- Disclosed.
- Posts
- Disclosed. June 1, 2025: Disclosed. Launch, DistrictCon Junkyard Contest, Evan Connelly’s HackerOne Reflections, and more.
Disclosed. June 1, 2025: Disclosed. Launch, DistrictCon Junkyard Contest, Evan Connelly’s HackerOne Reflections, and more.
The bug bounty world, curated.

Welcome to Disclosed.
Hi there! The vast majority of you are brand new and this is my first post in your inbox. Words can’t communicate how grateful I am that you are taking the time out of your day to review my work. Please let me know if you have any feedback or if there are specific topics and items you’d like to see.
Lots of cool stuff to talk about this week, so let’s just dive in.
In This Issue

Junkyard Contest Offers Prizes for Vulnerability Research [🔗 Tweet]
by @DistrictCon
The Junkyard contest is live on Bugcrowd, offering prizes ranging from $100 to $5,000 in various categories to engage vulnerability researchers while promoting responsible disclosure.
Read the full tweet →
🚨 CALLING ALL VULNERABILITY RESEARCHERS 🚨
The Junkyard is officially open!
Prizes range from $100 to $5,000 for categories like:
☄️ Most Impactful System
👾 Best Meme Target
👏 Most Engaging PresentationSubmit via our Bugcrowd program to demonstrate real technical skill,
— DistrictCon (@DistrictCon)
2:14 PM • May 28, 2025
Launch of Curated Bug Bounty Newsletter 'Disclosed.' [🔗 Tweet]
by @infinitelogins
This tweet announces the public launch of 'Disclosed.', a newsletter tailored for the bug bounty community, focusing on programs, events, and educational resources.
Read the full tweet →
I've been working on something behind the scenes for the past couple of months, and I'm finally ready to share it.
Disclosed. A curated newsletter about the bug bounty world.
Over the last four weeks, I've been quietly publishing weekly issues and
— Harley Kimball (@infinitelogins)
1:10 AM • May 30, 2025
Launch of “Disclosed. Online”. [🔗 Tweet]
by @infinitelogins
This tweet introduces a new automation project designed to aggregate bug bounty profiles.
Read the full tweet →
Built some automation and a directory for aggregating bug bounty profiles. Adding your profile isn't open to the public yet but let me know what you think.
disclosedonline.com/directory#bugbounty
— Harley Kimball (@infinitelogins)
3:43 AM • May 27, 2025
What I Learned From My First 100 HackerOne Reports [🔗 Blog]
by Evan Connelly
Evan Connelly reflects on lessons learned from his first 100 HackerOne reports, offering insights into hacker mindset, report quality, and evolving tooling preferences.
Read the full blog →
Have something you want to Spotlight? Tell me.

Meta Invites Researchers for Exclusive Quest Device Bug Bounty [🔗 Tweet]
by @metabugbounty
Meta is launching an exclusive invite-only bug bounty program for Quest devices, focusing on RCE and EOP vulnerabilities, seeking experienced researchers with added incentives to participate.
Read the full tweet →
We're piloting a new invite-only bug bounty for Quest devices and seeking 1-3 experienced researchers (AOSP experience a plus) for a 6-month participation. The scope will focus on RCE/EOP vulns & exploits.
There will be special incentives on top of the regular bounty payouts,
— Meta Bug Bounty (@metabugbounty)
5:01 PM • May 28, 2025
Recon Village at DEF CON 33 CFP Deadline is June 15 [🔗 Tweet]
by @ReconVillage
An invitation to submit talks for the Recon Village at DEF CON 33, with a submission deadline of June 15.
Read the full tweet →
UK HackerOne Club Hacking Meetup Scheduled for June! [🔗 Tweet]
by @njcve_
An invitation to participate in a hackathon event in London, encouraging attendees to spread the word.
Read the full tweet →
Zoom Reports Major Bug Bounty Program Success and Improvements [🔗 Tweet]
by @Hacker0x01
Zoom outlines significant improvements in its bug bounty program, featuring doubled participation, key vulnerability fixes, and reduced remediation times, showcasing the program’s effectiveness.
Read the full tweet →
Did I miss an important update? Tell me.

SQLi Pentest Toolkit. Unleash your inner hacker — the SQLi… [📓 Blog]
by adce626
This post introduces the SQLi Pentest Toolkit, a web resource for penetration testers focused on SQL Injection vulnerabilities. It covers essential features like a user-friendly UI, diverse SQLi payloads, time-based testing commands, and a section for Google Dorks. The toolkit integrates LOXS for time-based SQLi detection and includes educational videos to enhance learning.
Read more →

New Resource for Caido Plugins Streamlines Setup [🔗 Tool]
by @amrelsagaei
The launch of CaidoPlugins.com offers a centralized resource for Caido-related plugins, including listings and installation guides to save users time.
Read the full tweet →

Open-Source Web App for Bug Bounty Tracking [🔗 Tool]
by @sirmatrixpage
A new open-source web app for bug bounty hunters allows users to track vulnerabilities, save tips, and receive updates through RSS feeds.
Read the full tweet →

BountyOS - Bug Bounty Linux OS [📓 Tool]
by Sirat Sami (analyz3r)
BountyOS is a Debian 12-based Linux distribution specifically crafted for bug bounty professionals and web app security researchers. It offers over 75 essential tools in categories like reconnaissance and testing, easily accessible in live mode. Regular updates and exclusive tools not found elsewhere aim to create a streamlined environment for security researchers.
Read more →
Active Scan++ Enhances OS Command Injection Checks [🔗 Tool]
by @d4d89704243
Active Scan++ has introduced new checks for OS command injection based on recent research, and it is now available through the BApp Store.
Read the full tweet →
Have a favorite tool? Tell me.

Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
📝 Writeup by Omer Mayraz
A serious remote prompt injection vulnerability in GitLab Duo has been identified, potentially leading to source code theft, highlighting a critical security concern.
Read more →

How I was able to Delete Any User Post On Tumbler
📝 Writeup by 0xshehab
This blog post details a discovered vulnerability on Tumblr that allows an attacker to delete any user's post without requiring user interaction. The exploit leverages insecure HTTP method handling and the misuse of the embed_url feature for audio posts.
Read more →
Did I miss an important update? Tell me.

My Bug Bounty Automation Update! [🎥 Video]
by G0LDEN_infosec
This video provides a brief overview of g0lden’s current bug bounty automation setup, highlighting recent changes.
Watch video →
Balancing Bug Bounty Freedom with Hacking Time (Ep. 124) [🎥 Video]
by Critical Thinking - Bug Bounty Podcast
In Episode 124, Justin and Joseph discuss news from the community, offering insights on managing hacking time effectively.
Watch video →
Vibe Coding in Cursor for Cyber Security [🔗 Video]
by @InsiderPhD
This video introduces 'vibe coding' with AI to create custom recon tools but lacks depth in actionable content.
Watch the video →
Advanced GitHub Recon & .git Exposer [🔗 Video]
by @coffinxp7
A video featuring live reconnaissance on a NASA subdomain uncovers sensitive database credentials, demonstrating mass .git directory hunting techniques.
Watch the video →
This Sneaky Malware Uses Cloudflare to Steal Your Password [🔗 Video]
by Ben Sadeghipour (Nahamsec)
This tweet highlights how a simple right-click file deletion can trigger malware deployment, showcasing a technique by @I_Am_Jakoby.
Watch the video →
RCE via deserialization with a class allowlist bypass and DNS exfiltration with Arthur Aires [🔗 Video]
by Bug Bounty Reports Explained
This video demonstrates real-world deserialization RCE exploits, focusing on techniques for bypassing a class allowlist and data exfiltration via DNS.
Watch the video →
Did I miss something? Tell me.

Recon series #5: A hacker’s guide to Google dorking – YesWeHack [📓 Blog]
by YesWeHack
This comprehensive guide to Google dorking illustrates its importance for bug bounty hunters, detailing key search operators that aid effective reconnaissance. It includes practical illustrations for uncovering subdomains, hidden files, and login portals, emphasizing passive reconnaissance methods.
Read more →

Cracking JWTs: A Bug Bounty Hunting Guide — Part 2 [📓 Blog]
by Aditya Bhatt
This article explores exploitation techniques related to JSON Web Tokens (JWTs), focusing on weak signing keys to bypass authentication controls. It includes a hands-on lab walkthrough, using tools like Burp Suite and Hashcat to crack JWTs. The post emphasizes the significance of strong cryptographic practices in security assessments.
Read more →
Essential API Hacking Tips for Bug Bounty Success [🔗 Tweet]
by @intigriti
This tweet shares twelve valuable tips for hacking APIs that bug bounty hunters can apply in their research.
Read the full tweet →
Did I miss something? Tell me.

Real-Time RCE via Less Secure Staging Endpoint [🔗 Tweet]
by Matt Greer (VailSec)
The researcher discovered an employee subdomain with a PDF upload feature, leading to unauthenticated remote code execution due to WAF misconfigurations in both staging and production.
Read the full tweet →
Found an employee subdomain with a PDF upload endpoint blocked by WAF. Discovered a staging subdomain with the same endpoint but the WAF wasn't as strict. Noticed uploads mirrored to prod in real time. Got unauthenticated RCE on both staging and prod.
#bugbountytips#BugBounty
— Matt Greer (@VailSec)
3:21 PM • May 27, 2025
Top 5 Insecure Coding Patterns to Identify Bugs [🔗 Thread]
by André Baptista (0xacb)
This tweet outlines five insecure coding patterns that can help researchers spot overlooked bugs during assessments.
Read the full thread →
Looking out for these insecure coding patterns can help you spot bugs others miss.
Here are 5 insecure coding patterns to look for 👇
— André Baptista (@0xacb)
11:15 AM • May 30, 2025
New XSS Vector Found Exclusively in Safari [🔗 Tweet]
by Gareth Heyes
This tweet highlights a new XSS vector found in Safari, challenging others to identify it without accessing the shared link.
Read the full tweet →
My new favourite XSS vector only on beloved Safari. Can you work it out without looking at the link?
portswigger-labs.net/xss/xss.php?x=…
— Gareth Heyes \u2028 (@garethheyes)
11:37 AM • May 28, 2025
Understanding Prompt Injection and Its Security Implications [🔗 Tweet]
by rez0
The tweet highlights that many prompt injection issues originate from fundamental application security flaws, stressing the need for new solutions as AI evolves.
Read the full tweet →
"Most prompt injection issues are currently basic application security logic issues. This won’t always be the case as AI systems become more autonomous, but is now; and this matters because it’s easy to go to new solutions (model alignment, ML guardrails) when prompt injection is
— rez0 (@rez0__)
1:11 PM • May 30, 2025
Broadening Recon Techniques Beyond Enumeration and Fuzzing [🔗 Tweet]
by RogueSMG
This tweet emphasizes advanced reconnaissance techniques, such as analyzing JavaScript for hidden parameters and reverse-engineering mobile apps.
Read the full tweet →
Recon isn't just Sub enum and dir fuzzing. Go deeper:
- Analyzing JS for hidden endpoints/params.
- Rev-engineering mobile apps - even for just endpoints
- Understanding how different microservices talk to each other.
- Finding old, forgotten dev/staging instances.Welcome #AI,
— RogueSMG (@RogueSMG)
12:19 PM • May 26, 2025
Did I miss something? Tell me.
Did you like this week's drop?Please share feedback. |
Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.