<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Welcome to Medusa&#39;s Blog! :tada: on Medusa0xf</title>
    <link>https://medusa0xf.com/</link>
    <description>Recent content in Welcome to Medusa&#39;s Blog! :tada: on Medusa0xf</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 Medusa0xf</copyright>
    <lastBuildDate>Tue, 17 Mar 2026 21:53:25 +0100</lastBuildDate><atom:link href="https://medusa0xf.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>MCP Servers Explained: The New AI Attack Surface</title>
      <link>https://medusa0xf.com/posts/mcp-servers-explained/</link>
      <pubDate>Tue, 17 Mar 2026 21:53:25 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/mcp-servers-explained/</guid>
      <description>MCP Servers Explained: The New AI Attack Surface #What is MCP?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/mcp-servers-explained/featured.png" />
    </item>
    
    <item>
      <title>IDOR Leads to Unauthorized Deletion: How I Earned $500 in Bug Bounty</title>
      <link>https://medusa0xf.com/posts/idor-leads-to-unauthorized-deletion-how-i-earned-500-in-bug-bounty/</link>
      <pubDate>Sat, 08 Nov 2025 11:55:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/idor-leads-to-unauthorized-deletion-how-i-earned-500-in-bug-bounty/</guid>
      <description>During bug hunting, I discovered an IDOR vulnerability that allowed unauthorized deletion of resources across accounts within the same tenant.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/idor-leads-to-unauthorized-deletion-how-i-earned-500-in-bug-bounty/feature.gif" />
    </item>
    
    <item>
      <title>How I Found an Account Takeover Bug in the Forgot Password Flow</title>
      <link>https://medusa0xf.com/posts/how-i-found-an-account-takeover-bug-in-the-forgot-password-flow/</link>
      <pubDate>Tue, 23 Sep 2025 21:55:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/how-i-found-an-account-takeover-bug-in-the-forgot-password-flow/</guid>
      <description>While I was hunting on a target, I came across an acquisition related to it, so I decided to look around the new domain.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/how-i-found-an-account-takeover-bug-in-the-forgot-password-flow/feature.jpg" />
    </item>
    
    <item>
      <title>How I Found a $3000 IDOR Vulnerability in a Delivery App</title>
      <link>https://medusa0xf.com/posts/how-i-found-a-3000-idor-vulnerability-in-a-delivery-app/</link>
      <pubDate>Sat, 13 Sep 2025 20:57:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/how-i-found-a-3000-idor-vulnerability-in-a-delivery-app/</guid>
      <description>Recently, I was hunting on a target that I can’t disclose because of its responsible disclosure program, even though it’s public.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/how-i-found-a-3000-idor-vulnerability-in-a-delivery-app/feature.png" />
    </item>
    
    <item>
      <title>Bypassing Rate Limit in GraphQL</title>
      <link>https://medusa0xf.com/posts/bypassing-rate-limit-in-graphql/</link>
      <pubDate>Thu, 05 Dec 2024 19:43:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/bypassing-rate-limit-in-graphql/</guid>
      <description>What is GraphQL?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/bypassing-rate-limit-in-graphql/featured.gif" />
    </item>
    
    <item>
      <title>Exploiting DOM for Open Redirect Attacks</title>
      <link>https://medusa0xf.com/posts/exploiting-dom-for-open-redirect-attacks/</link>
      <pubDate>Fri, 22 Nov 2024 22:30:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-dom-for-open-redirect-attacks/</guid>
      <description>What is Open Redirect Vulnerability?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-dom-for-open-redirect-attacks/featured.png" />
    </item>
    
    <item>
      <title>Exploiting insecure output handling in LLMs</title>
      <link>https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/</link>
      <pubDate>Sun, 21 Jul 2024 12:42:00 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/</guid>
      <description>Introduction #In the previous blog, I discussed indirect prompt injection and its potential applications.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-insecure-output-handling-in-llms/featured.png" />
    </item>
    
    <item>
      <title>Indirect prompt injection</title>
      <link>https://medusa0xf.com/posts/indirect-prompt-injection/</link>
      <pubDate>Sun, 14 Jul 2024 12:04:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/indirect-prompt-injection/</guid>
      <description>Learn about the risks and techniques of indirect prompt injection in Large Language Models (LLMs).</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/indirect-prompt-injection/featured.gif" />
    </item>
    
    <item>
      <title>Privacy Policy for medusa0xf</title>
      <link>https://medusa0xf.com/policy/</link>
      <pubDate>Mon, 08 Jul 2024 21:34:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/policy/</guid>
      <description>Last updated: July 08, 2024</description>
      
    </item>
    
    <item>
      <title>Exploiting vulnerabilities in LLM APIs</title>
      <link>https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/</link>
      <pubDate>Sat, 29 Jun 2024 22:34:07 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/</guid>
      <description>What is OS command injection?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-vulnerabilities-in-llm-apis/featured.png" />
    </item>
    
    <item>
      <title>Exploiting LLM APIs with excessive agency</title>
      <link>https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/</link>
      <pubDate>Sat, 22 Jun 2024 23:04:07 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/</guid>
      <description>What is Excessive Agency in LLM API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/exploiting-llm-apis-with-excessive-agency/featured.png" />
    </item>
    
    <item>
      <title>What is LLM APIs and how they work?</title>
      <link>https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/</link>
      <pubDate>Tue, 18 Jun 2024 15:04:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/</guid>
      <description>What is an LLM API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/what-is-llm-apis-and-how-they-work/featured.jpg" />
    </item>
    
    <item>
      <title>HTTP Parameter Pollution vs Mass Assignment</title>
      <link>https://medusa0xf.com/posts/http-parameter-pollution-vs-mass-assignment/</link>
      <pubDate>Tue, 04 Jun 2024 22:20:35 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/http-parameter-pollution-vs-mass-assignment/</guid>
      <description>In this blog, we are going to see the difference between HTTP parameter pollution and mass assignment.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/http-parameter-pollution-vs-mass-assignment/featured.png" />
    </item>
    
    <item>
      <title>Understanding and Testing Authentication methods in REST API</title>
      <link>https://medusa0xf.com/posts/testing-auth-methods-in-rest-api/</link>
      <pubDate>Thu, 09 May 2024 21:21:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/testing-auth-methods-in-rest-api/</guid>
      <description>What is Authentication?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/testing-auth-methods-in-rest-api/featured.gif" />
    </item>
    
    <item>
      <title>API Basics: A Hacker&#39;s Starter Guide</title>
      <link>https://medusa0xf.com/posts/api-basics-hsg/</link>
      <pubDate>Thu, 21 Mar 2024 21:42:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/api-basics-hsg/</guid>
      <description>What is an API?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/api-basics-hsg/featured.gif" />
    </item>
    
    <item>
      <title>Exploiting SQL Injection in Graphql | DVGA |</title>
      <link>https://medusa0xf.com/posts/sqli-in-graphql-dvga/</link>
      <pubDate>Sun, 17 Mar 2024 21:39:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/sqli-in-graphql-dvga/</guid>
      <description>This article covers exploiting SQL Injection manually in a Graphql Application.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/sqli-in-graphql-dvga/featured.png" />
    </item>
    
    <item>
      <title>How to Discover API Subdomains? | API Hacking |</title>
      <link>https://medusa0xf.com/posts/api-subdomains/</link>
      <pubDate>Tue, 12 Mar 2024 22:05:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/api-subdomains/</guid>
      <description>How to Discover API Subdomains?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/api-subdomains/featured.png" />
    </item>
    
    <item>
      <title>Server Side Parameter Pollution in Rest API path parameter</title>
      <link>https://medusa0xf.com/posts/server-side-parameter-pollution/</link>
      <pubDate>Mon, 04 Mar 2024 11:50:00 +0001</pubDate>
      
      <guid>https://medusa0xf.com/posts/server-side-parameter-pollution/</guid>
      <description>What is Server Side Parameter Pollution?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/server-side-parameter-pollution/feature.png" />
    </item>
    
    <item>
      <title>How to Perform CSRF Attack in GraphQL</title>
      <link>https://medusa0xf.com/posts/csrf-in-graphql/</link>
      <pubDate>Tue, 16 Jan 2024 22:05:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/csrf-in-graphql/</guid>
      <description>What is a CSRF Attack?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/csrf-in-graphql/featured.png" />
    </item>
    
    <item>
      <title>Broken Object Level Authorization Vs. Broken Functionality Level Authorization | API Hacking</title>
      <link>https://medusa0xf.com/posts/api-broken-auth/</link>
      <pubDate>Mon, 13 Jun 2022 20:55:37 +0100</pubDate>
      
      <guid>https://medusa0xf.com/posts/api-broken-auth/</guid>
      <description>In this blog, we will explore two significant security vulnerabilities: Broken Object Level Authorization (BOLA) and Broken Functionality Level Authorization (BFLA) in APIs.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://medusa0xf.com/posts/api-broken-auth/featured.png" />
    </item>
    
    <item>
      <title>API</title>
      <link>https://medusa0xf.com/topics/api/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://medusa0xf.com/topics/api/</guid>
      <description></description>
      
    </item>
    
    <item>
      <title>Web</title>
      <link>https://medusa0xf.com/topics/web/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      
      <guid>https://medusa0xf.com/topics/web/</guid>
      <description></description>
      
    </item>
    
  </channel>
</rss>
