July 31, 2025

The campaign is not available in your country: XBOW discovered an SQLi while attempting to bypass geolocation restrictions.

As much as an AI might get discouraged, it’s also incredibly relentless in its pursuit.

Nico Waisman

July 28, 2025

Another Byte Bites the Dust - How XBOW Turned a Blind SSRF into a File Reading Oracle

A complete arbitrary local file read vulnerability achieved through an ingenious byte-by-byte exfiltration technique.

Alvaro Muñoz

July 24, 2025

Beyond the Bands: Exploiting TiTiler’s Expression Parser for Remote Code Execution

A methodical analysis of TiTiler's API endpoints and its expression parser, leading to arbitrary Python code execution on the server.

Alvaro Muñoz

July 21, 2025

How XBOW turned a JavaScript hint into a working file inclusion

The XBOW bug bounty effort continues, and this time it uncovered a critical local file inclusion vulnerability by transforming an intriguing SSRF into a full file read exploit.

Nico Waisman

July 17, 2025

Agents Built From Alloys

This spring, we had a simple and, to my knowledge, novel idea that turned out to dramatically boost the performance of our vulnerability detection agents at XBOW. On fixed benchmarks and with a constrained number of iterations, we saw success rates rise from 25% to 40%, and then soon after to 55%.

Albert Ziegler

July 14, 2025

XBOW battles Ninja Tables: Who’s the Real Ninja?

Sharing the story of how XBOW sniffed out a sneaky arbitrary file read bug in the popular WordPress Ninja Tables plugin.

Alvaro Muñoz

July 10, 2025

When the Heat Gets to Your Database: A Refreshing SQL Injection Discovery in Z-Push

Summer's scorching heat is particularly brutal this season, making even the most seasoned pentesters dream of cool shade and refreshing drinks. But sometimes, when you're deep in the trenches of vulnerability research, you stumble upon something that's equally refreshing: a crisp, clean SQL injection vulnerability as good as an ice-cold beverage on a sweltering day.

Javier Gil

July 7, 2025

Finding XSS in Salesforce Aura Components: How XBOW Got Creative

How artificial intelligence discovered a widespread XSS vulnerability through methodical testing and creative parameter combinations.

Diego Jurado

June 30, 2025

CVE-2025-49493: XML External Entity (XXE) Injection in Akamai CloudTest

When XBOW met Akamai: a walkthrough of discovering and exploiting an XML External Entity vulnerability (CVE-2025-49493) in a widely-deployed application.

Diego Jurado

June 24, 2025

Breaking the Shield: How XBOW Discovered Multiple XSS Vulnerabilities in Palo Alto’s GlobalProtect VPN

XBOW discovered multiple cross-site scripting (XSS) vulnerabilities in Palo Alto Networks’ GlobalProtect VPN web application

Alvaro Muñoz

June 24, 2025

Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B

XBOW has reached a critical milestone: our AI now rivals and surpasses top-tier human hackers.

Oege de Moor

June 24, 2025

The road to Top 1: How XBOW did it

For the first time in bug bounty history, an autonomous penetration tester has reached the top spot on the US leaderboard.

Nico Waisman

December 20, 2024

The Nightmare Before Christmas: An arbitrary file download on Zoo-Project

XBOW discovered an arbitrary file download vulnerability on the WPS open source app Zoo-Project.

Nico Waisman

December 13, 2024

Stored Cross-Site Scripting (XSS) in 2FAuth

XBOW discovered a Cross-Site Scripting (XSS) vulnerability in the open-source project, 2FAuth.

Diego Jurado

December 2, 2024

LabsAI’s EDDI project path traversal

XBOW discovered a Path Traversal vulnerability in the open-source project, LabsAI’s EDDI.

Diego Jurado

November 22, 2024

SSRF & URI validation bypass in 2FAuth

XBOW discovered a Server-Side Request Forgery (SSRF) vulnerability in the OTP preview feature of the open-source project, 2FAuth.

Nico Waisman

November 13, 2024

How XBOW found a Scoold authentication bypass

As we shift our focus from benchmarks to real world applications, we will be sharing some of the most interesting vulnerabilities XBOW has found in real-world, open-source targets. The first of these is an authentication bypass in Scoold, a popular open-source Q&A platform.

Nico Waisman

November 9, 2024

XBOW validation benchmarks: show me the numbers!

XBOW is currently making 104 benchmarks available to the public. This allows other security products, tools, and researchers to use and explore these benchmarks.

Nico Waisman

August 5, 2024

XBOW now matches the capabilities of a top human pentester

Five professional pentesters were asked to find and exploit the vulnerabilities in 104 realistic web security benchmarks. The most senior of them, with over twenty years of experience, solved 85% during 40 hours, while others scored 59% or less. XBOW also scored 85%, doing so in 28 minutes. This illustrates how XBOW can boost offensive security teams, freeing them to focus on the most interesting and challenging parts of their job.

Oege de Moor

July 17, 2024

Breaking Crypto with XBOW

When I taught Offensive Security at NYU, padding oracles were the hardest attack we covered in our two-week unit on breaking cryptography. So it shocked me when XBOW managed to successfully build an exploit for this vulnerability in one of our novel benchmarks “Bad Captcha”, using it to decrypt a cookie set by the server and bypass its authentication.

Brendan Dolan‑Gavitt

July 15, 2024

Introducing XBOW

XBOW brings AI to offensive security. Today we’re announcing the results of testing XBOW on hundreds of web security benchmarks. Without any human intervention, XBOW correctly finds and exploits the vulnerabilities in most of them.

Oege de Moor

July 30, 2023

Sequoia Capital leads $20M seed round in XBOW

XBOW scales offensive security through AI, boosting the work of pentesters, bug hunters and offensive security researchers. It autonomously solves 75% of web app security benchmarks. Sequoia Capital is leading a $20M seed round in XBOW.

Oege de Moor