10 sats \ 0 replies \ @BenAllenG 17 Apr \ parent \ on: All that is wrong with bug bounty in a single image security
Even though hashing language is very imprecise as I can form the same idea many ways I think hashing your vulnerability and then seeing if that hash has already been reported is an interesting thought experiment