Independent research focused on real-world exploitability, cryptographic misuse, parser trust boundaries, and failure modes that become operationally relevant under adversarial conditions.
| ID | Finding | Severity | Type | Status | Disclosure |
|---|---|---|---|---|---|
|
FR-2026-001
|
Non-canonical JWT acceptance leading to revocation and rate-limit bypass
A trust mismatch between verification and application-layer token handling can allow variant tokens to remain valid while revocation and policy checks rely on strict string comparison.
|
High | Authentication / Logic Flaw | Coordinated Disclosure | Report available on request |
|
FR-2026-002
|
RPC response spoofing via postMessage trust boundary violation
Browser messaging trust assumptions can break when response handling is not strongly bound to source, origin, and expected request lifecycle.
|
High | Client-side Trust Boundary | Publicly Discussed | Disclosure summary available |
|
FR-2026-003
|
AES-CBC malleability enabling privilege bit-flipping in application workflows
Encryption schemes without integrity guarantees can permit controlled ciphertext manipulation, resulting in altered protected values and unsafe application decisions.
|
Critical | Cryptographic Design Flaw | Research Complete | Private / pending publication |
Each finding is assessed as a technical failure and as an operational risk. The goal is not only to identify the flaw, but to understand how it behaves under realistic attacker pressure.
Our research is focused on identifying high-impact vulnerabilities across modern software ecosystems, including open-source libraries, distributed systems, authentication flows, and cryptographic implementations. Each finding is validated through reproducible proof-of-concepts, combining static analysis, dynamic instrumentation, and real execution traces.
The results we deliver go beyond vulnerability discovery. We provide structured intelligence including root cause analysis, exploitability assessment, affected code paths, and precise remediation guidance. This enables organizations to understand not only what is vulnerable, but why it is vulnerable and how to fix it effectively at scale.
We study how future attack capability intersects with present-day cryptographic debt. Our horizon research covers post-quantum migration, long-lived data risk, parser trust boundaries, verification integrity, and security architectures that must remain defensible over time.
A planning horizon for teams that need to redesign trust, integrity, and key management before adversary capability catches up with today’s assumptions.
FikreSekhel operates as a vulnerability research lab focused on discovering security-critical weaknesses in modern software ecosystems. We investigate security-critical code paths, cryptographic implementations, parser trust boundaries, sandbox containment, and dependency risk. Research findings are combined with threat intelligence to understand exploitability, adversary adoption, and operational risk.
We study the classes of failures that produce high-leverage security impact: cryptographic misuse, parser confusion, unsafe trust boundaries, runtime isolation flaws, and supply-chain weaknesses that propagate into production environments.
A quick assessment for teams that need to understand whether their security-critical code, trust boundaries, evidence posture, and long-lived cryptographic assumptions are ready for adversarial scrutiny.
Supporting product security, regulated engineering, investigations, and long-horizon cryptographic planning




"FikreSekhel gave us research-grade visibility into verification risk, long-lived crypto exposure, and the architectural controls we needed to defend our position under audit."
"Their root-cause analysis and remediation guidance helped us move from vague bug classes to concrete engineering changes with defensible rationale."
"What stood out was the combination of deep vulnerability research, cryptographic rigor, and just enough threat intelligence to prioritize what actually mattered."
Our research model follows the path from vulnerability discovery to adversarial intelligence — helping teams understand not only what is vulnerable, but how that weakness can evolve into an operational risk.
We identify flaws in parsers, runtimes, cryptographic workflows, dependency paths, and trust boundaries.
We determine whether the weakness is realistically exploitable, under what assumptions, and with what technical preconditions.
We map how adversaries, campaigns, malware, or abuse operations could adopt and operationalize the weakness.
We translate technical weakness into business, fraud, legal, compliance, and incident-response consequences.
Research-driven services focused on discovering real vulnerabilities, analyzing exploitability, and understanding how adversaries can operationalize technical weaknesses. We combine deep research with threat context for organizations that need more than a generic assessment.
We identify critical attack surfaces, trust boundaries, parser flows, cryptographic workflows, and high-risk dependencies.
We conduct deep technical research across parsing, validation paths, cryptographic implementations, runtime isolation, and supply-chain behavior.
We evaluate whether the weakness can realistically be abused, by whom, through which path, and with what operational impact.
You receive technical findings, severity and exploitability views, proof-of-concept material, and practical remediation guidance.
Not sure where to start? We can quickly scope whether your need is vulnerability discovery, exploitability analysis, or threat-led monitoring.
Answers about vulnerability research, investigations, cryptographic risk, and threat intelligence support.
Connect with FikreSekhel for vulnerability research, cryptographic review, high-trust investigations, and targeted adversary intelligence support.