Independent security researcher specializing in manual source code auditing across low-level systems: blockchain VMs, cryptographic libraries, embedded engines, and infrastructure platforms. No automated scanners. Every finding comes from reading code line by line in containerized environments.
Currently working on AI training data systems for frontier model development and conducting security research across multiple bug bounty programs.
| TryHackMe | Top 1% + KOTH Player |
| CVE | Assigned (Integer Overflow, C) |
| Bug Bounty | Active on HackerOne |
| Disclosure | Vulnerabilities responsibly disclosed in production systems |
Languages
Security
Cloud & Infrastructure
DevOps & Tools
| Project | Description | Stack |
|---|---|---|
| CVE Discovery | Integer overflow in a monitoring platform's C source. PoC written, CVE assigned. | C Docker |
| Blockchain VM Audit | Resource limit bypass in VM allocator. State rollback inconsistencies in mempool block construction. | Rust Python |
| DeFi Protocol SDK Audit | Missing validation of leaf values, refund outputs, and timelocks in transfer verification. | TypeScript |
| AI Training Pipeline | Task specs, test suites, and QA for frontier AI model training via RL. | C++ Rust Python |
| iExtract | iTunes backup extraction tool for iMessages/SMS to CSV. | Python |
| Home Lab | ESXi servers, pfSense, network monitoring, ransomware recovery drills. | AWS Terraform |
0x4E57

