tech News<p>🚨 AI tool solves cyber tasks 3,600× faster than humans.<br>It’s called CAI—and it’s open-source, autonomous, and already winning real CTFs.</p><p>The best part? Even non-professionals using CAI have reported confirmed bugs to major bug bounty platforms.</p><p>Could this reshape who gets to participate in cybersecurity?</p><p>Read more: <a href="https://blueheadline.com/cybersecurity/cai-ai-hacker-tool-faster/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blueheadline.com/cybersecurity</span><span class="invisible">/cai-ai-hacker-tool-faster/</span></a></p><p><a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/BlueHeadline" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BlueHeadline</span></a> <a href="https://mastodon.social/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EthicalHacking</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/AItools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AItools</span></a></p>
Daniel Šnor<p><span class="h-card" translate="no"><a href="https://zpravobot.news/@zpravobot" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>zpravobot</span></a></span> </p><p>Druhou prosbou je, zda byste mohli udělat <a href="https://mastodon.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> a ověřili u všech zprávobotíků, které sledujete, že skutečně běží (postují), i když třeba nepříliš často, a nareportovali mi, pokud najdete nějaký problematický/nefunkční? I když se snažím, nemám šanci vše uhlídat a tohle by hodně pomohlo. Díky i za to.</p><p>2/2</p><p><a href="https://mastodon.social/tags/zpravobot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zpravobot</span></a></p>
Hacker News<p>One Bug Wasn't Enough: Escalating Twice Through SAP's Setuid Landscape</p><p><a href="https://www.anvilsecure.com/blog/one-bug-wasnt-enough-escalating-twice-through-saps-setuid-landscape.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">anvilsecure.com/blog/one-bug-w</span><span class="invisible">asnt-enough-escalating-twice-through-saps-setuid-landscape.html</span></a></p><p><a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/OneBugWasntEnough" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OneBugWasntEnough</span></a> <a href="https://mastodon.social/tags/SAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAP</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/Setuid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Setuid</span></a> <a href="https://mastodon.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://mastodon.social/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mastodon.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
Laurent Cheylus<p>The Nivenly Foundation announced the launch of a new Security Fund that will pay those who responsibly disclose Security Vulnerabilities that affect Fediverse Apps and Services: Mastodon, Forgejo, PeerTube, Pixelfed... <a href="https://bsd.network/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://nivenly.org/blog/2025/04/01/nivenly-fediverse-security-fund/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nivenly.org/blog/2025/04/01/ni</span><span class="invisible">venly-fediverse-security-fund/</span></a></p>
Baklava Monster<p>some <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> hunters need to understand that if they're using LLMs for their reports, they're violating the responsible disclosure policy 🤷‍♀️</p>
cyb_detective<p>URLFINDER</p><p><a href="https://infosec.exchange/tags/go" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>go</span></a> URL discovery tool:<br>- different sources (alienvault,commoncrawl etc)<br>- filter by extensions/regex<br>- very fast (122000+ URLs in 30 sec):<br><a href="https://github.com/projectdiscovery/urlfinder" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/projectdiscovery/ur</span><span class="invisible">lfinder</span></a></p><p>Creator x.com/pdnuclei </p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>EncryptHub, a notorious threat actor linked to breaches at 618 organizations, is believed to have reported two Windows zero-day vulnerabilities to Microsoft, revealing a conflicted figure straddling the line between cybercrime and security research. <a href="https://kolektiva.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://kolektiva.social/tags/CyberAlerts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAlerts</span></a> <a href="https://www.bleepingcomputer.com/news/security/encrypthubs-dual-life-cybercriminal-vs-windows-bug-bounty-researcher/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/encrypthubs-dual-life-cybercriminal-vs-windows-bug-bounty-researcher/</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>Automate JavaScript (JS) Extraction for Bug Bounty Recon<br><a href="https://cyberw1ng.medium.com/automate-javascript-js-extraction-for-bug-bounty-recon-6faab744d22e?source=rss------bug_bounty-5" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberw1ng.medium.com/automate-</span><span class="invisible">javascript-js-extraction-for-bug-bounty-recon-6faab744d22e?source=rss------bug_bounty-5</span></a></p><p><a href="https://kolektiva.social/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://kolektiva.social/tags/bugbountytips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbountytips</span></a> <a href="https://kolektiva.social/tags/bugbountytip" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbountytip</span></a></p>
The DefendOps Diaries<p>Imagine a hacker who not only exploited zero-days to breach over 600 organizations but also played the hero by patching vulnerabilities for Microsoft. How does one person walk the line between cybercrime and cybersecurity?</p><p><a href="https://thedefendopsdiaries.com/decrypting-encrypthub-a-cybersecurity-enigma/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thedefendopsdiaries.com/decryp</span><span class="invisible">ting-encrypthub-a-cybersecurity-enigma/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br><a href="https://infosec.exchange/tags/encrypthub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encrypthub</span></a><br><a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a><br><a href="https://infosec.exchange/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a><br><a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a></p>
Marcel SIneM(S)US<p>Belohnung für gefundene Sicherheitslücken in <a href="https://social.tchncs.de/tags/Fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fediverse</span></a> :fediverse: -Software ausgelobt | Security <a href="https://www.heise.de/news/Belohnung-fuer-gefundene-Sicherheitsluecken-in-Fediverse-Software-ausgelobt-10338830.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Belohnung-fuer-g</span><span class="invisible">efundene-Sicherheitsluecken-in-Fediverse-Software-ausgelobt-10338830.html</span></a> <a href="https://social.tchncs.de/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> :mastodon: <a href="https://social.tchncs.de/tags/Pixelfed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pixelfed</span></a> :pixelfed: <a href="https://social.tchncs.de/tags/Peertube" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Peertube</span></a> :peertube: <a href="https://social.tchncs.de/tags/Friendica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Friendica</span></a> <a href="https://social.tchncs.de/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a></p>
Baklava Monster<p><a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> from hell: always remember to mention that the reported vulnerability is critical because it violates GDPR. These these are the magic letters that will turn any mediocre submission into gold!!1</p>
César Pose<p>90% of code will be writen by AI, they say...<br>And Bug Bounty Hunters...<br>😅😅😅😅😅😅</p><p><a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/aicoding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aicoding</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
jomo<p>There is now a (limited) bug bounty for several Fediverse projects.</p><p>$250 for HIGH<br>$500 for CRITICAL</p><p><a href="https://nivenly.org/blog/2025/04/01/nivenly-fediverse-security-fund/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nivenly.org/blog/2025/04/01/ni</span><span class="invisible">venly-fediverse-security-fund/</span></a></p><p><a href="https://mstdn.io/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mstdn.io/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://mstdn.io/tags/fediverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fediverse</span></a></p>
SOCBB<p>🚨 Calling all Chromium developers and fans! 🚨 </p><p>Ready to showcase your coding skills and earn up to $10,000? The Supporters of Chromium Based Browsers (SOCBB) Bug Bounty Program is live! Fix bugs in Chromium-based browsers like Chrome &amp; Edge. </p><p>Contribute to repos like chromium, v8, Skia, and more! <br>🖥️ Payment via GitHub Sponsors. </p><p>Get started now: <a href="https://github.com/Supporters-Of-Chromium-Based-Browsers/Bug-Bounty-Program/blob/main/README.md" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Supporters-Of-Chrom</span><span class="invisible">ium-Based-Browsers/Bug-Bounty-Program/blob/main/README.md</span></a></p><p><a href="https://mastodon.social/tags/Chromium" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chromium</span></a> <a href="https://mastodon.social/tags/BugBounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugBounty</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/DeveloperCommunity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DeveloperCommunity</span></a></p>