- Disclosed.
- Posts
- Disclosed. July 13, 2025. McDonald’s Leak, Django Crypto Heist, Rez0's take on Bug Bounty’s Future in the AI era, and more.
Disclosed. July 13, 2025. McDonald’s Leak, Django Crypto Heist, Rez0's take on Bug Bounty’s Future in the AI era, and more.
The bug bounty world, curated.
Welcome to Disclosed.

Each week, 3 readers will win a 1-month PentesterLab Pro license, completely free. Refer a friend to the newsletter to enter.
Shout out to this week’s winners (I will email you):
devos
pandyamayur2018
ameensec
PentesterLab is one of the best hands-on platforms for learning web security, with real-world vulnerabilities, private labs, and practical exercises trusted by professionals and bug bounty hunters worldwide.
Huge thanks to PentesterLab for sponsoring this giveaway and supporting the Disclosed. community. ❤️

Hey everyone!
Writing this post from outside a coffee shop in Seattle. DEF CON is just around the corner, and I couldn’t be more excited for everything we have planned for attendees at Bug Bounty Village.
If you hear about any bug bounty–related parties, events, or meetups happening during Hacker Summer Camp, please let me know so I can help promote them and spread the word!
This week, there have been some phenomenal write-ups from Sam Curry, Ian Carroll, and xEHLE. I don’t know about you, but every time I read about their hacking adventures, I get fired up.
Let’s dive in!
In This Issue

Vulnerability Exposed in McDonald's AI Chatbot Data Access [🔗 Blog]
by Sam Curry
A critical vulnerability in McDonald's AI-powered chatbot, Olivia, risked exposure of over 64 million chat records due to weak password security.
View the blog →
When applying for a job at McDonald's, over 90% of franchises use "Olivia," an AI-powered chatbot. We (@iangcarroll and I) discovered a vulnerability that could allow an attacker to access the over 64 million chat records using the password "123456".
— Sam Curry (@samwcyo)
7:41 PM • Jul 9, 2025
Django ORM Injection Leads to Cryptocurrency Theft in Shooter Game [🔗 Blog]
by xEHLE
A team discovered a Django ORM injection vulnerability in an online shooter game, enabling theft of cryptocurrency from the game’s wallet, as detailed in their writeup.
View the blog →
New writeup:
Early last month, @samwcyo, @sshell_, and I found a Django ORM injection in an online shooter game that let us steal cryptocurrency from the game's wallet.
Read the blog post here:
— xEHLE (@xEHLE_)
3:53 PM • Jul 7, 2025
This Is How They Tell Me Bug Bounty Ends [📓 Blog]
by Joseph Thacker
This piece examines the future landscape of bug bounty programs amid advancing AI. It argues that while automation will reshape methodologies, the demand for skilled human hackers will persist, particularly to tackle complex vulnerabilities.
Read more →

Join Bug Bounty Village Mailing List
by @BugBountyDEFCON
Quick call asking you to join the bug bounty village mailing list so you can stay in the loop on all things BBV. While I post things here, that list is the best place if you’d like to stay updated on all the details.
Join now →
Have something you want to Spotlight? Tell me.

Okta Launches Bonus Bounties for High-Value Vulnerabilities [🔗 Tweet]
by Bugcrowd
Okta is offering a bonus bounty program until August 31, with substantial rewards for vulnerabilities, including XSS, SSRF, MFA bypass, ATO, and RCE, with payouts ranging from $2k to $25k.
Read more →
🎉 BONUS TIME!
Hackers, @okta's running a bonus and it’s officially live through August 31.
Here’s what you’re hunting for and what it’s worth:
🐞 XSS: $2k–$15k
🐛 SSRF (sensitive files/metadata): up to $15k
🕷️ MFA Bypass: up to $25k
🪲 ATO: up to $25k
🤑 RCE in prod: up to— bugcrowd (@Bugcrowd)
5:25 PM • Jul 9, 2025
Swiss Post's 2025 Public Intrusion Test Offers €230K in Rewards [🔗 Tweet]
by YesWeHack ⠵
Swiss Post is set to conduct a Public Intrusion Test starting July 28, 2025, with rewards up to €230K, plus a €3K bonus for the first three confirmed reports.
View the tweet →
Save the date! @swisspost’s 2025 Public Intrusion Test starts on 28 July 🚨
💰 Rewards up to €230K - with the highest payout to date at €40K
🎯 Bonus of €3K for the first 3 confirmed reports
🆕 Write-in fields now in scopeTest the e-voting platform: yeswehack.com/programs/swiss…
— YesWeHack ⠵ (@yeswehack)
12:56 PM • Jul 10, 2025
Launch of 0DIN.ai's Threat Intelligence Feed for GenAI Security [🔗 Tweet]
by MarcoFigueroa
0DIN.ai has unveiled a Threat Intelligence Feed that continuously provides validated jailbreak techniques and misconfiguration insights to boost GenAI security.
Read more →
🚀 Launch Day at 0DIN.ai 🚀
We’re thrilled to unveil two cornerstone products in GenAI security:
🛡️ 0DIN Threat Intelligence Feed: A continuous stream of validated jailbreak techniques, misconfiguration discoveries, and other threats sourced from our research
— MarcoFigueroa (@MarcoFigueroa)
5:15 PM • Jul 7, 2025
Bugcrowd Ingenuity Awards: Winners to Be Announced at DEFCON [🔗 Event]
by Bugcrowd
The Ingenuity Awards honor exceptional hackers and customers who drive innovation and impact in cybersecurity. With categories like Breakthrough Hacker, Top P1 Hacker, Community Leader, Top Pentester, and Global Security Impact, the awards recognize outstanding skill, dedication, and contributions to the community — with winners announced live at DEFCON in Vegas and featured across Bugcrowd’s channels.
View the event →

Did I miss an important update? Tell me.

Cloud Enum Revived [🔗 Tool]
by Harrison Richardson (rs0n)
Rs0n revived and enhanced the unmaintained Cloud Enum tool, adding service and region coverage, advanced controls, and improved S3 enumeration to deliver a more powerful reconnaissance solution for AWS, Azure, and GCP.
View the tool →

Copier: Streamlined Request/Response Copying for Burp Suite [🔗 Tool]
by Tib3rius
Tib3rius enhanced the Burp Suite extension Copier, making it easier for testers to copy requests and responses with automated modifications using custom rules — perfect for removing sensitive data, cookies, or headers before adding to reports. The latest updates include cleaner code, new features, and improved default profiles.
Collect 2500 DNS Records and Probe 600 Hosts per Second [🔗 Tweet]
by Profundis.io
Profundis is a search engine that indexes hosts and DNS records (rather than web pages) to help security professionals discover exposed assets and monitor digital infrastructure. It provides enriched data from public sources, supports advanced search and alerts, and is useful for analysts, researchers, and bug bounty hunters to identify and secure online assets.
View the tool →
Profundis.io is live!
Quickly uncover DNS records, subdomains, hosts, and their historical data directly via your browser.
No noise, just the data you need for asset discovery and security research.
Explore now: profundis.io
— Profundis.io (@profundisio)
7:45 PM • Jun 24, 2025
New BApp Store Tool: UnUnicode for Nested Unicode Decoding [🔗 Tweet]
by BApp Store
Announcing the release of UnUnicode on the BApp Store, this tool automates the decoding of nested Unicode sequences to enhance visibility for manual inspection.
View the tool →
🚀 New on the BApp Store: UnUnicode
🔍 Automatically decode nested Unicode sequences in requests, responses, and WebSocket messages.
🧩 Custom tab for viewing unescaped content, enhancing visibility for manual inspection.
📄 Includes "pretty print" functionality for JSON content— BApp Store (@BApp_Store)
3:34 PM • Jul 8, 2025
Have a favorite tool? Tell me.

From Image Upload to Account Takeover — Chaining Upload, Storage, and CORS Issues in a Real Pentest [📓 Blog]
by Shazilrao
This write-up illustrates a critical vulnerability discovered during penetration testing, where chaining an image upload vulnerability, stored XSS, and CORS issues led to an account takeover.
Read more →

How I Escalated Simple HTML Injection to SSRF via PDF Rendering [📓 Blog]
by Ahmed Tarek
In this blog, Ahmed Tarek chronicles the escalation of a simple HTML injection vulnerability to SSRF through PDF rendering, showcasing his penetration testing insights on a private bug bounty program.
Read more →
Did I miss an important update? Tell me.

Minecraft Hacks to Google Hacking Star - Valentino (Ep 130) [🎥 Video]
by Critical Thinking - Bug Bounty Podcast
In Episode 130, Valentino discusses his evolution from hacking Minecraft to engaging in sophisticated bug bounty challenges.
Watch video →
Bug Bounty Hunters: The JWT Mistake You’re Probably Missing | Practical Demonstration [🎥 Video]
by BePractical
This video explores a vulnerability involving JSON Web Tokens (JWT), demonstrating the implications of misconfigured tokens in a pentesting context.
Watch video →
How to become smarter with NotebookLM (bug bounty in this case) [🎥 Video]
by atomiczsec
This tutorial on using Notebook LM educates bug bounty hunters on studying various vulnerabilities by generating guided study materials.
Watch video →
Hacking Blogs on Medium — Hits, Misses & WTF Moments [🎥 Video]
by Medusa
This video reviews vulnerabilities discussed in recent Medium bug bounty blogs, offering practical takeaways on exploiting security flaws.
Watch video →
JinjaCare - HackTheSystem CTF [🎥 Video]
by 0xdf
A deep dive into Server-Side Template Injection (SSTI) demonstrated through Hack The Box CTF challenges, illustrating real-world exploitation techniques.
Watch video →
Master Your Recon: The Ultimate Bug Bounty Recon Checklist [🎥 Video]
by 𝙇𝙤𝙨𝙩𝙨𝙚𝙘
This comprehensive guide covers advanced subdomain enumeration techniques that enhance vulnerability discovery for bug bounty hunters.
Watch video →
Maximize Your Bug Bounty Workflow With CaidoIO Tools [🔗 Video]
by YesWeHack ⠵
In this video, Pwnii explores advanced features and customisation, including plugin usage like QuickSSRF, AuthMatrix, YesWeCaido, Param Finder, and more.
Watch video →
Did I miss something? Tell me.

The ultimate guide to Bug Bounty recon and footprinting [📓 Blog]
by YesWeHack
This comprehensive guide compiles six articles on vital bug bounty reconnaissance techniques, focusing on methods to gather intelligence on target systems effectively.
Read more →

ZoomEye Dorking with Nuclei. Mass Dork Crafting + LLM Prompts for… [📓 Blog]
by AbhirupKonwar
This blog details leveraging ZoomEye in conjunction with Nuclei for effective dork query creation to automate vulnerability scanning, showcasing practical applications.
Read more →

GitHub - amrelsagaei/Bug-Bounty-Hunting-Methodology-2025: Bug Bounty Methodology 2025 [📁 Tool]
by amrelsagaei
This methodology guide outlines essential steps for ethical hackers in bug bounty processes, detailing tools and techniques for effective reconnaissance and vulnerability assessment.
Read more →

Essential Recon Techniques for Bug Bounty Hunters [🔗 Tweet]
by YesWeHack ⠵
This tweet provides a recap of a six-part series focused on critical recon techniques, suitable for both new and aspiring bug bounty hunters.
Read more →
Do you know how to perform port scanning, subdomain enumeration, HTTP fingerprinting and other intel-gathering activities? 🤔 Check out this recap of our six-part series on the recon techniques you need to know to thrive as a #BugBounty hunter 👇
— YesWeHack ⠵ (@yeswehack)
9:23 AM • Jul 10, 2025
Common OAuth 2.1 Mistakes in Remote MCP Security [🔗 Tweet]
by Ron Chan
This tweet directs developers to a resource identifying frequent mistakes in OAuth 2.1 related to Remote MCP Server security, aiding in better security practices.
Read more →
Working with Remote MCP Servers?
We read "The 'S' in MCP Stands for Security" by Elena Cross and went down the OAuth 2.1 rabbit hole...
Turns out, a lot of devs are making the same mistakes, take a look if you are one of them 👇
novasecurity.co.nz/the-s-in-mcp-s…
— Ron Chan (@ngalongc)
8:32 AM • Jul 7, 2025
Hacking Web: Account Takeover (ATO) Attacks [📓 Blog]
by Israel Aráoz Severiche
Drawing attention to Account Takeover vulnerabilities, this article discusses exploit techniques that can aid researchers in identifying weaknesses in web applications.
Read more →
Web Application Firewall (WAF) Bypass Techniques that Work in 2025 [📓 Blog]
by Karthikeyan Nagaraj
The article presents practical techniques for bypassing WAF protections in 2025, highlighting the need for ongoing updates and layered security approaches.
Read more →
Overcoming Procrastination in Bug Bounty Programs [🔗 Blog]
by trieulieuf9
Promoting an article aimed at beginners facing procrastination in bug bounty work, underscoring the urgency of proactive participation.
Read more →
Did I miss something? Tell me.

Comprehensive SSTI and CSTI Payloads for Bug Bounty [🔗 Tweet]
by thereceman
A tweet sharing a cheat sheet of test payloads for server-side and client-side template injection, beneficial for researchers.
Read more →
Bug Bounty Cheat Sheet
SSTI / CSTI test payloads
— Anton (@therceman)
8:22 PM • Jul 11, 2025
Using Reverse CNAME Lookups for Subdomain Takeover Hunting [🔗 Tweet]
by Abdullah
A strategy shared for using reverse CNAME lookups to hunt for potential subdomain takeovers on vulnerable services.
Read more →
When hunting for subdomain takeovers, a great trick is doing reverse CNAME lookups on known vulnerable services. Among all services I had success finding more subdomains via this great tool @profundisio
Query :
value:*.cname.xyz AND type:CNAME AND host:*.domain.com#bugbounty
— Abdullah (@abd_4fg)
12:23 PM • Jul 10, 2025
Exploiting Booking Deletion via IDOR Manipulation [🔗 Tweet]
by VIEH Group
This tweet outlines how manipulating request structures through an insecure IDOR vulnerability led to unauthorized booking deletions.
Read more →
Someone was able to delete anyone's Booking. But this was so tricky, not an easy IDOR
Original Req:
DELETE /api/bookings?bookings=3777104Response:
Invalid Bookings = > 400 BadModified req:
DELETE /api/bookings?bookings[]=3777104Response:
200 OK#bugbountytips#BugBounty
— VIEH Group (@viehgroup)
1:07 PM • Jul 10, 2025
Google Docs Adds Markdown Export for Simpler HTML Conversion [🔗 Tweet]
by James Kettle
Google Docs introduces markdown export to facilitate easier HTML conversion, enhancing document formatting capabilities.
Read more →
Google docs now supports export as markdown! This was probably done for LLM's benefit, but it's perfect for regexing into clean, minimalist HTML:
— James Kettle (@albinowax)
1:48 PM • Jul 10, 2025
Optimism in Bug Bounty: Thriving Opportunities Ahead [🔗 Tweet]
by zseano
Highlighting the current growth in the bug bounty industry, this tweet underscores the positive impacts of AI on research efforts.
Read more →
bug bounty industry is so fucking good these days… so many programs, good payouts, wide scopes. We are truly blessed 😇 get stuck in, there are bugs out there, and lots of them ! (And no AI isn’t close to replacing us, it’s helping us more than ever)
— zseano (@zseano)
7:28 AM • Jul 8, 2025
Exploring Android Apps with Drozer Tool [🔗 Tweet]
by YesWeHack ⠵
The tweet introduces Drozer, a tool that aids security researchers in discovering vulnerabilities in Android applications.
Read more →
📱 Want to pwn Android apps from the inside? Let’s talk about Drozer, one of the most powerful tools for Android app security.
It allows you to explore and interact with internal app components (like Activities, Services, Broadcast Receivers, and ContentProviders) to uncover
— YesWeHack ⠵ (@yeswehack)
8:21 AM • Jul 8, 2025
Five Steps to Writing Effective Semgrep Rules [🔗 Tweet]
by spaceraccoon | Eugene Lim
A succinct outline of five key steps for crafting more accurate Semgrep rules, aimed at reducing false positives during code analysis.
Read more →
Struggling to write accurate Semgrep rules that minimize false positives?
Here's are 5 steps I take when writing Semgrep rules:
1️⃣ Start with an exact match - Nail the vulnerable pattern first
2️⃣ Add metavariables - Generalize parts like function names or arguments
3️⃣ Use— spaceraccoon | Eugene Lim (@spaceraccoonsec)
5:01 PM • Jul 6, 2025
Chrome's New Framebusting Intervention Aims to Thwart Exploits [🔗 Tweet]
by Critical Thinking - Bug Bounty Podcast
Recent announcements from the Chrome/Blink team on the Framebusting Intervention highlight efforts to counter an exploit primitive involving cross-origin iframes.
Read more →
The Chrome/Blink team recently announced an Intent to Prototype called Framebusting Intervention, targeting a exnploit primitive: using cross-origin iframes to navigate the top-level window via window .top .location.
— Critical Thinking - Bug Bounty Podcast (@ctbbpodcast)
4:30 PM • Jul 5, 2025
New Cache Poisoning Vulnerability Discovered in Next.js [🔗 Tweet]
by zhero
A newly identified cache poisoning vulnerability in Next.js (CVE-2025-49826) results in indefinite caching of 204 responses, impacting specific versions.
Read more →
new discovery: cache poisoning on next.js - CVE-2025-49826
indefinite caching of a 204 response, rendering the affected pages inaccessible
affected versions: >15.0.4 and <15.2.0
there will be no research paper for this one
— zhero; (@zhero___)
8:22 PM • Jul 5, 2025
Exploring Cursor's Automated Hackbot for SQL Injection [🔗 Tweet]
by sw33tLie
A look at how Cursor's built-in hackbot features can automate solutions for SQL injection vulnerabilities, as demonstrated via a PortSwigger lab video.
Read more →
Many don’t realize they already have a powerful, fully autonomous, free hackbot on their computer.
If you’re using Cursor, you’ve got it.
Here's Cursor solving a @PortSwigger webacademy SQL injection lab! #bugbounty
— sw33tLie (@sw33tLie)
4:53 PM • Jul 7, 2025
Effective Techniques for Discovering SSRF Vulnerabilities [🔗 Tweet]
by Pratik Dabhi
This tweet shares essential strategies for uncovering SSRF vulnerabilities, leveraging parameter testing and Burp Collaborator for blind SSRF.
Read more →
🪝 Dig Deep for SSRF Bugs
• Find url=, domain=, path= parameters
• Test cloud metadata IPs (AWS: 169.254.169.254)
• Try protocols: file://, gopher://
• Burp Collaborator = best friend for blind SSRF
• Analyze image converters,#bugbounty#bugbountytips#infosec
— Pratik Dabhi (@impratikdabhi)
4:24 PM • Jul 1, 2025
Did I miss something? Tell me.
Did you like this week's drop?Please share feedback. |
Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.