π Full-Stack Engineer | Security Researcher
π Experienced with Next.js, Rust, and Web Security
π Seeking full-time/internship roles in Web3 development and smart contract security
π΅οΈ Strong interest in real-world security analysis and open-source contribution
Active participant on HackerOne and Bugcrowd, focusing on application, API, and blockchain security.
Findings:
- Critical: SQL Injection (SQLi), Remote Code Execution (RCE)
- High: Insecure Direct Object Reference (IDOR), Account Takeover
- Medium: Business Logic & Authorization Bypass Vulnerabilities
Highlights:
- Multiple critical and high severity reports accepted & rewarded.
- Skilled in manual testing, recon automation, and exploit development.
- Workflow: Recon β Enumeration β Vulnerability Discovery β Exploitation β Responsible Disclosure
(Yes, I look like this when deep into bug hunting)
β "Building things that matter, breaking things responsibly, and learning every day."
