InfoSec Planet
A collection of diverse security content from a curated list of sources. This website also serves as a demo for "worker-planet", the software that powers it.
On AI Security
on 20/05/2026
Good report:
Executive Summary: Let’s say you wanted to make sure that your AI is secure. Can you just maximize the security and privacy benchmark and call it a day? Nope, because benchmarks don’t actually work for measuring AI capabilities (even when they are NOT emergent systemic properties like security). So let’s take a step back: how do you measure security in the first plac [...]
See full content
Building Secure AI Systems: What Security Leaders Know That Builders Don't | HumanX 2026
on 20/05/2026
See full content
POST /api/bitcoinWithdrawalFees returns financial data without authentication despite being documented as a USER OPERATION (private endpoint)
on 20/05/2026
CoinMate.io disclosed a bug submitted by glferreira-devsecops: https://hackerone.com/reports/3676308 [...]
See full content
HMAC signature verification omits endpoint and payload allowing request forgery on CoinMate API
on 20/05/2026
CoinMate.io disclosed a bug submitted by glferreira-devsecops: https://hackerone.com/reports/3670955 [...]
See full content
Busy submitting P1s
on 19/05/2026
See full content
HTTP/3 paused transfer buffers incoming data without bound up to ~1 GiB
on 19/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734947 [...]
See full content
Schannel custom-CA path skips Extended Key Usage enforcement
on 19/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734992 [...]
See full content
Connection reuse ignores haproxyprotocol and HAPROXY_CLIENT_IP settings, allowing PROXY context to persist across transfers
on 19/05/2026
curl disclosed a bug submitted by 7omoo: https://hackerone.com/reports/3741135 [...]
See full content
SSL session-cache peer key omits signature_algorithms: strict-sigalg handle silently resumes a permissive sibling's session
on 19/05/2026
curl disclosed a bug submitted by hexproof: https://hackerone.com/reports/3739561 [...]
See full content
CURLOPT_PROXY_CAINFO_BLOB silently activates native CA store on Apple builds
on 19/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735179 [...]
See full content
TLS peer-verification bypass via mid-transfer ssl_config mutation
on 19/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735276 [...]
See full content
TLS verifyhost bypass in rustls, mbedTLS, and wolfSSL when verifypeer=0
on 19/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734095 [...]
See full content
HTTP/2 proxy CONNECT tunnel unbounded 1xx chain (missing Curl_bump_headersize cap in cf-h2-proxy.c)
on 19/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734020 [...]
See full content
Laurie Anderson Is Quoting Me
on 19/05/2026
Not by name, but Laurie Anderson quotes me in one of the tracks of her new album:
My favorite quote is from a cryptologist who said “If you think technology will solve your problems, you don’t understand technology and you don’t understand your problems.”
Also in interviews:
“Of course, it’s ridiculous, outrageous, blah, blah, blah,” Anderson says about th [...]
See full content
Cross-repository IDOR in `/settings/security_analysis/bypass_reviewers` allows unauthorized delegated bypass reviewer modification
on 19/05/2026
GitHub disclosed a bug submitted by ahacker1: https://hackerone.com/reports/3560256 [...]
See full content
Stop Measuring Time to Detect Start Measuring Time to Validate
on 18/05/2026
See full content
CISA Admin Leaked AWS GovCloud Keys on Github
by BrianKrebs on 18/05/2026
Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly privileged AWS GovCloud accounts and a large number of internal CISA systems. Security experts said the public archive included files detailing how CISA builds, tests and deploys software internally, and that it rep [...]
See full content
CURLOPT_HSTS_CTRL disables shared HSTS without share guard use-after-free and double-free
on 18/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3733934 [...]
See full content
cookie: case-insensitive path comparison in replace_existing() allows cookie eviction across distinct paths
on 18/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735238 [...]
See full content
libssh SFTP initialization ignores CURLOPT_TIMEOUT, hangs indefinitely
on 18/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3735080 [...]
See full content
rustls backend silently ignores CURLOPT_CRLFILE when native CA store is active
on 18/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734935 [...]
See full content
HSTS multi-trailing-dot bypass-ish: possible incomplete fix for CVE-2022-30115
on 18/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3733984 [...]
See full content
I Built an AI Cybersecurity Research Factory (for CTFs & Vulnerabilities)
on 18/05/2026
See full content
This GitHub README Hijacks Your AI and Spreads Like a Virus
on 18/05/2026
See full content
New video: hacking AI coding assistants and IDEs. #bugbounty #ai
on 18/05/2026
See full content
Zero-Day Exploit Against Windows BitLocker
on 18/05/2026
It’s nasty, but it requires physical access to the computer:
The exploit, named YellowKey, was published earlier this week by a researcher who goes by the alias Nightmare-Eclipse. It reliably bypasses default Windows 11 deployments of BitLocker, the full-volume encryption protection Microsoft provides to make disk contents off-limits to anyone without the decryption key, which is stored in a [...]
See full content
What Your Board Gets Wrong About AI Security
by Tim Erlin on 18/05/2026
Editor's note: This article was originally published by Craig Riddell on LinkedIn. It has been republished here with the author's permission.
Boards are giving AI security more airtime than ever. What they're not giving is the right framing.
A year or two ago, AI was mostly a question of experimentation risk. Today, it's tied directly to revenue, customer experience, operational efficiency, [...]
See full content
Unauthenticated File Upload to CDN
on 18/05/2026
Enjin disclosed a bug submitted by ph0r3nsic: https://hackerone.com/reports/3589247 [...]
See full content
IDOR: autotranslate.translateMessage Full Message Content Leak
on 18/05/2026
Rocket.Chat disclosed a bug submitted by josan_george: https://hackerone.com/reports/3713682 [...]
See full content
CEO insights: beyond the AI model card
by Stijn Jans on 18/05/2026
As part of our AI series, I recently released a blog on the topic of keeping the human layer sacred in the AI era. There, I shared my thoughts on where human intelligence fits, the decisions I believe companies will face in the next 3 to 5 years, and explored what I deem to be the beating heart of the Bug Bounty industry.
Considering that discussion, I want to continue the conversation regarding [...]
See full content
Pathfinding Labs: Deploy, test, and learn from 100+ intentionally vulnerable AWS environments
on 18/05/2026
Introducing Pathfinding Labs, a collection of intentionally vulnerable AWS environments for red teamers and blue teamers to deploy, exploit, and use for detection validation. [...]
See full content
The Security Buffer Is Gone
on 17/05/2026
See full content
Trailing-dot IPv4 URL bypasses IP-address guard, allows wildcard DNS SAN match
on 17/05/2026
curl disclosed a bug submitted by giant_anteater: https://hackerone.com/reports/3734921 [...]
See full content
NULL pointer dereference in libcurl URL API redirect_url() with CURLU_DEFAULT_SCHEME
on 17/05/2026
curl disclosed a bug submitted by mulan_dh: https://hackerone.com/reports/3736234 [...]
See full content
RatCTF.com - The BEST cybersecurity training platform
on 17/05/2026
See full content
What Part of AI Hacking Actually Moves the Needle?
on 16/05/2026
See full content
Hack a Drug Lord's Smart Toilet!
on 16/05/2026
See full content
Friday Squid Blogging: Bigfin Squid
on 16/05/2026
Article about the bigfin squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Blog moderation policy.
[...]
See full content
The AI Tried to Escape Our Own Infrastructure.
on 15/05/2026
See full content
SQL Injection in Column Type Parameter Allows Arbitrary SQL Execution
on 15/05/2026
Nextcloud disclosed a bug submitted by suul: https://hackerone.com/reports/3462991 [...]
See full content
[DUTCH] RatCTF - Wat is het en hoe gebruik je het? + Machine hacken
on 15/05/2026
See full content
Bypassing On-Camera Age-Verification Checks
on 15/05/2026
Some AI-based video age-verification checks can be fooled with a fake mustache.
[...]
See full content
The Payload Podcast 006
on 15/05/2026
See full content
Mythos Didn’t Change What Gets Found It Changed How Reliably It Gets Found
on 14/05/2026
See full content
Keep up the great work, hackers 👏
on 14/05/2026
See full content
Upcoming Speaking Engagements
on 14/05/2026
This is a current list of where and when I am scheduled to speak:
I’m giving a virtual talk on “The Security of Trust in the Age of AI,” hosted by the Financial Women’s Association of New York, at 6:00 PM ET on May 21, 2026.
I’m speaking at the Potsdam Conference on National Cybersecurity at the Hasso Plattner Institut in Potsdam, Germany. The event runs June 24–25, 2026, and my talk will be the [...]
See full content
Origin IP Exposed waf bypass
on 14/05/2026
Yuga Labs disclosed a bug submitted by r00tsid: https://hackerone.com/reports/1821085 - Bounty: $250 [...]
See full content
How Dangerous Is Anthropic’s Mythos AI?
on 14/05/2026
Last month, Anthropic made a remarkable announcement about its new model, Claude Mythos Preview: it was so good at finding security vulnerabilities in software that the company would not release it to the general public. Instead, it would only be available to a select group of companies to scan and fix their own software.
The announcement requires context—but it contained an essential truth. [...]
See full content
Mythos, Glasswing, and the New Velocity of Cyber Risk
on 14/05/2026
See full content
Kerberos/SPNEGO Connection Reuse Vulnerability
on 14/05/2026
curl disclosed a bug submitted by rootofpi_ramesh: https://hackerone.com/reports/3725659 [...]
See full content
LIVE: 🕵️ HTB Sherlocks! | Cybersecurity | Blue Team
on 14/05/2026
See full content
Backdoored Cemu release linked to TanStack and Mistral supply chain campaign
on 14/05/2026
We investigate how a coordinated supply chain campaign that compromised npm and PyPI packages also backdoored the official Cemu Nintendo Wii U emulator GitHub release, reaching nearly 20,000 Linux users. [...]
See full content
Backdoored node-ipc npm releases steal developer credentials through DNS queries
on 14/05/2026
An analysis of backdoored node-ipc npm releases that add an obfuscated credential collection and DNS exfiltration payload to the CommonJS entrypoint. [...]
See full content
OpenAI’s GPT-5.5 is as Good as Mythos at Finding Security Vulnerabilities
on 13/05/2026
The UK’s AI Security Institute evaluated GPT-5.5’s ability to find security vulnerabilities, and found that it is comparable to Claude Mythos. Note that the OpenAI model is generally available.
Here is the Institute’s evaluation of Mythos.
And here is an analysis of a smaller, cheaper model. It requires more scaffolding from the prompter, but it is also just as good.
[...]
See full content
Shai-Hulud Goes Open Source
on 13/05/2026
A static analysis of the open-sourced Shai-Hulud offensive framework attributed to TeamPCP, covering its credential harvesting, supply chain poisoning, and exfiltration capabilities. [...]
See full content
Patch Tuesday, May 2026 Edition
by BrianKrebs on 12/05/2026
Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in human-made computer code. That reality is on full display this month with some of the more widely-used software makers — including Apple, Google, Microsoft, Mozilla and Oracle — fixing near record volumes of secu [...]
See full content
Hackers are Using AI (much scary, very wow)
on 12/05/2026
See full content
A Quick Way to Prove Your Cybersecurity Skillset!
on 12/05/2026
See full content
Extending Security to MCP Servers: Closing a Critical Gap
by Tim Erlin on 12/05/2026
The Model Context Protocol (MCP) is a de facto standard for providing structured access to privileged systems for AI agents and external integrations. It acts as a USB-C port for AI, enabling faster innovation by allowing organizations to expose tools, resources, and workflows without the time-consuming work of building APIs.
Adoption has surged in recent months, and categories like payments, [...]
See full content
QuickSight Authorization Bypass: Chat Agents Accessible Despite Custom Permissions Denial
on 12/05/2026
AWS VDP disclosed a bug submitted by jcow: https://hackerone.com/reports/3577145 [...]
See full content
The beast needs a cage: What's next for AppSec post-Mythos
on 12/05/2026
Now that the dust has settled on Mythos dropping, there is space for more considered reflection on the direction of travel. Mythos wasn't a surprise; it's another data point on a trajectory that's bee [...]
See full content
Very Simple Real Bug Bounty Exploit - API Scope Bypass
on 12/05/2026
See full content
Copy.Fail Linux Vulnerability
on 12/05/2026
This is the worst Linux vulnerability in years.
TL;DR
copy.fail is a Linux kernel local privilege escalation, not a browser or clipboard attack. Disclosed by Theori on 29 April 2026 with a working PoC.
It abuses the kernel crypto API (AF_ALG sockets) plus splice() to write four bytes at a time straight into the page cache of a file the attacker does not own.
The exploit works unmodified across Ub [...]
See full content
Go fuzzing was missing half the toolkit. We forked the toolchain to fix it.
on 12/05/2026
Go’s native fuzzing is useful, but it stands far behind state-of-the-art tooling that the Rust, C, and C++ ecosystems offer with LibAFL and AFL++. Path constraints are hard to solve. Structured inputs usually need handmade parsing. It doesn’t even detect several common bug classes, such as integer overflows, goroutine leaks, data races, and execution timeouts. So to make it better, we built [...]
See full content
NIS2 compliance beyond the April 2026 deadline
by Eleanor Barlow on 12/05/2026
With the deadline passing for NIS2 compliance, many companies have shifted focus from becoming prepared to proving compliance. This post outlines the top 10 tasks for doing so and provides insights on how crowdsourced security platforms can assist in designing programs relevant to their circumstances and compliance requirements.
The April NIS2 compliance deadline has come and gone, but where does [...]
See full content
Bugcrowd goes platinum
on 11/05/2026
See full content
The Bug Bounty Roadmap I'd Follow If I Started Over (With AI)
on 11/05/2026
See full content
Is the AI hype helping or killing your bug bounty dreams? #hacking #bugbounty
on 11/05/2026
See full content
LLMs and Text-in-Text Steganography
on 11/05/2026
Turns out that LLMs are really good at hiding text messages in other text messages.
[...]
See full content
CEO insights: holding the human layer sacred in the AI era
by Stijn Jans on 11/05/2026
As founder and CEO of Intigriti, I've spent a long time around hackers, and one thing is clear. The best ones don't fear AI. They use it.
What they do fear, however, and what I take seriously as a founder, is a world where platforms quietly replace them under the banner of efficiency. Where their work trains models they don't benefit from, and where the economics of the craft erode while everyon [...]
See full content
Malicious Coding Agent Skills and the Risk of Dynamic Context
on 11/05/2026
Learn how malicious Claude Code skills can abuse dynamic context commands to execute before model-level prompt injection defenses can intervene. [...]
See full content
another liberapay member team twitter account broken Link Hijacking via Expired Twitter Account Link
on 09/05/2026
Liberapay disclosed a bug submitted by rox-11: https://hackerone.com/reports/3723002 [...]
See full content
Liberapay member team twitter account broken Link Hijacking via Expired Twitter Account Link
on 09/05/2026
Liberapay disclosed a bug submitted by rox-11: https://hackerone.com/reports/3721519 [...]
See full content
AI tools are already part of everyday work, approved or not. 🤷
on 08/05/2026
See full content
Private circle can be added to another circle via API despite visibility restriction
on 08/05/2026
Nextcloud disclosed a bug submitted by vidang04: https://hackerone.com/reports/3511998 - Bounty: $150 [...]
See full content
Files drop share links for end-to-end encrypted folders allowed to drop files into other folders of the share owner
on 08/05/2026
Nextcloud disclosed a bug submitted by 0x0doteth: https://hackerone.com/reports/3304830 [...]
See full content
View-only guests could see deleted Collectives pages in the trashbin
on 08/05/2026
Nextcloud disclosed a bug submitted by yoyomiski: https://hackerone.com/reports/3521434 [...]
See full content
Canvas Breach Disrupts Schools & Colleges Nationwide
by BrianKrebs on 08/05/2026
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States today, after a cybercrime group defaced the service’s login page with a ransom demand that threatened to leak data from 275 million students and faculty across nearly 9,000 educational institutions.
A sc [...]
See full content
Kubernetes security fundamentals: Secrets
on 08/05/2026
A look at how to secure Kubernetes secrets [...]
See full content
mbedTLS private-key blob null-termination asymmetry in lib/vtls/mbedtls.c (mbed_load_privkey)
on 07/05/2026
curl disclosed a bug submitted by shecantcode2: https://hackerone.com/reports/3717365 [...]
See full content
ActiveStorage Disk Service Path Traversal via Custom Blob Key Injection
on 07/05/2026
Ruby on Rails disclosed a bug submitted by ksw9722: https://hackerone.com/reports/3580511 [...]
See full content
hello, nostalgia
on 07/05/2026
See full content
Netwrix achieved a perfect 100% detection rate
on 06/05/2026
See full content
Critical Deadlock Vulnerability in Monero RPC Leading to Complete Node Paralysis
on 06/05/2026
Monero disclosed a bug submitted by rorkh: https://hackerone.com/reports/3307874 [...]
See full content
Connection Count Bug in Monero Node Enables Outbound Peer Reset Attack
on 06/05/2026
Monero disclosed a bug submitted by yulge: https://hackerone.com/reports/3185083 [...]
See full content
wcurl treats some URL operands after -- as curl options
on 06/05/2026
curl disclosed a bug submitted by p4p3r_hak: https://hackerone.com/reports/3708482 [...]
See full content
Inside H1-21 Lisbon: What We Validated Together
on 06/05/2026
See full content
honorable mention:
on 05/05/2026
See full content
Out of scope: Improper Input Validation Order on /api-internal/login via password field leads to unnecessary resource consumption
on 05/05/2026
PortSwigger Web Security disclosed a bug submitted by bereza4321: https://hackerone.com/reports/3625600 - Bounty: $200 [...]
See full content
C/C++ checklist challenges, solved
on 05/05/2026
We recently added a C/C++ security checklist to the Testing Handbook and challenged readers to spot the bugs in two code samples: a deceptively simple Linux ping program and a Windows driver registry handler. If you found the inet_ntoa global buffer gotcha or the missing RTL_QUERY_REGISTRY_TYPECHECK flag, nice work. If not, here’s a full walkthrough of both challenges, plus a deep dive into [...]
See full content
Potential Resource Leak in tool_parsecfg.c at line 279 during fileerror
on 05/05/2026
curl disclosed a bug submitted by ravindrasl2026: https://hackerone.com/reports/3710209 [...]
See full content
libcurl 8.20.0 incomplete fix for CVE-2026-7168: changing only CURLOPT_PROXYPORT leaks stale Proxy Digest auth to a different proxy
on 05/05/2026
curl disclosed a bug submitted by codexxxx: https://hackerone.com/reports/3707747 [...]
See full content
MQTT CONNACK Packet Type Bypass leads to RCE via Malicious Broker
on 05/05/2026
curl disclosed a bug submitted by orelbn7: https://hackerone.com/reports/3712343 [...]
See full content
The AI impact: a triager’s perspective
by Eleanor Barlow on 05/05/2026
As part of our recent AI blog series, and in addition to content on ‘How AI is leveraged to enhance the Intigriti platform’, we have provided multiple insights from the Intigriti team on the development and future of AI, how it impacts programs, and the Bug Bounty community.
So far, we have explored:
‘How AI is changing vulnerability discovery’, with COO, Ed Parsons.
‘Common AI misconceptions [...]
See full content
May the 4th be with you
on 04/05/2026
See full content
Stop Using AI Connectors Until You Watch This
on 04/05/2026
See full content
One ChatGPT connector. One email. Full AI agent hijack. #BugBounty #PromptInjection #ai #hacking
on 04/05/2026
See full content
RatLabs - RootBase CTF - Hack My Machine!
on 04/05/2026
See full content
Cyber Risk Is Now a Velocity Problem
on 04/05/2026
See full content
Introducing Wallarm Middle East Cloud: Built for Data Residency Compliance
by Tim Erlin on 04/05/2026
As API and AI adoption grows across the Middle East, so do the expectations around how data is handled.
For many organizations operating in this region, it’s not just about securing applications. It’s about doing it in a way that keeps data in-country and aligned with local requirements.
Today, we’re introducing the Wallarm Middle East Cloud Point of Presence (POP), giving organizations a n [...]
See full content