Welcome to Disclosed.

Hey there! I’m finally back home from my trip around the world (literally!) and super excited about all the announcements this week. Between crowning the LHE winners, announcing new H1-Elites, and sharing a bunch of new program updates, there’s a lot to cover!

Let’s dive in.

In This Issue

H165 Live Hacking Event Winners Announced in Singapore [🔗 Tweet]
by Hacker0x01

H1-65 live hacking event with @tiktok_us and @okx in Singapore wrapped up and winners have been crowned:

Overall:

For TikTok:

For OKX:

HackerOne H1-468 Winners Announced [🔗 Tweet]
by HackerOne

H1-468 live hacking event in Stockholm wrapped up and winners have been crowned:

Winners:

New H1-Elite Members Announced📍 Global HackerOne Community [🔗 Tweet]

HackerOne welcomes five new H1-Elite members for 2025 — a recognition reserved for the platform’s top security researchers.

New H1-Elites:

Congratulations to the 2025 H1-Elites — a milestone for excellence in ethical hacking!
Explore →

AI Bug Research Awarded at Google VRP Mexico [🔗 Tweet]
by busf4ctor

busfactor and monkehack celebrate a strong finish at Google VRP Mexico BugSwat, earning Best AI VRP Researchers and securing 2nd place overall.
Explore

Have something you want to Spotlight? Tell me.

European Commission’s latest bug bounty tender won by YesWeHack [🔗 Tweet]
by YesWeHack

YesWeHack has secured a significant four-year contract with the European Commission to provide bug bounty services focused on enhancing security for open source assets and improving vulnerability disclosure policies. The initiative aims to strengthen the digital security of EU entities and highlights the value of community-built software in mitigating cyberthreats.
Read More →

HackerOne paid $81 million in bug bounties over the past year [📓 Blog]
by Sergiu Gatlan

HackerOne has distributed $81 million in rewards to ethical hackers within the past year, showing a 13% increase compared to previous years. The platform now hosts over 1,950 bug bounty programs, with the average payout reaching approximately $42,000 per program. This report highlights a sharp rise in AI-related vulnerabilities, particularly with prompt injection flaws increasing by 540%, while traditional vulnerabilities like XSS are on the decline.
Read More →

Immunefi Introduces New Anti-Spam Rules [🔗 Tweet]
by immunefi

Immunefi has rolled out new anti-spam rules as of October 1st to enhance the experience for genuine researchers, affecting new users and those with no paid reports.
Explore →

SimpliSafe Program Launches with Up to $6,000 Payouts [🔗 Tweet]
by Bugcrowd

The SimpliSafe Bug Bounty Program has officially opened, offering rewards of up to $6,000 for identifying vulnerabilities in their smart home security systems.
Explore →

KuCoin Launches Program with Up to $15,000 Rewards [🔗 Tweet]
by TomKuCoin

The KuCoin Bug Bounty Program is now available on Bugcrowd, offering rewards up to $15,000 for vulnerabilities such as RCE, XSS, and beyond across both web and mobile platforms.
Explore →

HackerOne & Portswigger Bionic Hacking Webinar [🔗 Tweet]
by albinowax

Announcing a webinar titled 'Bionic Hacking,' the tweet explores how AI is revolutionizing hacker techniques and strategies for deepening and accelerating exploits.
Explore →

HackerOne Releases 2025 Hacker-Powered Security Report [🔗 Tweet]
by Hacker0x01

The 2025 report, The Rise of the Bionic Hacker, highlights a 210% increase in AI vulnerabilities, a 540% surge in prompt injection reports, and that 67% of researchers use AI to speed up their workflows.
Explore →

NetScaler Launches Public Bug Bounty Program [🔗 Tweet]
by Hacker0x01

Cloud Software Group has officially launched a public bug bounty for NetScaler on HackerOne — inviting global security researchers to help uncover vulnerabilities and strengthen defenses.
Explore →

HTB x HackerOne AI Red Teaming CTF Concludes [🔗 Tweet]
by Hacker0x01

The HTB x HackerOne AI Red Teaming CTF wrapped up with 500+ participants testing AI systems’ limits.
🏆 Congrats to the Top 3 and Top 10 for their creativity and persistence.
Explore →

Mind Cathedral in Progress [🔗 Tweet]
by Bugcrowd

In just one week of Hacker Showdown: Mind Cathedral:
🐞 50+ teams found high-impact vulnerabilities
📬 300+ submissions logged
👑 Black Hat Cartel led with 20+ vulnerabilities

Top finds: Broken Access Control, Privilege Escalation, Sensitive Data Exposure, XSS.
Explore →

ProConnect Launches Public Program [🔗 Tweet]
by YesWeHack

YesWeHack launches a public bounty for ProConnect, an open-source authentication platform supported by @Numerique_Gouv.
💰 Rewards up to €5,000 for valid reports.
Explore →

Google Announces Dedicated AI Vulnerability Reward Program [🔗 Tweet]
by GoogleVRP

Google has introduced a new AI Vulnerability Reward Program (AI VRP) that builds on its earlier efforts to reward security and abuse-related bug reports in AI products, offering up to $30,000 for high-impact findings. The updated program clarifies scope, unifies abuse and security reporting, and focuses on technical vulnerabilities—excluding content-related issues like jailbreaks or alignment flaws, which should instead be reported through in-product feedback.
Explore →

Did I miss an important update? Tell me.

graphql-cop [📁 Tool]
by dolevf

GraphQL Cop is a Python utility built for security audits of GraphQL APIs, targeting vulnerabilities like alias overloading and information leaks. It boasts CI/CD integration, providing detailed vulnerability outputs with reproducible cURL commands. This lightweight tool is designed for both manual and automated security testing in GraphQL environments.
View the tool →

HTML-Search-Engine---Chrome-extension [📁 Tool]
by dirtycoder0124

This Chrome extension autonomously scans web pages and internal links for user-defined keywords, storing results and issuing alerts. Its functionality is crucial for bug hunters looking to pinpoint vulnerabilities like XSS via parameter discovery. The extension is lightweight, easy to install, and provides real-time scanning, making it effective for security testing across diverse web applications.
View the tool →

file_upload_payloads [📁 Tool]
by h6nt3r

This GitHub repository offers a collection of payloads specifically for exploiting reflected cross-site scripting (rxss) vulnerabilities in file uploads. Each payload highlights different attack vectors relevant in bug bounty contexts, providing various file formats and exploiting methods, to assist researchers in real-world applications.
View the tool →

Gemini-API-Key-Exposure-Scanner [📁 Tool]
by MuhammadKhizerJaved

The Gemini API Key Exposure Scanner validates Google API keys against Gemini endpoints to assess their capabilities. It provides a capability matrix of available models, conducts safe probes for diverse functionalities, and can auto-generate comprehensive Markdown reports for seamless integration into bug bounty platforms. User-friendly and easy to install, the tool is crafted for active researchers.
View the tool →

Have a favorite tool? Tell me.

Exposure of Personal Information of Oscar Nominees [🔗 Tweet]
by galnagli

A significant data leak revealing home addresses and phone numbers of Academy Award nominees underscores vulnerabilities in data management processes leading up to the Oscars.
Explore →

Deep Dive into NPM Software Supply Chain Attack Techniques [🔗 Tweet]
by 0xLupin

Teasing an upcoming in-depth article, this tweet will detail innovative techniques for hacking the npm software supply chain, offering valuable insights for bug bounty hunters.
Explore →

Did I miss an important update? Tell me.

World's First Hackbot Show & Tell Video of @BugBountyDEFCON’s CTF [🔗 Tweet]
by ethiack

This tweet announces a video showcasing a hackbot demonstration, though it lacks specific insights into security techniques.
Explore →

These Hackers Made $40,000 Doing This [🎥 Video]
by NahamSec

Using Caido and ffuf, the video chains an LFI-exposed incident report, extracted admin credentials, and a Groovy console RCE to replicate a $40K bounty.
Watch full video →

All You Need to Start Bug Bounty: The 3 Essentials [🎥 Video]
by AmrSec

A focused, beginner-friendly guide that strips down bug bounty to just three must-have tools or techniques.
Watch full video →

Gr3pme’s Full-Time Hunting Journey & AI Research Update [🎥 Video]
by Critical Thinking - Bug Bounty Podcast

In this episode of Critical Thinking – Bug Bounty Podcast, Rez0 and Gr3pme discuss WebSocket research, Meta’s $111,750 bug, PROMISQROUTE, and what it’s like going full-time in bug bounty.
Watch full video →

Automate Bug Bounty Using Kali Linux AI MCP Server [🎥 Video]
by ZeroDay Gym

The video demonstrates how to install and configure the new MCP Kali server on Kali Linux, connect it to an LLM (the creator uses GitHub Copilot in VS Code), and run commands through the model to control the machine. The presenter then tests the setup against a portfiger.net reflected XSS lab — the LLM quickly finds and proves the XSS with a pop-up alert while a Nikto scan fails to detect it.
Watch full video →

Did I miss something? Tell me.

How to find RCE: A list of pathways and detection methods | Bugcrowd [📓 Blog]
by Luke (hakluke) Stephens

This comprehensive guide details techniques for identifying and exploiting Remote Code Execution (RCE) vulnerabilities, focusing on command injection, unsafe code evaluations, and server-side template injections. It discusses various contexts and offers practical tips for confirming and escalating RCE vulnerabilities effectively.
Read more →

How to test NextJS applications [📓 Blog]
by Daoud Youssef

This security testing guide for Next.js applications addresses vulnerabilities like SSRF, XSS, CSTI, SSTI, and CSRF. It explains Next.js features crucial for assessments, and recommends testing strategies for template injections and data leaks while discussing specific payloads and tools. The article emphasizes different attack vectors and best practices for safeguarding applications.
Read more →

Hunting for secrets in bug bounty targets | Intigriti [📓 Blog]
by blackbird-eu

This article reviews techniques for discovering secrets in bug bounty programs, including methods like GitHub dorking and analyzing JavaScript files. It guides researchers in locating hard-coded secrets, API keys, and misconfigured files, encouraging the use of practical tools for better reconnaissance outcomes.
Read more →

Workshop on React createElement XSS Now Available [🔗 Tweet]
by ctbbpodcast

Promoting a workshop that focuses on employing React's createElement for identifying XSS vulnerabilities, this tweet is accessible for community members via Discord.
Explore →

Hunting for SSRF vulnerabilities in Next.js targets [📓 Blog]
by blackbird-eu

This blog post examines SSRF vulnerabilities within Next.js, discussing how the framework's functionalities could lead to exposure. It highlights specific vulnerabilities linked to the Next.js Image component and provides examples for exploiting these weaknesses, urging safe testing through public bug bounty programs on Intigriti.
Read more →

Did I miss something? Tell me.

Escalating XSS to SSRF via PDF Generators [🔗 Tweet]
by intigriti

The tweet outlines methods for escalating XSS vulnerabilities into SSRF through misconfigurations in PDF generators, highlighting the risk of sensitive information leakage, including AWS metadata.
Explore →

Leverage Response Manipulation to Discover Hidden Routes [🔗 Tweet]
by 4osp3l

This tweet advises using response manipulation techniques on login panels to uncover hidden routes, potentially leading to the exposure of sensitive user information.
Explore →

Learn 4 Vulnerability Types in 400 Seconds [🔗 Tweet]
by intigriti

In this tweet, a thread is introduced that aims to teach beginners about four different types of vulnerabilities relevant to bug bounty hunting.
Explore →

Team Secures $125,000 Bug Bounty on Hacker0x01 [🔗 Tweet]
by Blaklis_

A team, including Blaklis, boasts a $125,000 bounty secured on Hacker0x01 for identifying a singular bug, illustrating the potential rewards within bug bounty programs.
Explore →

In-Depth Guide to Reflected XSS Attacks [🔗 Tweet]
by Bugcrowd

This tweet leads to a detailed guide on reflected XSS attacks, covering their mechanics, identifying common vulnerability locations, and exploitation methods, underlining the necessity for practice with vulnerable targets.
Explore →

Did I miss something? Tell me.

Did you like this week's drop?

Please share feedback.

Login or Subscribe to participate

Because Disclosure Matters: This newsletter was produced with the assistance of AI. While I strive for accuracy and quality, not all content has been independently vetted or fact-checked. Please allow for a reasonable margin of error. The views expressed are my own and do not reflect those of my employer.

Keep Reading

No posts found