Lucky Spin: Godly Programming

Chapter 111: Submitting



Being given a permission by the task itself, he launched his automated scanner, feeding it authentication flows that relied on time-based tokens and push-based verification.

As RAZi systematically tested each login process, attempting session re-use and manipulating token expiration windows.

Within minutes, an anomaly surfaces and a backup code endpoint failed to enforce secondary verification when accessed under specific conditions.

He reran the exploit manually, bypassing the MFA prompt entirely while maintaining full session control.

Recognizing the severity, he deepened his analysis, probing for variations of the flaw across different account tiers.

RAZi then simulated multiple user scenarios, discovering two additional loopholes where expired tokens were mistakenly recognized as valid.

Seeing this he nodded his head from this confirmation, so he compiled a critical vulnerability report, detailing how attackers could exploit weak MFA enforcement to hijack accounts unnoticed.

As always, he documented everything carefully, knowing that the next step was what mattered most.

Though not entirely required, creating the document can helped, but what truly mattered was the context and clarity of the findings.

After scanning thousands of endpoints and confirming multiple vulnerabilities across XSS, IDOR, redirect flaws, and RCE vectors.

Jeff began the next step which is organizing everything into a formal report.

RAZi pulled all the raw logs, payloads, screenshots, and HTTP responses, aligning them with the exploit steps and CVSS scores he had assigned.

Each entry was formatted cleanly, sorted by severity, and labeled with timestamps that matched the activity trail from his scanned persona.

When it was complete, RAZi compiled the entire document into a professionally structured PDF that is encrypted, signed, and ready to be delivered in one batch.

To ensure no data was out of sync, Jeff activated his internal time-sync module.

Making all activity logs, exploit tests, and screenshots to be marked with system-aligned timestamps, that is tied to his active identity.

For extra control, RAZi stored a temporary disposable log in memory in case any issues had to be replayed or verified later.

With everything logged, formatted, and sealed, the report stood as a complete and professional-grade document the kind that left no room for doubt.

But should he submit it just right away? The answer is no! since trust must be earned.

Even though SocialHub offers a bounty program, there's no guarantee they'll pay unless he confirms their payout system is fair.

Bug bounties are not contracts. Platforms can reject or downgrade submissions, especially if they think the reporter isn't 'official' or within their known list.

Submitting everything at once would give up his leverage.

If he handed over all the bugs, including the remote code execution and multi-factor authentication bypass, and they chose to ignore him, he would have nothing left to hold against them.

And if they actually did that, he would make sure their company was destroyed within the hour.

Since he was not someone to be bullied. He had already become like a ghost in the digital world.

Finding him was like searching for another living being in the vastness of space which is endless, but with the slightest possibility.

So after preparing the email, he began by writing the first lines.

...

Subject: Security Vulnerability Disclosure

To the SocialHub Security Response Team,

I am submitting this report to disclose a set of serious vulnerabilities identified during structured testing of your platform, including sandbox environments and publicly accessible services.

The attached dossier outlines 11 critical, 20 high-severity, and 26 medium-severity issues and more that is all capable of affecting system integrity, user data, or platform security if left unresolved.

A portion of these issues, specifically low-severity findings has already been submitted and verified to demonstrate my credibility and technical capability.

I am now offering the remainder of this report with the expectation of fair compensation, in accordance with industry standards and your published bounty guidelines.

My objective here is simple: help improve the security of your system. However, given the scale and value of these findings, I believe a compensation discussion is both appropriate and necessary before further disclosures beyond this report.

Please acknowledge receipt of this document and confirm whether you're prepared to move forward with review and payout processing.

Respectfully,

Marcus T. Villanueva

Attachment: Vulnerability_Ver1.pdf

...

When all of this was done, he had not received a quick reply, which makes sense since the personnel must have been busy.

If he really wanted to, he could make the email look like a virus just to draw immediate attention, but he did not want to take that route.

He was already expecting a reply by tomorrow. But if they made him wait for two to three days, then he would make sure to force them to look at his email.

With that, Jeff closed his laptop and stood from his seat, stretching for a bit. As he glanced toward the bed, his nose nearly bled.

Jessica was there, lying face-up. Her dress had slightly lifted from her restless movements on the bed.

Her thighs were exposed, the skin was pale and delicate. Not only that, he also accidentally caught a glimpse of something deeper.

It was a lavender blue panty, and the sight made him freeze. He stared for a moment before quickly shaking his head, his face turning red.

He felt deeply embarrassed at himself. Realizing how perverted he was acting, he walked toward the bed, grabbed the quilt, and gently covered her.

After she was fully covered, Jessica let out a satisfied hum. Seeing her comfortable, Jeff turned away and headed to the shower.

Once he was done, he returned and sat on the floor beside the bed, his back resting against its edge.

"System, enter me to the white room," Jeff instructed calmly.

[Affirmative]

As the system responded, Jeff returned to the white room and saw Jakol standing there.

Without any unnecessary words, he made a moved and began the fight.

What he received was a relentless barrage of beatings, leaving him astonished at just how wide the gap truly was between Jakol and the thugs he had fought earlier.

His skin tingled and his blood boiled all at once, pushing him to train for over ten hours again. When he finally woke up, he could not help but hiss from the pain.

The beating had left his body sore. But despite the pain, he could feel it and that is his fighting experience had improved significantly.

After finishing his training, he chose not to sleep. Instead, he focused on cultivating the Kinetic Vein Art, knowing that it was far more beneficial than simple rest.

Because of this, as time passed, Jeff woke up around four in the early morning. He looked toward the bed and saw Jessica still sleeping peacefully.

Checking himself, he felt his strength had clearly grown. He was now much sharper than before.

The feeling it gave him is the best the raw, pure power was addictive for someone like him.

He hated fighting, but after tasting real strength and seeing what it could do beyond money or status, he found it thrilling and deeply satisfying.

It was no wonder why people with the strongest fists were respected. But even with his growing strength, he knew that a single bullet could still take him down.

Still, he felt confident. Sooner or later, he would be able to handle guns too. After all, he was walking the path of the Omega Agents.

He understood that those guys who were trained and exposed to the highest-risk missions must not be afraid of guns.

This made him have the idea that the Omega Agents could dodge even the most advanced guns from his own world.

With that thought, to lessen the threat of facing an opponent with a firearm, he knew he needed to cultivate further and learn proper counter moves.

That way, he would never feel fear if he were ever kidnapped or robbed with a gun pointing at his head.

Since today was Sunday, he decided to learn more on his debate for now. He sat at the table and began gathering more information online to strengthen his points.

He wrote some scripts, downloaded evidence to be printed, and prepared news articles and videos from trusted sources to support his claims and show their validity.

After about two hours, the clock struck seven in the morning. That was when the person on the bed began to open her eyes groggily.

As she opened her eyes with a hazy look, a few strands of hair clung to her lips, and a small patch of drool had soaked into the bed, leaving the foam damp.

Sensing the movement, Jeff paused and looked toward the bed. Jessica sat up slowly, placing both hands on the soft mattress to steady herself.

She kept munching absentmindedly, as if chewing in her sleep. As her gaze wandered around the room, she started to feel that something was a little off.

"Good morning," a male voice sounded in her ears.

She turned her gaze toward the source and began to reply, "Good morni—" but her words trailed off.

She stopped mid-sentence and froze completely.

...

1st: Special thanks to 'Essos👑' – the GOAT of the month, for both the rewarding gifts and golden tickets! Much love, brotha!

2nd: Big thanks to 'Pat_funding👑' for the unwavering support since the very start of my journey and for the golden tickets and gifts!

3rd: Special shoutout to 'Devon1234👑' – The same GOAT of this month, for all the amazing gifts! You're absolutely RAD!


Tip: You can use left, right, A and D keyboard keys to browse between chapters.