Tanner (@itscachemoney) 's Twitter Profile
Tanner

@itscachemoney

Somewhere between a builder and a breaker | @hacknotcrime

ID: 859333466785161216

linkhttp://hackerone.com/cache-money calendar_today02-05-2017 09:07:18

645 Tweet

7,7K Followers

136 Following

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

New Tinder Security Labs' cloud security blog post! We got access to organizations' (including AWS itself) AWS account through misconfigured AWS OIDC in GitHub Actions. Learn more in the blog! medium.com/tinder/identif… #TinderSecurityLabs #cloudsecurity

HackerOne (@hacker0x01) 's Twitter Profile Photo

Last week, #H14420 took over London. 🇬🇧 See who took home the top prizes and celebrate them with your best GIF below. Day 1 Winners: Exterminator: cache-money Best Collaboration: tomAnthony, todayisnew, hx01, shubs 2nd Place: f6x 1st Place: cache-money Vigilante: f6x

Last week, #H14420 took over London. 🇬🇧 See who took home the top prizes and celebrate them with your best GIF below. 

Day 1 Winners: 

Exterminator: cache-money
Best Collaboration: tomAnthony, todayisnew, hx01, shubs
2nd Place: f6x
1st Place: cache-money
Vigilante: f6x
Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Tinder Security Labs will be at DEF CON this year! We will be presenting our research on automating & identifying vulnerabilities in Firebase configurations at scale at Cloud Village. Come check out our talk and say hi! #defcon #cloudvillage #tindersecuritylabs #security

Tinder Security Labs will be at DEF CON this year! We will be presenting our research on automating & identifying vulnerabilities in Firebase configurations at scale at Cloud Village. Come check out our talk and say hi! #defcon #cloudvillage #tindersecuritylabs #security
Uranium238 (@uraniumhacker) 's Twitter Profile Photo

In 2022, we at Tinder Security Labs, found a RCE in a workflow in Elastic's Logstash repository. Soon after, we took over a third-party namespace giving us indirect RCE to more than 315+ workflows which further led to RCE in a large set of an organization's customers. Then in

In 2022, we at Tinder Security Labs, found a RCE in a workflow in Elastic's Logstash repository. Soon after, we took over a third-party namespace giving us indirect RCE to more than 315+ workflows which further led to RCE in a large set of an organization's customers. Then in
Uranium238 (@uraniumhacker) 's Twitter Profile Photo

Would recommend joining the talks today. Presenting on something Tanner and I have been working on for past few years that we have not presented anywhere yet. 😃

Uranium238 (@uraniumhacker) 's Twitter Profile Photo

New blog: We (Tanner and I) abused the central function in various email security gateways: unfurl and analyze URLs to access internal SaaS services of various companies including Netflix. Check the blog to learn more. #phishing #emailsecurity ophionsecurity.com/blog/phishing-…

James Kettle (@albinowax) 's Twitter Profile Photo

Just been shown an awesome race attack by Tanner on Shopify for $15k back in 2017! This is the same attack concept described in my Gitlab multi-endpoint example. You can practise on this lab: portswigger.net/research/smash… portswigger.net/web-security/r… hackerone.com/reports/300305

Tanner (@itscachemoney) 's Twitter Profile Photo

Ticketmaster only offering me one year of free identity monitoring for a data breach but my healthcare provider offering two free years for theirs 👌

Rojan Rijal (@mallocsys) 's Twitter Profile Photo

With HackerOne's Scotland Live Hacking Event now slowly wrapping up, I am excited to have had the opportunity to participate this time. I focused primarily on hacking AWS while collaborating on it with Tanner. Currently, we are ranked in the top 10 for AWS based on our

With HackerOne's Scotland Live Hacking Event now slowly wrapping up, I am excited to have had the opportunity to participate this time. I focused primarily on hacking AWS while collaborating on it with <a href="/itscachemoney/">Tanner</a>. Currently, we are ranked in the top 10 for AWS based on our
Tanner (@itscachemoney) 's Twitter Profile Photo

If you're using Llama Guard as a safety check make sure you're not using it with unfiltered input. You can trivially bypass the harm check in over 90% of cases by adding an Agent and a second User query. This results in the 2nd query validating safe but the LLM processing the 1st

If you're using Llama Guard as a safety check make sure you're not using it with unfiltered input. You can trivially bypass the harm check in over 90% of cases by adding an Agent and a second User query. This results in the 2nd query validating safe but the LLM processing the 1st