LeftenantZero (@leftenantzero) 's Twitter Profile
LeftenantZero

@leftenantzero

Engineer. Security Enthusiast. Human Being.

ID: 1571671527312990209

calendar_today19-09-2022 01:24:55

41 Tweet

33 Followers

135 Following

ZeroPath (@zeropathai) 's Twitter Profile Photo

The current version of RAGFlow (0.24) contains an unpatched vulnerability that allows low-privilege authenticated attackers to execute arbitrary code. Blog: zeropath.com/blog/ragflow-r… POC: github.com/ZeroPathAI/rag… Video Walkthrough: youtube.com/watch?v=1F-27C…

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

Unpatched post-auth RCE in the latest version of RAGFlow. Blog: zeropath.com/blog/ragflow-r… POC: github.com/ZeroPathAI/rag… Video walkthrough: youtu.be/1F-27CIlpgE

Calif (@calif_io) 's Twitter Profile Photo

MAD Bugs: Codex Hacked a Samsung TV We gave Codex a foothold. It popped a root shell. open.substack.com/pub/calif/p/co…

vx-underground (@vxunderground) 's Twitter Profile Photo

Another zero day exploit released by some nerd (can't remember name right now) because they're annoyed with Microsoft. It's been confirmed by other nerds. It is yet another legit zero day. Whew. github.com/Nightmare-Ecli…

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

Has anyone else noticed Claude Code is refusing a lot more security research prompts over the past week or so? I'm wondering if they tightened the guardrails because of all the mythos hype. It seems like it's especially hesitant to assist with exploit development.

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

Rather than just relying on qualitative AI review of PRs, Meta has LLMs produce just in time unit tests via a structured approach they outline in this paper. Exciting stuff! QA that keeps up with the pace of LLM powered development. engineering.fb.com/2026/02/11/dev…

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

transformer-circuits.pub/2026/emotions/… LLMs seem to have internal analogs of human emotional states. Input that would produce anger in a human activates one pattern in the model, while input that would produce excitement activates another and so on. Furthermore, these internal states seem to

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

I just published two 10.0 severity Spinnaker vulns that allow code execution and pivoting into source control and production environments! zeropath.com/blog/spinnaker… (CVE-2026-32604 and CVE-2026-32613) These issues demonstrate the importance of zero trust architectures and

I just published two 10.0 severity Spinnaker vulns that allow code execution and pivoting into source control and production environments!

zeropath.com/blog/spinnaker…

(CVE-2026-32604 and CVE-2026-32613)

These issues demonstrate the importance of zero trust architectures and
Hunter (@huntermapping) 's Twitter Profile Photo

🚨Alert🚨 CVE-2026-32604(CVSS 10.0) &CVE-2026-32613(CVSS 10.0): The RCE Flaws Threatening Spinnaker Pipelines. 🧐Detail :zeropath.com/blog/spinnaker… 📊 2.2K Services are found on the hunter.how yearly. 🔗Hunter Link:hunter.how/list?searchVal… 👇Query HUNTER :

🚨Alert🚨 CVE-2026-32604(CVSS 10.0) &CVE-2026-32613(CVSS 10.0): The RCE Flaws Threatening Spinnaker Pipelines.
🧐Detail :zeropath.com/blog/spinnaker…
📊 2.2K Services are found on the hunter.how yearly.
🔗Hunter
Link:hunter.how/list?searchVal…
👇Query
HUNTER :
ZeroPath (@zeropathai) 's Twitter Profile Photo

Walkthrough: exploiting ZeroPath's new critical severity Spinnaker vulns for code execution and production environment access. (CVE-2026-32604 and CVE-2026-32613) youtu.be/ma-00ggxSp4

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

youtu.be/ma-00ggxSp4 Hands on video walkthrough: Exploiting the new critical Spinnaker vulns for RCE and credential theft. (CVE-2026-32604 and CVE-2026-32613) Includes POCs and script to stand up your own lab environment

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Here's a cool trick for y'all looking to create new Nuclei templates for exploitable CVEs! Using CVEmap you can get a list of CVEs with public proofs of concept, that have been marked as exploitable by CISA, are remotely exploitable AND don't have a Nuclei template (yet)!

Here's a cool trick for y'all looking to create new Nuclei templates for exploitable CVEs!

Using CVEmap you can get a list of CVEs with public proofs of concept, that have been marked as exploitable by CISA, are remotely exploitable AND don't have a Nuclei template (yet)!
sagitz (@sagitz_) 's Twitter Profile Photo

We achieved Remote Code Execution on GitHub - and got access to millions of repositories belonging to other users and organizations 🤯 All it took was a single `git push` Here's how we did it (CVE-2026-3854) 🧵⬇️

We achieved Remote Code Execution on GitHub - and got access to millions of repositories belonging to other users and organizations 🤯

All it took was a single `git push`

Here's how we did it (CVE-2026-3854) 🧵⬇️
LeftenantZero (@leftenantzero) 's Twitter Profile Photo

CVE-2026-42167, a high severity vuln in ProFTPD I discovered, was just published today! Attackers can use it to bypass auth and even execute arbitrary code in some cases. Check out my write up for full technical details, including a working POC! zeropath.com/blog/proftpd-c…

CVE-2026-42167, a high severity vuln in ProFTPD I discovered, was just published today!  Attackers can use it to bypass auth and even execute arbitrary code in some cases.

Check out my write up for full technical details, including a working POC!

zeropath.com/blog/proftpd-c…
Brian Pak (@brian_pak) 's Twitter Profile Photo

Time to talk about this one. CopyFail (CVE-2026-31431) — a 732-byte Python script that roots every Linux distro shipped since 2017. 🧵

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

Where the goblins in the GPT system prompt came from... "Starting with GPT‑5.1, our models began developing a strange habit: they increasingly mentioned goblins, gremlins, and other creatures in their metaphors." 😂 openai.com/index/where-th…

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

This has been my experience ai vuln finding as well. The quality of the harness makes all the difference. I even benchmarked vanilla Opus 4.6 -- results were not impressive. (zeropath.com/blog/benchmark…) They need us human researchers for a little longer at least :-/.

LeftenantZero (@leftenantzero) 's Twitter Profile Photo

Long term , I think the current AI-powered vulnerability glut eventually turns into an AI-powered vulnerability drought. Historical stuff gets mined out and better code analysis tools reduce new easily-detectable bugs, even as code volume continues to increase. If you can