Disclosure log · independent research

Security advisories.

ADV-2019-01Resolved · vendor patched within 24h

sched.com — Path traversal / improper access control

Affected
sched.com export API endpoints (all events)
CWE
CWE-22 (path traversal) · CWE-284 · CWE-285
Discovered
2019
Disclosure
ISO 29147 — coordinated
Vendor response
Patched within 24 hours · HMAC introduced on export endpoints
Exposure measured
4,467 public events · 1.7M unique email addresses · ~5M user-event records

A double-slash bypass in the export URL handler allowed unauthenticated callers to enumerate data behind authenticated event endpoints. I confirmed the scope by enumerating across all public events and measuring the unique-email count — not to exfiltrate, but to give the vendor a credible exposure number in the GDPR-aligned breach report I provided alongside the technical write-up.

The vendor patched within 24 hours and adopted HMAC-signed export URLs. A notable downstream consequence: after I shared the findings inside a closed Forbes 30 Under 30 group, Facebook’s Associate General Counsel contacted me — not because Facebook was vulnerable, but because Facebook employee accounts were among the exposed emails. Full technical write-up published on Medium.

ADV-2023-01Disclosed · documented publicly

TED AI Platform — Inadvertent user-data exposure

Affected
TED AI conference platform (2023)
Class
Inadvertent data exposure · access control
Discovered
2023
Disclosure
Reported directly to platform operators
Outcome
Banned from platform rather than acknowledged · full disclosure-process documented publicly

I identified that the TED AI app was inadvertently leaking user data through an access-control gap. I reported the finding through the appropriate channel and was subsequently banned from the platform rather than acknowledged. The point of this entry is not the outcome — it is that the disclosure process itself was documented in public, in real time. Future organizers should know that proactive findings about their platform are worth treating as collaborators bring them, not adversaries.

Coordinated-disclosure policy

I follow ISO 29147 (Information technology — Security techniques — Vulnerability disclosure). If you operate a service and want to be told about a finding, the cheapest path is to publish a security.txt at /.well-known/security.txt with a working contact. I will not publish technical details until either you’ve patched or a reasonable disclosure window has elapsed — typically 90 days from initial report.

For commercial security review — OWASP API Top 10 audits, threat modeling, GDPR-aligned breach-report preparation — see the dedicated lane on /hire.

Contact: security@badita.org — PGP key on request.