Guadalajara, MX ๐ฒ๐ฝ
I Spend Most Of My Time Inside Authentication Flows And Permission Models That โShould Be Fineโ.
Bug Bounty Is The Main Game. Private Programs, Quiet Reports, Clean Repro Steps.
- Login State Machines
- Access Control Drift
- IDORs Hiding In Plain Sight
- APIs That Trust The Client
- CI/CD Pipelines With Loose Ends
- Cloud Roles With Too Much Inheritance
Who Says Staring At Code Is Boring?
- Kali ๐
- Burp
- Small Targeted Fuzzers
- Curl Tabs Open For Hours
- Scripts Iโll Rewrite Tomorrow
I Keep Reports Direct.
Impact Clear.
Responsible Disclosure.
- Digital Privacy ๐
- Internet Freedom ๐
- Open Knowledge
- Environmental Sustainability ๐ฑ
- Transparency In Public Systems
- Access To Tech Education
I Void Warranties, and You Can't Stop The Signal. HACK THE PLANET!
