Cybersecurity Engineer | Qrious Secure (@qriousec) & VnSecurity (@vnsec) | First guy pwned v8ctf with 0day | Enterprise Security by Day, Bug finding by Random.

Joined August 2009
Seems this is how they attack WhatsApp on Samsung S24 but I guess it can be done by any one click that can save the jpeg file to gallery and processed by Samsung Gallery.
Someone's really having a lot of fun with DNG. Another (!) DNG vuln patched in 2025-10 Samsung update. Google TAG assesses surveillance vendors may have been aware of this vuln (though not presently clear if deployed ITW or not) project-zero.issues.chromium…
1
71
... exploit for whom? for fun ( for now ) Thanks AI, we having best time :)
Double Kill 🤪 Mozilla team working on the patch, we developing the exploit, no drama needed 😎
1
1
18
On the other side, OpenAI believe AI will use pure reasoning to fing 0day, bold bet! but I hope they can show some v8 0days instead...
Dave Aitel says Google BigSleep AI has the wrong technological take. "I just don't think fuzzing is part of the picture right now. I think reasoning is part of the picture." @daveaitel @craiu @juanandres_gs
5
For others issues including the ffmpeg in ongoing drama my best guess is they found by harness written by AI run on top of mighty CloudFuzz!
Replying to @S1r1u5_
has nothing todo with p0 actually imo, their ( justified) angriness because of their voluntary time being exploited by bigcorp, and now they forced to fix the nonsense issue reported by bigcorp AI, but nevertheless, this particular issue P0 reported seems influenced by some KPI for BigSleep i guess.
2
For QuickJS these vulnerabilities can be categorised by 2 set, set 1 relate to some number handling, set 2 is classic user-handled triggered in middle of js engine execution lead to UAF. You may try to prompt any frontier LLM and see their capabilities:)
Although the target might not be as impactful as some others we ran against, these bugs in QuickJS are some of my favorite Big Sleep finds, because they demonstrate the ability of LLMs to reason about and detect classic JavaScript engine vulnerabilities. issuetracker.google.com/save…
1
10
Look at recents fixed v8 found by BigSleep I guess AI was plugged into the v8 sandbox fuzzer, very powerful bug that used in recent v8ctf entries! issuetracker.google.com/issu… issuetracker.google.com/issu…
Replying to @seanhn
I believe in this case either the target program was a fuzzing harness, or the report was adapted to an existing fuzzing harness to make it easier for maintainers to reproduce.
1
3
56
Got 3 CVE this black tuesday: CVE-2013-3145,CVE-2013-3146,CVE-2013-3151
2
1
3