In a continuous effort to secure applications, I have participated in different bug bounty programs and responsibly coordinated vulnerabilities with the following vendors:





I have also profiles on all major bug bounty platforms:

A complete overview of all coordinated/disclosed vulnerabilities can be found on the following sites:


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.