Switching away from Hackerone is not a guarantee... Here we go.

George,

This was pure stupidity from your part (including your AI) and was nothing but rude and pointless.

Please never contact us again.

the guy and his AI found three uses of memcmp() in TLS code and insisted it was a "CRITICAL" side-channel security vulnerability.

A 2-second check of those three uses told us it was not real.

byebye George

@bagder

But memcmp is evil /s

*insert child screaming and shitting all over the ceiling picture here*

@bagder byebye George! 👋
@bagder we received a CVSS 7.5 DoS report because an invalid packet may trigger a int underflow. The packet parsing code then refuses to handle a 4GB packet and closes the session gracefully. The report was entirely AI generated.
@bagder weirdest drinking game ever, too
@bagder so not as unsloppable as I thought :(
@bagder We wouldn’t want you to be bored now, would we?
@bagder Have you considered a reverse bug bounty where users pay to submit reports? It could be a good funding model.
@rev_null @bagder that's something that was mentioned in this blog post, and it mentions a few reasons why that approach wasn't chosen right now.
The end of the curl bug-bounty

tldr: an attempt to reduce the terror reporting. There is no longer a curl bug-bounty program. It officially stops on January 31, 2026. After having had a few half-baked previous takes, in April 2019 we kicked off the first real curl bug-bounty with the help of Hackerone, and while it stumbled a bit at first … Continue reading The end of the curl bug-bounty →

daniel.haxx.se