Skip to main content
Menu
Vulnerability Discovery

Security Research

Vulnerability discovery & methodology

Approach

Vulnerability Research Methodology

I find vulnerabilities by looking for trust assumptions.

Every system — software, human, AI — operates on assumptions about what inputs are valid, what users are authorized, and what data is trustworthy. Vulnerabilities exist where those assumptions don't hold.

This sounds straightforward, but it changes how you approach research. Instead of running automated scanners and triaging outputs, I ask: What does this system trust? Why? What happens when that trust is misplaced?

For WordPress plugins, that means examining how they handle user input, how they verify authorization, and where they assume database-sourced data is safe. For container security, it means questioning what the runtime trusts about the images it executes. For AI systems, it means testing what the model trusts about the prompts it receives.

The methodology stays consistent. The substrates vary.

Process

Disclosure and Testing Methodology

01

Identify Trust

What does the system believe about its inputs, users, and environment?

02

Map Surface

Where can an attacker influence those trusted inputs?

03

Test Boundaries

What happens when trust is violated at the edges?

04

Verify Impact

Can the violation produce meaningful impact?

05

Disclose

Responsible disclosure with complete technical detail.

This methodology applies whether auditing a WordPress plugin or probing an AI system. Find the trust, test the trust, document what breaks.