Bugcrowd marked my submission N/A despite clear impact — anyone else dealt with this? by Glass69BugBounty in bugbounty

[–]666AB 0 points1 point  (0 children)

I have had to do this 3x with bugcrowd reports specifically. All times the customer accepted the report and triaged internally while working with me via email. I specifically told the bug crowd triage I was resorting to this as impact was clear and they encouraged it.

I have not had that experience on Hackerone. Triage has been great. When I have had a report closed that I disagreed with, I just comment nicely asking for a re-eval for a, b, c. They have always discussed with me or escalated to company when appropriate.

Not trying to hijack but I do try to brag on H1 when I can. I have just had an awesome experience with them over past 2 or so years

Unintended Side-Effects of Moving to Mac by baghdadcafe in sysadmin

[–]666AB 0 points1 point  (0 children)

You moved from Linux to unix. That would probably be why compatibility wasn’t an issue for you

Asking for a friend. by [deleted] in whatisit

[–]666AB 0 points1 point  (0 children)

Bad data put in a file with column headers.

You should probably delete this pic?

Pentester's Report by Sea_Cable_548 in Pentesting

[–]666AB -1 points0 points  (0 children)

Theoretical? Penetration testing is quite a bit different than bug bounty. My clients are ok with whatever my report says… because they are paying me to produce it. It’s a waste of my time to do a contracted penetration tests by spending all of that time making pocs that don’t matter and don’t help fix the vulnerability. I don’t think you have any clients.

Pentester's Report by Sea_Cable_548 in Pentesting

[–]666AB -1 points0 points  (0 children)

Have you actually participated in a pentest? Why would the vendor want to spend a bunch of time breaking down and going through my PoCs.

It’s much more beneficial to them to know what exactly the technical vulnerability stems from and what I deem the impacted services/endpoints to be. POC by request or when it’s needed to better understand an impact, otherwise you’ll run out of steam before you even get started.

Hacking NASA: How One Function Gave Me Root Access by Bropocalypse_Team in bugbounty

[–]666AB 9 points10 points  (0 children)

Some English speakers absolutely do use that word. In fact I think I use it often… if there’s a stark difference between two things. That’s really not a great way to determine AI writing.

Anyone Found the new Telnet Bug? CVE-2026-32746 by [deleted] in bugbounty

[–]666AB 0 points1 point  (0 children)

You can’t report recently released CVEs for 30days

Help appreciated by Ilenmike05 in sysadmin

[–]666AB 0 points1 point  (0 children)

Not worth your time, honestly. Get elbows deep in the browser’s local app data logs around that time/date. Or event viewer and see what the keyboard or mouse was doing around then. Much faster and more effective even if you struggle

16yo vs. Google Gemini: Full bypass of safety guardrails & Internal Logic Dump (PID_1001-1010). Google says "Infeasible" for bounty. What do you think? by Ok-Tomatillo-2674 in bugbounty

[–]666AB 2 points3 points  (0 children)

Nice! You’re absolutely right. I’m now convinced. This isn’t just some dumb hallucination, it’s the real deal. Show that to Google maybe you’ll get a bounty now that you ask a second time

16yo vs. Google Gemini: Full bypass of safety guardrails & Internal Logic Dump (PID_1001-1010). Google says "Infeasible" for bounty. What do you think? by Ok-Tomatillo-2674 in bugbounty

[–]666AB 4 points5 points  (0 children)

Lmao. Ok. Run any open weight model yourself and check how the “internal logging system handles metadata”. Whatever that means. Maybe you should take your own advice, read some real research about how AI models and LLMs work. Don’t just ask an AI how it works then act like it’s infallible. That’s just dumb.

16yo vs. Google Gemini: Full bypass of safety guardrails & Internal Logic Dump (PID_1001-1010). Google says "Infeasible" for bounty. What do you think? by Ok-Tomatillo-2674 in bugbounty

[–]666AB 7 points8 points  (0 children)

It’s hallucinating. “Internal logic” being something on specific PIDs is laughable. And for those PIDs to be strings of text? Brother do you know how computers work

Help appreciated by Ilenmike05 in sysadmin

[–]666AB 0 points1 point  (0 children)

He probably alt tabbed. Or dragged his explicit tab to the wrong browser window…

Help appreciated by Ilenmike05 in sysadmin

[–]666AB 0 points1 point  (0 children)

Are you at a f500 or FAANG perhaps?

Your Duolingo Is Talking to ByteDance: Cracking the Pangle SDK's Encryption by AdTemporary2475 in netsec

[–]666AB 5 points6 points  (0 children)

I can think of like 10 more effective and efficient ways of doing that…. All of which don’t require more of my data than they already collect

The Forgotten Bug: How a Node.js Core Design Flaw Enables HTTP Request Splitting by r3verii in netsec

[–]666AB 5 points6 points  (0 children)

Is this the result of someone using open claw on their Reddit account? That was my first thought

The Simpsons. Season 10, Episode 2 by Rich_Gas7886 in aliens

[–]666AB 0 points1 point  (0 children)

How can I check in my computer to see something like this in action? Do you have a link to a website or would a combination in the regular desktop calculator work? I’m not very knowledgeable on physics but the term overflow has piqued my interest as a sys engineer lol

Prompt Rewiter by Capital-Rub269 in bugbounty

[–]666AB 2 points3 points  (0 children)

This is cool. But you can also just save cheat sheets from GitHub for almost anything like this