Software developer and security researcher from Colombia. Focused on web application penetration testing, vulnerability research, and backend development. CVE author and NASA-acknowledged independent researcher. Committed to building and breaking things the right way.
April 2025 – Present
June 2023 – Present
January 2024 – June 2024
Denial of Service via unbounded WebSocket subscriptions in Strawberry GraphQL (+5M downloads/month on PyPI). An unauthenticated attacker can exhaust server resources by opening unlimited subscriptions without triggering any rate limit.
advisory →Privilege Escalation via mass assignment of is_superuser in APTRS's user edit endpoint. A low-privileged authenticated user can escalate to superuser by sending a crafted request that modifies protected fields.
advisory →Unauthenticated access to role-restricted documents in Admidio via a neutralized .htaccess file. File access controls were bypassable without any authentication.
advisory →Missing CSRF protection on custom list deletion in Admidio's mylist_function.php. Allows an attacker to trick authenticated users into deleting arbitrary lists via a forged request.
advisory →Host Header Injection + Open Redirect in the official Heimdall Docker image (LinuxServer.io). Manipulation of the Host header allows arbitrary redirection of authenticated users.
advisory →Authentication bypass vulnerability in Nginx Proxy Manager v2.12.3. Reported via MITRE/NVD.
advisory →More research in progress.
Some findings are under coordinated disclosure.
Vulnerabilities reported and acknowledged in NASA's Vulnerability Disclosure Program.
The real story behind receiving an official Letter of Appreciation from NASA's VDP - the research process, responsible disclosure, and what it means in practice.
Bug BountyA straightforward breakdown of the eWPTXv3 exam: what to study, what to skip, and the techniques that made the real difference on exam day.
CertificationHow the sponge construction and Keccak permutation work under the hood - from state matrix to the foundation of SHA-3.
CryptographyRead all posts on Medium →