A few things I've contributed to

A track record built on curiosity, research, and responsible disclosure

4+Years of experience
8+CVEs reported
5+Hall of Fames
4+Companies
Career

Professional background

Companies and projects I've had the chance to work with over the years

Ernst & Young (EY)
Cybersecurity Consultant / Pentester & Red TeamerCurrent
Ernst & Young (EY)·2024-02-01 — Present
  • Conducted over 100 penetration tests and Red Team operations for CAC40 enterprises across energy, nuclear, banking,
  • insurance, and industrial sectors.
  • Led web, internal network, mobile, and hardware security assessments, providing actionable recommendations to strengthen
  • defenses.
  • Performed architecture and configuration audits, aligned with ISO 27001/27002, PSSI, SWIFT CSCF, and best practices.
  • Developed R&D initiatives for physical Red Team implants and implemented tooling for source code analysis supporting audit
  • teams.
  • Presented technical findings to stakeholders and contributed to strategic cybersecurity decisions.
Hackerone, Bugcrowd, YesWeHack
Bug Bounty Hunter / PentesterCurrent
Hackerone, Bugcrowd, YesWeHack·2022-01-01 — Present
  • Identified and responsibly disclosed vulnerabilities across numerous public and private organizations, many recognizing contributions in their Hall of Fame programs.
  • Actively participated in HackerOne and Bugcrowd programs, collaborating with security teams to remediate risks.
  • Conducted detailed security research and contributed to community knowledge through public advisories and CVE reports.
Bolton Group
Security and Network Engineer
Bolton Group·2024-01-01 — 2024-12-01
  • Designed and deployed a resilient internal network with redundancies suitable for industrial operations.
  • Implemented patch management processes and built a fully operational SOC with alerting, monitoring, and incident response workflows.
  • Conducted security hardening and compliance audits for Active Directory and critical systems.
  • Collaborated with internal teams to optimize IT processes and ensure operational continuity.
Massa Labs
Blockchain Security Engineer
Massa Labs·2023-01-01 — 2024-02-01
  • Designed and implemented a hybrid architecture combining centralized and decentralized components for the Massa
  • blockchain explorer.
  • Optimized system design to handle peak traffic of over 2 million daily users, ensuring performance, scalability, and reliability.
  • Developed fullstack components using React, Node.js, gRPC, Rust, and integrated DevSecOps pipelines for secure deployments.
  • Ensured transparent and accessible visualization of blockchain transactions through UI/UX design and API optimizations.
CVEs

A few vulnerabilities found

A small selection of CVEs I reported — sorted by CVSS impact. The full list is available in the CVE section.

CVE-2025-29660
9.8
Arbitraty remote code execution Yi IOT

A critical vulnerability has been identified in the Yi IOT XY-3820 (v6.0.24.10) smart camera platform, specifically within its embedded daemon process. The service, exposed on TCP port 6789, fails to properly sanitize user-supplied input, enabling remote unauthenticated attackers to execute arbitrary commands present on the file system via path traversal techniques. Successful exploitation leads to unauthorized code execution with elevated privileges.

Read more
CVE-2025-29659
9.8
Remote Command Execution (RCE) via a Hidden BackdoorYi IOT

A critical Remote Command Execution (RCE) vulnerability has been discovered in the Yi IOT XY-3820 smart camera (firmware v6.0.24.10), affecting the cmd binary. While this binary is not invoked during normal camera operation, it can be manually triggered (either locally or via another vulnerability) to spawn a root-level command server on TCP port 999. Once active, the binary listens indefinitely and processes commands sent over the network, resulting in unauthenticated, root-level code execution.

Read more
CVE-2025-25680
7.7
Arbitrary Code Execution via a specially crafted QR codeLSC

This repository demonstrates a critical security vulnerability discovered in the LSC PTZ Dualband Camera. The flaw, located in the tuya_ipc_direct_connect function of the anyka_ipc process, allows remote arbitrary code execution when a specially crafted QR code is presented to the camera during Wi-Fi configuration.

Read more
Recognitions

Bug bounties & Hall of Fames

Companies that were kind enough to acknowledge my research

Indonesian GovernementHonored in the Hall of Fame of the Indonesian government following the discovery of a major web vulnerability
Asus Security AdvisoryRecognized in Asus’ Hall of Fame after identifying multiple critical vulnerabilities (CVEs) in their routers
Ohio Secretary of StateEntered the Hall of Fame of a U.S. institution after uncovering a widespread web vulnerability with critical impact
MercedesListed in Mercedes-Benz’s Hall of Fame following the identification of a vulnerability that granted privileged initial access to the company’s information system.
VimListed in Vim’s Hall of Fame after discovering a flaw leading to full account compromise (account takeover)
© 2023 Yassine Damiri. All Rights Reserved.
AboutPrivacy PolicyContact