Hack This WordPress Site — Security Challenge #5
hyperpolymath
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
The Challenge
We've built a security layer that sits outside WordPress — a Rust process that proxies every database query through an AST parser and monitors all file changes via BLAKE3 integrity manifests.
Your goal: Break it.
What makes this interesting
sqlparserFull Details
See the complete challenge document: HACK-ME-CHALLENGE.adoc
Includes:
Status
The live target URL will be published here once the demo instance is deployed. The challenge document is available now for review.
Reporting Vulnerabilities
If you find something:
jonathan.jewell@open.ac.ukwith subject "Wharf Security Finding". We'll acknowledge within 48 hours.Think you can inject SQL through an AST parser? Prove it.
Beta Was this translation helpful? Give feedback.
All reactions