
Episode 129: Is this how Bug Bounty Ends?
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
Episode 129: In this episode of Critical Thinking - Bug Bounty Podcast we chat about the future of hack bots and human-AI collaboration, the challenges posed by tokenization, and the need for cybersecurity professionals to adapt to the evolving landscape of hacking in the age of AI
Follow us on twitter at: https://x.com/ctbbpodcast
Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.io
Shoutout to YTCracker for the awesome intro music!
====== Links ======
Follow your hosts Rhynorater and Rez0 on Twitter:
https://x.com/Rhynorater
https://x.com/rez0__
====== Ways to Support CTBBPodcast ======
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
You can also find some hacker swag at https://ctbb.show/merch!
====== This Week in Bug Bounty ======
Improper error handling in async cryptographic operations crashes process
https://hackerone.com/reports/2817648
Recon Series #6: Excavating hidden artifacts with Wayback Machine
https://www.yeswehack.com/learn-bug-bounty/recon-wayback-machine-web-archive
====== Resources ======
This is How They Tell Me Bug Bounty Ends
https://josephthacker.com/hacking/2025/06/09/this-is-how-they-tell-me-bug-bounty-ends.html
Welcome, Hackbots: How AI Is Shaping the Future of Vulnerability Discovery
https://www.hackerone.com/blog/welcome-hackbots-how-ai-shaping-future-vulnerability-discovery
Glitch Token
https://www.youtube.com/watch?v=WO2X3oZEJOA
Conducting smarter intelligences than me: new orchestras
https://southbridge-research.notion.site/conducting-smarter-intelligences-than-me
====== Timestamps ======
(00:00:00) Introduction
(00:04:05) Is this how Bug Bounty Ends?
(00:11:14) Hackbots and handling leads
(00:20:50) Hacker chain of thought & Tokenization
(00:32:54) Context Engineering