currently · reading CVEs with coffee application security · independent research

Reachable code,
exploitable paths,
and the notes I take along the way.

I’m roro - an appsec engineer and independent researcher. This is where I write up vulnerabilities I’ve found, publish small tools, and think out loud about how modern software actually breaks.

~/research/2026 - zsh
roro@lab ~ $ cat recent.log
# last entries · press enter to open
2026.04.08 RESEARCH Semgrep Architecture: Comprehensive … /posts/semgrep-architecture/
2026.03.29 CTF Une nuit pour hacker 2026: Thread of … /posts/threadofdoom/
2026.02.07 0DAY Enketo 6.2.1 - Auth-Bypass, SSRF, and … /posts/enketo-auth-bypass-ssrf-xxe-and-file-read/
2025.09.21 CTF Amazon AppSec CTF: HalCrypto /posts/halcrypto/
roro@lab ~ $
  featured · long read

The piece I’d start with.

all posts →
latest · all kinds

Recent posts.

archive →
2026.04.08
ResearchSAST

Semgrep Architecture: Comprehensive Reference

A deep technical reference on how Semgrep works internally - from CLI entry-point and target discovery, through parsing, AST normalisation, pattern matching and taint dataflow analysis, to output formatting.

17 min
2026.03.29
CTFReverse Engineering

Une nuit pour hacker 2026: Thread of Doom

Executive Summary Challenge: Thread of Doom Category: Reverse Engineering Flags: NHK26{VirtualProtect_Overwritten} Binary: NHK_CrackMe_V3.exe (PE32, x86, 43520 …

18 min
2026.02.07
0daySSRF

Enketo 6.2.1 - Auth-Bypass, SSRF, and XXE Browser Abuse to File Read

This article is the result of an OffenSkill Training. It discusses an unauthenticated arbitrary file read vulnerability found in the Enketo software, a web survey manager. The vulnerability, found during a white-box code review session, allows an unauthenticated attacker to read any arbitrary file on the server's by chaining an auth bypass, SSRF, XXE in svg and browser abuses.

10 min
2025.09.21
CTFWeb Security

Amazon AppSec CTF: HalCrypto

Executive Summary Challenge: HalCrypto Category: Web Security Vulnerability: JWT validation bypass via URL confusion with @ symbol Impact: Authentication bypass …

6 min
2025.09.21
CTFWeb Security

Amazon AppSec CTF: PageOneHTML

Executive Summary Challenge: PageOneHTML Category: Web Security Vulnerability: Server-Side Request Forgery (SSRF) via gopher:// protocol Impact: Access to …

5 min
2025.08.05
ResearchCPG

Understanding Code Property Graphs

When I first started developing tools for source code auditing, my primary need was to track tainted data flows through complex codebases during manual code …

22 min