Marlon Fabiano (@astrounder) 's Twitter Profile
Marlon Fabiano

@astrounder

Hacking e Bugbounty

ID: 1228469502968508417

calendar_today15-02-2020 00:02:40

142 Tweet

840 Followers

381 Following

Marlon Fabiano (@astrounder) 's Twitter Profile Photo

I found two vulnerabilities in GitHub Copilot that allowed the attacker to exfiltrate code from developers... 😱 🐞 I have been away from the network for some time due to work and family reasons. But today I am back to inform that I have had the honor of joining the Official

I found two vulnerabilities in GitHub Copilot that allowed the attacker to exfiltrate code from developers... 😱 🐞

I have been away from the network for some time due to work and family reasons. But today I am back to inform  that I have had the honor of joining the Official
Felipe PayΓ£o (@felipepayao) 's Twitter Profile Photo

πŸ“‘Hacker encontra duas vulnerabilidades zero-day no GitHub Copilot "Os dois zero-days permitiam a exfiltraΓ§Γ£o do cΓ³digo do desenvolvedor", Marlon Fabiano Acompanhe: tecmundo.com.br/seguranca/2877…

bbupdate (@inbbupdates) 's Twitter Profile Photo

Zeroday on Github Copilot gccybermonks.com/posts/github/ Published By :- Marlon Fabiano (Marlon Fabiano) #infosec #bugbounty #TogetherWeHitHarder #inbbupdatesblogs

H1 Disclosed - Public Disclosures (@h1disclosed) 's Twitter Profile Photo

⚑ Source Code and data exfiltration via Github Copilot πŸ‘¨πŸ»β€πŸ’» Marlon Fabiano ➟ GitHub 🟨 Low πŸ’° $1,000 πŸ”— hackerone.com/reports/2383092 #bugbounty #bugbountytips #cybersecurity #infosec

⚑ Source Code and data exfiltration via Github Copilot 
πŸ‘¨πŸ»β€πŸ’» <a href="/astrounder/">Marlon Fabiano</a> ➟ GitHub 
🟨 Low
πŸ’° $1,000
πŸ”— hackerone.com/reports/2383092
#bugbounty #bugbountytips #cybersecurity #infosec
HackerOne (@hacker0x01) 's Twitter Profile Photo

We're live in the beautiful city of Edinburgh for #H10131! For this live event, the world's top researchers will work side by side with the Amazon/AWS team to hunt for potential bugs. This partnership is one important piece of Amazon and AWS's comprehensive approach to security.

We're live in the beautiful city of Edinburgh for #H10131!

For this live event, the world's top researchers will work side by side with the Amazon/AWS team to hunt for potential bugs. This partnership is one important piece of Amazon and AWS's comprehensive approach to security.
HackerOne (@hacker0x01) 's Twitter Profile Photo

The list of teams moving on to the Sweet Sixteen round of the #AmbassadorWorldCup is here! πŸ™Œ These 16 teams from around the world will jump in on Tuesday, October 22, to kick off a β€˜Sweet’ round of bug hunting for our AWC partners. πŸ’ͺ Who will have what it takes to make it to

The list of teams moving on to the Sweet Sixteen round of the #AmbassadorWorldCup is here! πŸ™Œ

These 16 teams from around the world will jump in on Tuesday, October 22, to kick off a β€˜Sweet’ round of bug hunting for our AWC partners. πŸ’ͺ

Who will have what it takes to make it to
Marlon Fabiano (@astrounder) 's Twitter Profile Photo

In September, I had the honor of being invited by Amazon to participate in HackerOne 's Live Hacking Event (LHE). It was an incredible experience where I focused all my reports exclusively on Artificial Intelligence (LLM and ML). The event provided a wealth of learning and,

In September, I had the honor of being invited by <a href="/amazon/">Amazon</a>  to participate in <a href="/Hacker0x01/">HackerOne</a> 's Live Hacking Event (LHE). It was an incredible experience where I focused all my reports exclusively on Artificial Intelligence (LLM and ML). The event provided a wealth of learning and,
HackerOne (@hacker0x01) 's Twitter Profile Photo

In September, some of the best security researchers in the world joined the Amazon and Amazon Web Services teams in Edinburgh, Scotland, for a live-hacking event fit for a Scottish king. πŸ‘‘ This collaboration with the security researcher community is vital to Amazon and AWS' commitment to

Marlon Fabiano (@astrounder) 's Twitter Profile Photo

Hey Anthropic About "constitutional-classifiers". I managed to jailbreak it, but it seems that the bypass occurred even in your checker haha. It can't detect the harmful response.