blog.maass.xyzPlease Stop Calling GenAI "Useless"A common shorthand I am seeing in criticisms of Generative AI technologies is that GenAI / LLMs are “useless”. This shows up again and again, especially in hot takes on Mastodon, and sometimes from people whose professional work I deeply respect. Whi...Mar 6, 2025·15 min read
blog.maass.xyzEncryption Isn't Enough: Compromising a Payment Processor using MathDuring a security engagement with my employer, iteratec, I found and reported a security issue that allowed me to completely compromise the internal customer service frontend of a payment processor, which would have let us steal customer information ...Feb 26, 2025·17 min read
blog.maass.xyzSpring Actuator Security, Part 3: Finding Exposed Actuators using Dynamic Testing with ffufThis is part three of a series on the security implication of Spring Actuators. I recommend having read at least the first part to understand the context. In the previous article, we discussed how you can leverage static code analysis using semgrep ...Dec 9, 2022·8 min read
blog.maass.xyzSpring Actuator Security, Part 2: Finding Actuators using Static Code Analysis with semgrepIn the first part of this series, we have discussed the risks inherent in exposing the Actuator functionality of the Spring framework. If you haven't read that part yet, I recommend that you do so before reading this article. In this article, we wi...Sep 14, 2022·13 min read
blog.maass.xyzSpring Actuator Security, Part 1: Stealing Secrets Using Spring ActuatorsSpring is a set of frameworks for developing Applications in Java. It is widely used, and so it is not unusual to encounter it during a security audit or penetration test. One of its features that I recently encountered during a whitebox audit is act...Sep 12, 2022·10 min read