Filling in the blank: Technical writeup of the tj-actions supply chain attack
Workflow consist of actions Have triggers Actions have inputs and outputs There are secrets
This is my current blog that captures my academic journey and hosts my Capture-the-flag (CTF) write ups :)
I completed my Master’s in Cybersecurity at the Hasso Plattner Institute in Potsdam, Germany. I am now pursuing a PhD at the University of North Carolina at Charlotte focused on Software Supply Chain Security, with a particular interest in securing the build process. I am advised by Marco Vieira
My main CTF-Team is upb/hack.
upb/hack with rank $19$ out of $853$Workflow consist of actions Have triggers Actions have inputs and outputs There are secrets
This Web Application was made to adapt to Polish (drinking) culture :3
I vibe coded a file transfer program. Surely it is secure…
In this CTF, I focussed on the three provided mobile challenges:
CTF challenges concerned about untrusted MCP servers.