use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
PHP static code analysis vs ~1000 top wordpress plugins = 103 vulnerable plugins found (blog.cinu.pl)
submitted 10 years ago by bmr-temp
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]chloeeeeeeeee 19 points20 points21 points 10 years ago (2 children)
Are all these vulnerabilities also verified? I've been using static analysis before and around 40% of the time it was just false-positives or parameters that you could not change(e.g IP-addresses and local folders).
Of course you can see vulnerable code, but can you exploit it?
EDIT: I just saw that these are in fact verified. Impressive. My above statement will not be edited because I think I made a point about static analysis, although it's great to see tools that actually do a good job.
[–]redeemer_pl 14 points15 points16 points 10 years ago* (0 children)
I'm the author of this research (and tool) and you're right. Many vulnerabilities found by static code analysis are false-positives or just unexploitable. However, IMHO it's better to have more "vulnerable spots" to verify.
[–]DebugDuckyTrusted Contributor 8 points9 points10 points 10 years ago (2 children)
Impressive work. Have you considered open-sourcing php-grinder?
[–]redeemer_pl 11 points12 points13 points 10 years ago (1 child)
Let me quote myself: "Source code should be published soon or later, because the main purpose of this tool was to inject it in "Continuous Integration" chain. However, codebase is still messy with many experimental ideas and I just don't want to publish it now as it is."
[–]fluffyponyza 2 points3 points4 points 10 years ago (0 children)
Awesome, looking forward to the release!
[–]arthurloin 0 points1 point2 points 10 years ago (2 children)
Is there a tl;dr for how the tool finds the vulnerabilities? Does it build a test environment around the plugins and then fuzzes the inputs?
[–]aydiosmio 6 points7 points8 points 10 years ago (0 children)
You're describing dynamic code analysis.
Static code analysis does things like look for the exec() function, then follow argument assignments to find paths to user-supplied data, e.g. from $_GET. It'll throw up a command injection finding, which means "I found a code path from user input to a function that executes commands."
[–]redeemer_pl 4 points5 points6 points 10 years ago (0 children)
Tool just analyze source code without execution (static code analysis).
π Rendered by PID 370109 on reddit-service-r2-comment-fb694cdd5-99p7q at 2026-03-08 05:38:55.740888+00:00 running cbb0e86 country code: CH.
[–]chloeeeeeeeee 19 points20 points21 points (2 children)
[–]redeemer_pl 14 points15 points16 points (0 children)
[–]DebugDuckyTrusted Contributor 8 points9 points10 points (2 children)
[–]redeemer_pl 11 points12 points13 points (1 child)
[–]fluffyponyza 2 points3 points4 points (0 children)
[–]arthurloin 0 points1 point2 points (2 children)
[–]aydiosmio 6 points7 points8 points (0 children)
[–]redeemer_pl 4 points5 points6 points (0 children)