1SEAL-2026-011
Linux Bluetooth SMP legacy pairing can satisfy BT_SECURITY_HIGH without MITM — CVSS 7.1, CWE-287.
security research in software and hardware trust infrastructure
all research follows coordinated vulnerability disclosure (cvd). public statements reference only published advisories and released fixes.
top infrastructure brands in the current portfolio by public footprint include:
found via ai-augmented detection pipeline. deterministic proof, human-verified — every finding has reproducible artifacts that maintainers can rerun independently.
no llm in the decision path. detection generates hypotheses; local harness confirms or rejects with canonical/control logs and witness files.
detailed technical write-ups for selected findings.
Linux Bluetooth SMP legacy pairing can satisfy BT_SECURITY_HIGH without MITM — CVSS 7.1, CWE-287.
two critical out-of-bounds writes in the imported Tiano decompressor — CRITICAL, CWE-787.
criticalOpenSSL 3.6 stapled OCSP verification can accept unauthorized responders from the peer chain — HIGH, CWE-295.
highTelegram iOS Web App bridge exposed to third-party iframes via all-frame injection and missing main-frame validation — CWE-863, CWE-346.
mediumheap buffer over-read in TL deserialization from operator precedence bug — CVSS 5.3, CWE-125.
mediumpath traversal in git resolver — tenant to cluster-wide secret access. CVSS 9.6, CWE-22.
criticalContainerID path traversal in gateway frontend can escape runc executor root — CVSS 8.4, CWE-22.
highremote out-of-bounds write in streaming decoder — CVSS 8.1, CWE-787. fixed in v0.6.0.
highName Constraints bypass via CommonName fallback — CVSS 7.4, CWE-295. wildcard + Unicode CN gaps.
highsigning-path integrity gate bypass via merkle preimage binding break — CWE-825. fixed in commit 0586ab2.
highpublished security advisories without a known cve id.
public security PRs: vulnerability fixes and security hardening.
explicitly credited upstream fixes plus authored testing, fuzzing, and hardening contributions.
reported via security contacts or public trackers; fixes landed upstream.
1seal follows coordinated vulnerability disclosure (cvd). findings are reported to maintainers first, with reasonable time for patches before public disclosure.
no testing on production systems with real user data. no trading on non-public vulnerability knowledge. no pressure tactics or threats of disclosure.