Security researcher. I authored CVE-2026-5189 — a source-level pre-auth RCE in Sonatype Nexus — and spend my weeks finding criticals on hardened, well-tested targets: cross-tenant takeovers, blind SQLi, full-read SSRF, multi-turn prompt-injection chains.
A source-level RCE chain reaching Java deserialization through the request path — a system that sits at the center of global Java & CI/CD pipelines. Discovered during independent research; coordinated disclosure with Sonatype.
Offensive security researcher. Authored CVE-2026-5189 CVSS 9.8 Critical — a source-level Remote Code Execution chain in Sonatype Nexus Repository Manager, a widely-used artifact repository across global Java and CI/CD pipelines. Specializes in AI/LLM agent security — prompt injection, guardrail bypass, and privilege escalation in production LLM systems.
Offensive Security & Pentesting — Web App · Android App · API Security · Source Code Review · Red Team · Purple Team · OWASP Top 10 · OWASP ASVS
AI / LLM Security — Prompt Injection · Guardrail Bypass · LLM Security · Agent Security · System-Prompt Extraction · AI Red Teaming · OWASP Top 10 LLM
Vulnerability Classes — RCE · SSRF · SSTI · IDOR · SQLi (Blind / Time / Boolean) · Stored, Reflected & DOM XSS · CSRF · XXE · Unsafe Deserialization · Hard-coded Creds · JWT · OAuth 2.0 Flaws · Cross-Tenant Access Control · Web Cache Deception / Poisoning · GraphQL · CORS · Path Traversal · WAF Bypass
Tools — Burp Suite Pro · OWASP ZAP · SQLMap · SSTIMap · ffuf · katana · httpx · nmap · Frida · MobSF · JADX · adb · custom Python/Bash tooling
I take on a limited number of offensive engagements outside AppSecure. If you're running a product with real users and care about the hard bugs — send a note.