| Blog | https://blog.haicen.me/ |
| Github | https://github.com/haicenhacks |
| Blog | https://blog.haicen.me/ |
| Github | https://github.com/haicenhacks |
normalize taking away ai powered smart glasses from people wearing the in public and destroying them.
normalize destroying flock, ring, and other smart cameras.
normalize destroying public mass surveillance.
lmao, I've been doing some random searches on GitHub, particularly on repositories that has claude as a contributor. ive found soooo many credentials. OpenAI, Nvidia AI, cloudflare, ssh, postgres, telegram and more.
Often, the commit comes from the repo owner, but several times the commit is authored by Claude. Even with explicit commit messages like "Chore: add bot token".
It is a firehouse of credentials.
- do you want to use google to sign in?
- do you want to add a passkey?
- do you want to add a 2FA token?
- we know you have 2FA but we've sent you an email instead
- this login attempt seems suspicious we've sent you a text about it
- can you click on these buses?
- you failed to click on the buses click on these bicycles instead
- should we save these details for next time?
- do you accept these trackers?
- you can opt out but we've decided it's legitimate interest anyway
- would you like to see a list of our 847 partners we share your data with?
- can we send you desktop notifications?
- can we access your location?
- do you want 10% off for signing up to the mailing list?
- do you want me to translate this page?
- hi I'm your friendly chatbot how can I help?
- oh no you can't buy this, reach out to us for a quote!
- do you want—
I'm tired boss
Today in InfoSec Job Security News:
I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.
So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.
https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc
As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.
Some good news this week: 3 modules I wrote have been accepted and merged into metasploit.

This PR adds three modules I developed to exploit the Xerte Online Toolkits 3.14.0 and <= 3.13.7. Verification Start msfconsole use exploit/multi/http/xerte_authenticated_rce_uploadImage Set...

it just does that sometimes.
#anthro #furry #FurryArt #bird #fursona #OC #OriginalCharacter #art #DigitalArt