September huntr highlights: huntrs go hard Published by the huntr team
You continue to surprise us, smashing all of our predictions out the water, doubling your contributions to open source, and continuing to have a lasting impression on its security.
ffmpeg-normalize was vulnerable to a Remote Code Execution vulnerability. Asjid Kalam realised that the use of the
exec() is highly discouraged if you accept user input and don't sanitize/escape them. He fixed this by replacing it with
execFile() which mitigates any possible Command Injections as it accepts input as arrays.
d3m0n-r00t disclosed a medium risk prototype pollution vulnerability in the package deep-get-set (which has been downloaded over 170,000 times) it was later fixed by VitorLuizC who created an isSafeKey that receives the Key and returns a boolean value to indicate if it is safe to get.
New bounty detail page
The bounty detail page has a new paint job, giving you even more recognition, and making it easier for you to navigate around each other's submissions and profiles.
Podcast: Bug huntr
Adam Nygate (A-dizz) is the CEO of huntr, and the brain behind the idea. He started in development at a young age when he learnt how to write hacks for COD zombies, and since then has worked around the world as a technologist.
It's an episode full of spoilers, so listen in and find out what is coming next on huntr.dev!
Bug huntr is taking a break - we will be back soon!
huntr of the month 🦸♀️ 🦸♂️
This month's huntr of the month is Alejandro Romero - well done! 👏 👏
With 2 disclosures and 38 fixes, he has made his way up the leaderboard, and is now 4th in the world on huntr! Thank you for helping protect open source, we have awarded you this month's gold huntr of the month badge and will be getting a huntr hoody sent to you shortly! 🏆
A huge thank you to all of you for helping protect open source, we still have a long way to go, but we are excited to continue taking on this mission together!
Until next time...