Michael Stepankin Profile
Michael Stepankin

@artsploit

Followers
7K
Following
1K
Media
24
Statuses
295

Security Researcher at @GHSecurityLab

London, England
Joined July 2014
Don't wanna be here? Send us removal request.
@artsploit
Michael Stepankin
7 days
Prompt injections are a serious concern for VS Code Copilot Agent. Discover how attackers can create GitHub issues with harmful instructions and find out how to protect the coding agent effectively.
Tweet card summary image
github.blog
See how to reduce the risks of an indirect prompt injection, such as the exposure of confidential files or the execution of code without the user's consent.
0
6
9
@artsploit
Michael Stepankin
7 months
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵
Tweet media one
8
84
303
@artsploit
Michael Stepankin
11 months
Hyped to speak at @ekoparty in November!.
@ekoparty
Ekoparty | Hacking everything
11 months
Tweet media one
1
4
25
@artsploit
Michael Stepankin
1 year
Just submitted a CFP to @ekoparty where I want to talk about breaking Maven repository managers. This is the one of the craziest and fruitful research projects I've done in my career.
3
3
43
@artsploit
Michael Stepankin
1 year
RT @sourceincite: Time to retire some content!. JNDI Injection Remote Code Execution via Path Manipulation in MemoryUserDatabaseFactory: h….
0
46
0
@artsploit
Michael Stepankin
1 year
We take pet’s security seriously!.
@disclosedh1
publiclyDisclosed
1 year
Mars disclosed a bug submitted by @0xdr34m14: #hackerone #bugbounty
Tweet media one
1
0
6
@artsploit
Michael Stepankin
1 year
RT @GHSecurityLab: 🚨 New Blog Alert! 🚨.Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities i….
Tweet card summary image
github.blog
Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog...
0
20
0
@artsploit
Michael Stepankin
1 year
RT @cfreal_: The first part of the blog series: #Iconv, set the charset to RCE. We'll use #PHP filters and #CVE-2024-2961 to get a very sta….
0
59
0
@artsploit
Michael Stepankin
1 year
RT @mmolgtm: In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kerne….
Tweet card summary image
github.blog
In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this...
0
147
0
@artsploit
Michael Stepankin
2 years
RT @infosec_au: The SSRF/auth bypass affecting Ivanti Pulse Connect Secure (CVE-2024-21893), is a great example of what can be achieved wit….
Tweet card summary image
assetnote.io
The Ivanti excitement continues! After an authentication bypass and command injection to kick off the year, Ivanti are following with a second authentication bypass and a privilege escalation. On...
0
88
0
@artsploit
Michael Stepankin
2 years
RT @mmolgtm: In this post I'll use CVE-2023-4069, a type confusion bug in the Maglev JIT compiler of Chrome that I reported in July, to gai….
0
102
0
@artsploit
Michael Stepankin
2 years
RT @kevin_backhouse: Video of my PoC for CVE-2023-43641: out-of-bounds array access in libcue. libcue is used by tracker-miners, which auto….
0
108
0
@artsploit
Michael Stepankin
2 years
RT @pyn3rd: #CVE-2023-34040 Spring Kafka Deserialization Remote Code Execution
Tweet media one
0
107
0
@artsploit
Michael Stepankin
2 years
Some ideas on how to attack and protect mTLS and certificate authentication in my recent blogpost.
@GHSecurityLab
GitHub Security Lab
2 years
Unravel some hidden vulnerabilities in mTLS systems with @artsploit. As presented at @BlackHatEvents and @defcon this year, the research is now available in our blog.
2
7
28