Building Hacker Communities Bug Bounty Village, getDisclosed... #208
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Context: This episode/video features Harley Kimball and Ariel Garcia discussing realistic bug‑bounty training environments (Bug Bounty Village at DEF CON) and a concrete Supabase misconfiguration incident in the getDisclosed project, plus related tooling and large‑scale target hunting. (Source: criticalthinkingpodcast.io episode linked from the video)
Stack and data flow (getDisclosed):
• Automations: n8n workflows populate a Supabase Postgres database.
• Frontend:...
🔧 Technical Details
Abusing server‑side Auth when UI blocks signup: If a frontend hides the signup path but the backend (e.g., Supabase Auth) still permits
/auth/v1/signup, attackers can directly create accounts via API using the public anon key. Always disable signup server‑side if you intend invite‑only flows.Bypassing intended RLS via exposed Postgres views: Exposing a view to hide sensitive columns can change privilege evaluation. If the view’s exposure effectively runs with elevated owner/admin context, API clients may perform writes that RLS should block. Treat each exposed view as a first‑class surface: verify anon/auth roles cannot write unless explicitly intended.
Salesforce Aura reconnaissance at scale: Programmatically enumerate Aura endpoints, list custom objects, query records, and fetch attachments across large scopes (e.g., Chaos datasets). This yields repeatable data‑exposure bugs when access controls are misconfigured.
CSP/HTML sa...
🤖 Agent Actions
I explored the repository and found an existing, relevant page: src/pentesting-ci-cd/supabase-security.md. It already covered basic Supabase API usage and default signup behavior but was missing the key hardening and testing guidance described in the blog/video.
What I changed
Updated src/pentesting-ci-cd/supabase-security.md to add three technical subsections:
Added a References section at the end with:
Why here and not elsewhere
Files read (to align style and placement)
Changes implemented
If you want me to also add a dedicated Salesforce Aura reconnaissance page or CSP gadget chain references in HackTricks, I can research and draft a highly technical update, but the podcast did not provide deep technical steps, so I kept this PR focused and accurate.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
🗑️ File Cleanup