Breach breakdowns, dork playbooks, and conversations with the hunters using them. Written for security researchers, OSINT analysts, and bug bounty operators.
Anatomies of real-world data exposures and the dorks that surface them.
A researcher typed a malicious instruction into a GitHub PR title. Claude Code, Gemini CLI, and Copilot Agent each read it, obeyed it, and posted their own API keys back as PR comments. No external infrastructure required — GitHub itself became the C2 channel.