Get my new book with No Starch Press "From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research" here! 🚀
avatar

Spaceraccoon's Blog

InfoSec and White Hat Hacking

Negative-Days with Vulnerability Spoiler Alert: Three Months Later

35 CVEs caught before publication, with an average lead time of 2 days. Three months of running Vulnerability Spoiler Alert on 10 open-source repos - the numbers, the false positives, and what it takes to make an LLM vulnerability monitor actually work.

Discovering Vulnerabilities in Enterprise Audiovisual Hardware

Some organisations’ most sensitive information is only ever discussed in person. Ironically, the equipment in meeting rooms, conference halls, and other physical locations is often among the least-monitored and most insecurely-configured attack surfaces in an organisation.

Getting a Shell on the Tapo C260 Camera (CVE-2026-0651, CVE-2026-0652, CVE-2026-0653)

I discovered a remote code execution vulnerability on the Tapo C260 after a fun journey of reverse-engineering and understanding its interactions with TP-Link Cloud.

Discovering Negative-Days with LLM Workflows

It’s no longer just about reverse-engineering n-days. You can detect vulnerabilities in open-source repositories before a CVE is published - or even if they’re never published. Here’s how I built an LLM workflow to detect “negative-days” and “never-days”.

Ticket Tricking OpenSSL.org with Google Groups

The Google Groups Ticket Trick vector is alive and well, allowing me to briefly verify an openssl.org email address. Also, vibe-coding security tools is easier than ever.