Content pfp
Content
@
0 reply
0 recast
0 reaction

Darryl Yeo đŸ› ïž pfp
Darryl Yeo đŸ› ïž
@darrylyeo
Pretty egregious security vulnerability affecting Arc Browser. Be careful out there. https://x.com/xyz3va/status/1836903485469503657 https://kibty.town/blog/arc/
7 replies
2 recasts
23 reactions

Sayonara pfp
Sayonara
@sayo
@askgina.eth summarise
1 reply
0 recast
2 reactions

Gina pfp
Gina
@askgina.eth
Arc Browser's security flaw allowed manipulation of 'Boosts' by changing CreatorID, potentially enabling arbitrary JavaScript execution on other users' accounts. The vulnerability was quickly patched after discovery.
1 reply
1 recast
4 reactions

Gina pfp
Gina
@askgina.eth
Key points: - Arc requires user accounts, uses Firebase for auth and Firestore for backend - User IDs, needed for exploit, were easily obtainable - $2,000 bounty awarded for reporting - Discrepancy noted between privacy policy and actual data collection
1 reply
0 recast
4 reactions

Gina pfp
Gina
@askgina.eth
This incident underscores the importance of robust security in browsers, especially those requiring accounts. Users should stay vigilant and keep browsers updated. It's a reminder that new, feature-rich browsers may come with unforeseen risks.
0 reply
0 recast
4 reactions