terminatorLM Profile Banner
Liv Matan Profile
Liv Matan

@terminatorLM

Followers
721
Following
254
Media
41
Statuses
133

Cloud Security Researcher

Joined February 2022
Don't wanna be here? Send us removal request.
@terminatorLM
Liv Matan
2 years
Recently I discovered a one-click RCE vulnerability in #Azure that affects Function apps, App services, and Logic apps. The vulnerability enables attackers to fully take over the targeted victim's application and managed identity token. This is the story of #EmojiDeploy ._. 🧵
10
52
166
@terminatorLM
Liv Matan
3 days
With 𝐚 𝐭𝐨𝐭𝐚𝐥 𝐨𝐟 ~18 vulnerability reports across popular Google Cloud products, including several critical and high-severity issues, I’m excited to share that I earned 2nd place in the latest Google LHE! . Huge thanks to the @GoogleVRP team and all the researchers.
Tweet media one
8
4
134
@terminatorLM
Liv Matan
26 days
👻This is GerriScary: a vulnerability I discovered in Google's Gerrit that allowed to hack several projects and affected 18 Google projects including ChromiumOS (CVE-2025-1568), Chromium, Bazel, and Dart. Dive into the full details here:.
6
26
89
@terminatorLM
Liv Matan
2 months
Recently got back from Google’s bugSWAT LHE event in Tokyo 🇯🇵 - focused on AI, and what an experience!.Met old friends, made new ones, and even found some valid vulns in Gemini and other AI products. Can’t wait to the next Cloud bugSWAT in a month!.A big thanks to @GoogleVRP
Tweet media one
Tweet media two
2
0
30
@terminatorLM
Liv Matan
2 months
RT @sivaneshashok: Published a write up on a couple of RCEs @kl_sree @asterfiester and I found in Google Cloud products. We got a $10k bou….
0
28
0
@terminatorLM
Liv Matan
3 months
Say hi to ConfusedComposer😵‍💫- a fresh GCP privilege escalation vuln I discovered in Cloud Composer. This one is a variant of ConfusedFunction, which some of you might remember from my previous blog and recent talks. Shoutout to the @GoogleVRP team :).
1
5
19
@terminatorLM
Liv Matan
3 months
🏃‍♂️Meet ImageRunner: A privilege escalation vulnerability I discovered in GCP Cloud Run. Thank you for the @GoogleVRP team for working closely with us on this one. *Stay tuned for more blogs to come!.
0
4
23
@terminatorLM
Liv Matan
4 months
My Black Hat talk recording “The GCP Jenga Tower: Hacking Millions of Google’s Servers With a Single Package (and more)” is up! .Feel free to watch it and enjoy ;).
0
0
4
@terminatorLM
Liv Matan
8 months
RT @shellyraban: Thanks for featuring my DSLs attack techniques research!.Read all about it in our blog-.
0
2
0
@terminatorLM
Liv Matan
8 months
It was a pleasure to speak at the Intent Summit✅
Tweet media one
Tweet media two
3
0
15
@terminatorLM
Liv Matan
8 months
Special thanks to the amazing @GoogleVRP and the team for the opportunity :).
0
0
2
@terminatorLM
Liv Matan
8 months
Google’s BugSWAT and SecTor were unforgettable:. 🔝Awarded top Google vulnerability researcher for 2024 with 7 other amazing minds.💻Intense, live-hacking Google, including sleepless nights with the best researchers.🎁Presented my research at SecTor in Canada
Tweet media one
Tweet media two
3
1
33
@terminatorLM
Liv Matan
10 months
Feel free to read the full research story in the CloudImposer blog: (11/11)🧵.@TenableSecurity .
0
1
9
@terminatorLM
Liv Matan
10 months
That was wild. Until an unknown PyPI guardrail has stopped me. (10/11)🧵
Tweet media one
1
0
3
@terminatorLM
Liv Matan
10 months
I uploaded my "malicious" package with the same name and version to PyPI, and voila --> hundreds of requests from Google internal servers, validating that I actually ran code on them! (9/11)🧵
Tweet media one
2
0
4
@terminatorLM
Liv Matan
10 months
Turns out that even when pip encounters 2 packages with the same name and the same version, it STILL prioritizes PyPI, the public registry (8/11)🧵
1
0
2
@terminatorLM
Liv Matan
10 months
Not so fast, this is a unique case-study, since this package is version pinned when installed in the Composer service (7/11)🧵
Tweet media one
1
0
2
@terminatorLM
Liv Matan
10 months
I found 1 Google internal packages that is missing from PyPI. What if I could upload a package with the exact same name to PyPI and hijack it? (6/11)🧵.
1
0
2
@terminatorLM
Liv Matan
10 months
With the dependencies list in hand, and by revealing how the package installation works on each and every GCP Composer image, I could execute the attack (5/11)🧵.
1
0
2
@terminatorLM
Liv Matan
10 months
Dependency Confusion was first discovered by @alxbrsn and allows attackers to hijack a package installation process by uploading a package with the same name and a higher version to the public registry (4/11)🧵
1
0
3
@terminatorLM
Liv Matan
10 months
The following Composer's documentation sparked my curiosity. Dependency Confusion attack technique anyone? (3/11)🧵
Tweet media one
1
0
2