
Michael Stepankin
@artsploit
Followers
7K
Following
1K
Media
24
Statuses
295
Security Researcher at @GHSecurityLab
London, England
Joined July 2014
Prompt injections are a serious concern for VS Code Copilot Agent. Discover how attackers can create GitHub issues with harmful instructions and find out how to protect the coding agent effectively.
github.blog
See how to reduce the risks of an indirect prompt injection, such as the exposure of confidential files or the execution of code without the user's consent.
0
6
9
RT @yarlob: The curious case of exploiting locally running web app.
securitylab.github.com
The WebUI component of Deluge is vulnerable to SSRF, unauthenticated arbitrary file read and limited file write. The Deluge client is vulnerable to software update spoofing.
0
3
0
RT @watchtowrcyber: The industry is ablaze w speculation around yesterday's publicly disclosed Veeam Software Backup & Replication RCE vuln….
labs.watchtowr.com
It’s us again! Once again, we hear the collective groans - but we're back and with yet another merciless pwnage of an inspired and clearly comprehensive RCE solution - no, wait, it's another vuln in...
0
56
0
Just submitted a CFP to @ekoparty where I want to talk about breaking Maven repository managers. This is the one of the craziest and fruitful research projects I've done in my career.
3
3
43
RT @tincho_508: So happy to had the chance to present for second time at #BlackHat USA!. I’m already receiving a lot of messages from peopl….
portswigger.net
Through the years, we have seen many attacks exploiting web caches to hijack sensitive information or store malicious payloads. However, as CDNs became more popular, new discrepancies between propriet
0
59
0
Kafka UI can be a juicy target for bug hunters, here is why:
github.blog
In this blog post, we'll explain how we discovered three critical vulnerabilities in Kafka UI and how they can be exploited.
1
26
70
RT @sourceincite: Time to retire some content!. JNDI Injection Remote Code Execution via Path Manipulation in MemoryUserDatabaseFactory: h….
0
46
0
RT @GHSecurityLab: 🚨 New Blog Alert! 🚨.Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities i….
github.blog
Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog...
0
20
0
RT @mmolgtm: In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kerne….
github.blog
In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this...
0
147
0
RT @infosec_au: The SSRF/auth bypass affecting Ivanti Pulse Connect Secure (CVE-2024-21893), is a great example of what can be achieved wit….
assetnote.io
The Ivanti excitement continues! After an authentication bypass and command injection to kick off the year, Ivanti are following with a second authentication bypass and a privilege escalation. On...
0
88
0
RT @pwntester: Discover the latest insights from our @GHSecurityLab team’s audit on @home_assistant security! 🛡️.#C….
github.blog
The GitHub Security Lab examined the most popular open source software running on our home labs, with the aim of enhancing its security. Here's what we found and what you can do to better protect...
0
18
0
RT @mmolgtm: In this post I'll use CVE-2023-4069, a type confusion bug in the Maglev JIT compiler of Chrome that I reported in July, to gai….
0
102
0
RT @kevin_backhouse: Video of my PoC for CVE-2023-43641: out-of-bounds array access in libcue. libcue is used by tracker-miners, which auto….
0
108
0
Some ideas on how to attack and protect mTLS and certificate authentication in my recent blogpost.
Unravel some hidden vulnerabilities in mTLS systems with @artsploit. As presented at @BlackHatEvents and @defcon this year, the research is now available in our blog.
2
7
28