Hall of Fame

burnlink.page  ·  Security Researchers

BurnLink thanks every researcher who takes the time to audit our code and report vulnerabilities responsibly. This page recognizes those who helped make the platform safer. All credits are listed with the researcher's explicit consent — anonymous credit is available on request.

0
Researchers credited
0
Valid findings
0
Critical / High
<48h
Avg. response time

Credited researchers

🏆

No entries yet — be the first to find a valid vulnerability.
Report a vulnerability →

Findings log

All reported findings and their resolution status. This log is updated after each remediation cycle. Findings are disclosed once a fix is deployed or after the 90-day disclosure deadline.

ID Title Severity Status Resolved
BL-002 Claimed: URL fragment key theft Reviewed — the URL fragment (#k=…) is the access credential by design (zero-knowledge architecture). The HTTP spec guarantees fragments are never transmitted to the server, never appear in access logs, and are excluded from Referer headers. Password protection adds an independent second factor absent from the URL. Single-use links delete the ciphertext after one read. This is an intentional, documented design trade-off; not a vulnerability. High By design Mar 2026
BL-001 Race condition on one-time download Two concurrent requests could both receive the encrypted payload. Fixed by deleting the DB record atomically before fetching from storage. Critical Fixed Mar 2026
BL-022 Claimed: EJS server-side template injection Reviewed — all EJS outputs use <%=> (HTML-escaped). Zero <%-> unescaped tags exist. User inputs are also whitelisted/validated before render. Not a valid finding. Critical Invalid Mar 2026
BL-023 Claimed: Cold-start wipes brute-force counters Reviewed — password attempt counts and lockout timestamps are stored in Supabase DB, not in memory. Cold starts do not affect brute-force protection. The in-memory rate limiter is supplementary and does not gate the lockout logic. Not a valid finding. High Invalid Mar 2026
BL-024 Claimed: Reverse tabnapping via target="_blank" Reviewed — every external link in all views already carries rel="noopener noreferrer". Not a valid finding. Medium Invalid Mar 2026
BL-025 Claimed: Link preview bots burn one-time links Reviewed — share URLs point to /file/:id which returns HTML. The /raw fetch is triggered by client-side JavaScript only; bots do not execute JavaScript. The encrypted key is in the URL fragment (#k=…) which is never sent to the server. Not a valid finding for this implementation. High Invalid Mar 2026

Recognition tiers

Critical
Hall of Fame + Special Thanks
High
Hall of Fame + Shoutout
Medium
Hall of Fame
Low / Info
Honorable Mention

No monetary rewards are offered. Recognition is our way of saying thank you. Anonymous credit is available on request.

Be the first. The first researcher to find and responsibly disclose a valid Critical or High severity vulnerability gets a permanent top-of-page credit. Report to hello@paperfrogs.dev.