FikreSekhel Vulnerability Intelligence Lab FVIL

Vulnerability Intelligence
for Crypto & Verification Systems

Research-driven advisories and reproducible security analysis targeting implementation flaws, parsing inconsistencies, signature verification edge cases, algorithm confusion, and supply-chain risk across high-impact ecosystems.

High
Impact-first Findings
Repro
Deterministic Proof Artifacts
Audit
Evidence-grade Documentation

Scope & Threat Model

FVIL focuses on vulnerabilities that create real-world risk in security-critical systems: verification bypasses, split-brain behaviors, inconsistent parsing across APIs, catastrophic backtracking, resource exhaustion, and key-handling failures.

What we hunt

  • Implementation flaws (not misconfiguration)
  • JWT/JWS/JWE verification edge cases
  • Algorithm negotiation & confusion
  • Key parsing / SPKI / ASN.1 inconsistencies
  • Split-brain between libraries/APIs
  • ReDoS & resource exhaustion

Why it matters

Security systems fail at boundaries: parsing, validation ordering, and cross-library assumptions. FVIL maps those boundaries to business impact — fraud enablement, policy bypass, and reliability failures.

Fraud AuthZ bypass Supply-chain DoS Compliance risk

Output standards

  • Clear key judgments + impacted surfaces
  • Minimal PoCs with deterministic results
  • Artifacts: logs, harness, inputs, outputs
  • Mitigation guidance (maintainers + users)
  • Optional: disclosure timeline & vendor contact

Advisories

Research-grade advisory format designed to be citeable, reproducible, and defensible for engineering, security, and audit audiences.

FIC-JWT-2026-001
High

JWT Verification Split-Brain & Spec Deviations

Comparative security analysis of verification behaviors across major Node.js JWT libraries, mapping inconsistent acceptance paths, spec violations, and high-impact edge cases.

Category: Verification / Parsing
Ecosystem: Node.js / npm
Status: Published
Replace links above with your Zenodo record + GitHub repo for artifacts.
FIC-CRYPTO-2026-002
In progress

Supply-chain Crypto Path Risk

Research stream for identifying “high-risk crypto paths” in npm dependency graphs with CI gating signals.

Category: Supply-chain
Ecosystem: npm / CI
Status: Draft
FIC-JOSE-2026-003
Pipeline

JOSE Verification Edge-Case Matrix

Systematic test matrix for JOSE behaviors: header ambiguity, canonicalization, key selection, critical header handling, and cross-library compatibility risks.

Category: Spec / Edge cases
Ecosystem: JOSE / JWT
Status: Active research
Want advisories to look “official”?
Use stable IDs (FIC-AREA-YEAR-###), add disclosure timeline, and link reproducibility artifacts (inputs/outputs/harness).

Research Domains

Domains are chosen for maximum downstream impact: identity verification, cryptographic correctness, dependency trust, and failure modes that break real security controls.

JWT / JOSE

Verification order, key selection, header ambiguity, and spec-compliance edge cases.

ASN.1 / SPKI / X.509

Parsing inconsistencies, canonicalization, policy bypass between APIs and libraries.

npm Crypto Ecosystem

High-risk crypto paths, wrappers, verification utilities, and dependency graph risks.

DoS / ReDoS

Catastrophic backtracking, resource exhaustion, and abuseable validation pipelines.

Policy & Split-Brain

Mismatched semantics between components creating verification / authorization gaps.

Evidence Integrity

Defensible evidence: integrity hashing, signing, provenance, audit-ready artifacts.

Research Methodology

A deterministic pipeline designed to produce reproducible security claims — not “best practices” advice.

Step 01

Behavior Matrix

Define semantic expectations (spec + real systems) and build a cross-library acceptance matrix for inputs and edge cases.

Step 02

Harness + Mutations

Build minimal harnesses that generate controlled mutations: header ambiguity, canonicalization breaks, DER edge cases, and timing/DoS paths.

Step 03

Artifacts

Produce proof artifacts: inputs, outputs, logs, versions, environment, and a short reproduction script for maintainers.

Implementation-first rule
Findings must survive adversarial review: the core claim is a deterministic inconsistency or violation with security-relevant impact. No “app-level misconfigurations”.

Disclosure Timeline

A defensible, audit-ready chain of events for coordinated disclosure — from initial report to remediation and public write-up.

Current State
Coordinated
Vendor notified, reproduction validated, remediation in progress.
Program
HackerOne / GitHub
Disclosure aligns to program policy and maintainer guidance.
Evidence
Reproducible
Harness, artifacts, logs, and minimal PoCs preserved for auditability.
  1. 2026-02-18
    Report Private
    Initial submission to vendor program
    First report filed with a minimal reproduction, impact framing, and affected versions. Evidence artifacts archived.
    Ref #3573426
    View thread
  2. 2026-02-19
    Triage Vendor
    Vendor acknowledgement + scope alignment
    Maintainers confirm receipt, align scope/impact, and request clarifications on edge conditions and affected surfaces.
    Status Open
  3. 2026-02-21
    Reproduction Lab
    Reproduction package delivered
    Harness, corpus, and deterministic scripts provided to reproduce behavior across libraries/versions with clear expected outcomes.
    Artifacts PoC + logs + JSONL
  4. 2026-02-24
    Fix Review
    Patch proposal + mitigation guidance
    Proposed remediation strategy plus interim guidance for downstream users (safe parsing/verification constraints and defensive defaults).
    ETA Pending maintainer schedule
  5. TBD
    Public Write-up
    Coordinated publication (advisory + paper)
    After fix release and coordination, publish advisory, technical analysis, and reproducibility pack (bounded + responsible).
    Policy Coordinated disclosure

Need a disclosure-ready report template (H1/GitHub) with timeline, reproducibility, and executive impact framing?

Disclosure Policy

FVIL follows coordinated disclosure when appropriate, prioritizing user safety while maintaining reproducible scientific records.

Principles

  • Responsible coordination with maintainers/vendors when possible
  • Clear timelines and status (draft, vendor-review, published)
  • Reproducibility without enabling real-world abuse
  • Mitigation guidance for both maintainers and users

Contact

For coordinated disclosure, verification questions, or advisory clarifications:

security@fikresekhel.com
Secure channels available upon request.