<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Hacktron AI</title><description>Hacktron autonomously reviews code, finds vulnerabilities, and writes exploits.</description><link>https://www.hacktron.ai/</link><item><title>vinext: Vibe-Hacking Cloudflare&apos;s Vibe-Coded Next.js Replacement</title><link>https://www.hacktron.ai/blog/hacking-cloudflare-vinext/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/hacking-cloudflare-vinext/</guid><description>Cloudflare built a Next.js replacement in a week with AI for $1100. We pointed Hacktron at it to find what the tests missed.</description><pubDate>Fri, 27 Feb 2026 00:00:00 GMT</pubDate></item><item><title>Turning Cluely Into Malware</title><link>https://www.hacktron.ai/blog/hacking-cluely/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/hacking-cluely/</guid><description>How we found a vulnerability in Cluely&apos;s Electron app that let any website silently capture screenshots, record audio, and exfiltrate everything - all because of a missing will-navigate handler.</description><pubDate>Sat, 14 Feb 2026 00:00:00 GMT</pubDate></item><item><title>RCE in Google&apos;s AI code editor Antigravity - $10000 Bounty</title><link>https://www.hacktron.ai/blog/hacking-google-antigravity/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/hacking-google-antigravity/</guid><description>Hacktron AI Research Team discovered a critical RCE in Google’s Antigravity IDE that lets attackers take over your system just by opening a malicious website.</description><pubDate>Sun, 08 Feb 2026 00:00:00 GMT</pubDate></item><item><title>CVE-2026-1731: Pre-Auth RCE in BeyondTrust Remote Support &amp; PRA</title><link>https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/cve-2026-1731-beyondtrust-remote-support-rce/</guid><description>Hacktron AI&apos;s agents identified a critical pre-authentication remote code execution (RCE) vulnerability in BeyondTrust Remote Support (RS) and older versions of Privileged Remote Access (PRA). This has been assigned CVE-2026-1731 with a CVSS 9.9 critical score.</description><pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate></item><item><title>Our commitment to security: Hacktron achieves SOC 2 Type 1 compliance</title><link>https://www.hacktron.ai/blog/soc-2-type-1/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/soc-2-type-1/</guid><description>Hacktron has achieved SOC 2 Type 1 compliance, demonstrating our commitment to robust security practices and protecting our customers&apos; data.</description><pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate></item><item><title>Pwning OpenAI Atlas Through Exposed Browser Internals</title><link>https://www.hacktron.ai/blog/hacking-openai-atlas-browser/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/hacking-openai-atlas-browser/</guid><description>A critical ChatGPT Atlas Browser vulnerability: XSS on an OpenAI subdomain let attackers hijack tabs, leak browsing URLs, and steal OAuth tokens.</description><pubDate>Tue, 02 Dec 2025 00:00:00 GMT</pubDate></item><item><title>Securing Perplexity’s AI Browser from a One-Click UXSS</title><link>https://www.hacktron.ai/blog/perplexity-comet-uxss/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/perplexity-comet-uxss/</guid><description>How Hacktron AI Research team identified and prevented a critical UXSS vulnerability in Perplexity&apos;s AI Browser - Comet.</description><pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate></item><item><title>Auditing JDBC Drivers at Scale with Hacktron CLI</title><link>https://www.hacktron.ai/blog/jdbc-audit-at-scale/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/jdbc-audit-at-scale/</guid><description>How we used Hacktron CLI to audit JDBC drivers at scale, mapping dangerous sinks to user input and turning file primitives into real-world RCEs and bug bounties.</description><pubDate>Fri, 21 Nov 2025 00:00:00 GMT</pubDate></item><item><title>SupaPwn: Hacking Our Way into Lovable&apos;s Office and Helping Secure Supabase</title><link>https://www.hacktron.ai/blog/supapwn/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/supapwn/</guid><description>We hacked our way into Lovable&apos;s office by demoing SupaPwn — a chain that could potentially enable region-wide tenant takeover: event-trigger privilege window, DB superuser, host RCE, SUID escalation, exposed configs, orchestration takeover</description><pubDate>Mon, 17 Nov 2025 00:00:00 GMT</pubDate></item><item><title>Introducing Hacktron AI: An autonomous penetration test of Gumroad</title><link>https://www.hacktron.ai/blog/introducing-hacktron/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/introducing-hacktron/</guid><description>At Hacktron, we&apos;re building collaborative AI agents that act as autonomous security researchers. Learn more about our approach and our AI-driven pentest on Gumroad.</description><pubDate>Thu, 14 Aug 2025 00:00:00 GMT</pubDate></item><item><title>Executing arbitrary Python code from a comment</title><link>https://www.hacktron.ai/blog/python-zip-confusion/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/python-zip-confusion/</guid><description>How a Python comment can turn a file into a ZIP polyglot, tricking the interpreter into running code. Insights from a UIUCTF 2025 challenge and Python&apos;s ZIP parsing quirks.</description><pubDate>Mon, 28 Jul 2025 00:00:00 GMT</pubDate></item><item><title>Hacktron finds pre-auth RCE in Dassault Delmia Apriso</title><link>https://www.hacktron.ai/blog/dassault-delmia-apriso-rce/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/dassault-delmia-apriso-rce/</guid><description>For years, this vulnerability hid in plain sight — missed by multiple audits and even used in production by Apple. In just ten minutes, Hacktron exposed a full pre‐auth RCE path.</description><pubDate>Tue, 03 Jun 2025 00:00:00 GMT</pubDate></item><item><title>Hacktron finds another pre-auth RCE variant in Ivanti EPMM</title><link>https://www.hacktron.ai/blog/ivanti-epmm-variant-analysis/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/ivanti-epmm-variant-analysis/</guid><description>Hacktron AI uncovers a new pre-authenticated RCE variant in Ivanti EPMM by identifying a fresh EL injection sink.</description><pubDate>Fri, 16 May 2025 00:00:00 GMT</pubDate></item><item><title>AI hackers are both a generational threat and a generational opportunity</title><link>https://www.hacktron.ai/blog/ai-hackers-generational-threat/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/ai-hackers-generational-threat/</guid><description>AI hackers will scale cyber threats via automated exploitation, but the same technology can turn this generational risk into an industry-wide defence.</description><pubDate>Thu, 08 May 2025 00:00:00 GMT</pubDate></item><item><title>How can we make AI hack like a human?</title><link>https://www.hacktron.ai/blog/how-ai-can-hack/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/how-ai-can-hack/</guid><description>Why does hacking feel like magic? We dive deep into how human hackers think, and how we can design AI agents to find bugs in complex systems the way top security researchers do.</description><pubDate>Mon, 21 Apr 2025 00:00:00 GMT</pubDate></item><item><title>CVE-2022-23597: Remote code execution on Element Desktop</title><link>https://www.hacktron.ai/blog/element-rce/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/element-rce/</guid><description>We achieved full RCE on Element Desktop by chaining iframe injection, Electron misconfigs, and a V8 exploit to bypass sandboxing and access Node.js APIs from a subframe.</description><pubDate>Sat, 13 Aug 2022 00:00:00 GMT</pubDate></item><item><title>Remote code execution on Discord Desktop</title><link>https://www.hacktron.ai/blog/discord-rce/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/discord-rce/</guid><description>How a chain of XSS, CSP bypass, and Electron misconfigs led to full remote code execution on Discord Desktop. We walk through the technical details, steps, and lessons learned.</description><pubDate>Fri, 29 Jul 2022 00:00:00 GMT</pubDate></item><item><title>CVE-2021-43908: Remote code execution in VSCode restricted mode</title><link>https://www.hacktron.ai/blog/vscode-rce/</link><guid isPermaLink="true">https://www.hacktron.ai/blog/vscode-rce/</guid><description>How we achieved remote code execution in Visual Studio Code&apos;s Restricted Mode by chaining origin leaks, CSP bypasses, and webview message handler flaws.</description><pubDate>Wed, 29 Jun 2022 00:00:00 GMT</pubDate></item></channel></rss>