logoalt Hacker News

stavrostoday at 6:38 PM4 repliesview on HN

My local tennis court's reservation website was broken and I couldn't cancel a reservation, and I asked GLM-5.1 if it can figure out the API. Five minutes later, I check and it had found a /cancel.php URL that accepted an ID but the ID wasn't exposed anywhere, so it found and was exploiting a blind SQL injection vulnerability to find my reservation ID.

Overeager, but I was really really impressed.


Replies

disiplustoday at 7:13 PM

Yeah it seems they did not align it to much, at least for now. Yesterday it helped me bypass the bot detection on a local marketplace. that i wanted to scrap some listing for my personal alerting system. Al the others failed but glm5.1 found a set of parameters and tweaks how to make my browser in container not be detected.

show 1 reply
arcanemachinertoday at 7:03 PM

That is both amazing and terrifying.

bglazertoday at 7:00 PM

This is insane, I love it.

mikkupikkutoday at 7:50 PM

Unfathomably based.