X (Twitter) - 2024
Reported a web and mobile denial of service affecting private messages, with a 1120 USD bounty.
I'm Molly. I work on full-stack products, security research, infrastructure, and tools. This is where I write about what I build, break, and learn.
A Freebox OS security research diary: two privately reported vulnerabilities self-scored at CVSS 3.1 8.5 and 8.7, one still-under-investigation bug that got me closer than expected to root, and the rediscovery of a decade-old easter egg.
An open-source Azur Lane server emulator written in Go. High performance and scalable architecture.
CLI / MCP / HTTP server designed to index huge codebase to allow semantic searching for humans or LLMs.
Proof of concept MFA authentication method using PGP keys.
An org-wide secrets scanner that runs on every GitHub push and routes hash-only findings to Slack and a read-only dashboard. Used at Galadrim.
Reported a web and mobile denial of service affecting private messages, with a 1120 USD bounty.
Identified and reported an access control flaw allowing a paywall bypass.
Validated exploitability on production applications managed by Galadrim and coordinated remediation with development teams.
Reported a stack overflow leading to denial of service.
Reported an IDOR exposing personally identifiable data for roughly 250 EUR in bounty.
Reported two vulnerabilities affecting Freebox OS, enabling one-click account takeover.
Reported a memory corruption issue in the HTTP client/server library.
Reported weak cryptographic practices and non-robust implementations.