NewN-Day-BenchView benchmark
winfunc
Red Team As A Service

GET HACKEDBEFORE THE BAD GUYS DO

AI security agents that autonomously find, triage, and patch codebase vulnerabilities in hours.

Initial scan free for YC companies
LIVE

A live feed of the public disclosure log of security vulnerabilities autonomously discovered and patched by winfunc.

NGINX logo
NGINXMediumCVE-2026-42926

HTTP/2 upstream frame injection via oversized proxy_set_body (CVE-2026-42926)

NGINX logo
NGINXMediumCVE-2026-28755

stream accepts revoked client certificates despite ssl_ocsp on (CVE-2026-28755)

NGINX logo
NGINXMedium

SCGI unbuffered mode sent truncated CONTENT_LENGTH causing backend desync

NGINX logo
NGINXHigh

WebDAV COPY/MOVE path overlap corrupts files and collections

React logo
ReactHighCVE-2026-23864

RSC reply decoder DoS via $K FormData amplification (CVE-2026-23864)

Node.js logo
Node.jsMediumCVE-2026-21636

Permission model bypass via unchecked Unix Domain Socket connections (CVE-2026-21636)

Anthropic logo
AnthropicCritical

Authentication bypass on FastMCP custom routes

Supabase logo
SupabaseCritical

SQL Injection via queueName in getDatabaseQueuesMetrics

Bun logo
BunHigh

Exponential merge keys in Bun's YAML implementation leads to DoS

Gumroad logo
GumroadCritical

0-click Account Takeover and Admin Operations via helper endpoint authorization bypass

Mattermost logo
MattermostHighCVE-2026-3108

mmctl terminal escape injection via unsanitized server-controlled output (CVE-2026-3108)

Mattermost logo
MattermostMediumCVE-2026-3114

Zip bomb memory exhaustion in recursive document extraction (CVE-2026-3114)

Mattermost logo
MattermostMediumCVE-2026-3115

Group member IDs leaked because GetGroup bypassed view restrictions (CVE-2026-3115)

Mattermost logo
MattermostMediumCVE-2026-3113

mmctl export downloads created world-readable local files (CVE-2026-3113)

Mattermost logo
MattermostMediumCVE-2026-21386

Private channel enumeration through /mute error messages (CVE-2026-21386)

Mattermost logo
MattermostHighCVE-2026-24458

Oversized password login DoS in legacy password comparison (CVE-2026-24458)

Mattermost logo
MattermostMediumCVE-2026-25783

User-Agent version parser panic during session creation (CVE-2026-25783)

Mattermost logo
MattermostMediumCVE-2026-2455

SSRF protection bypass via IPv4-mapped IPv6 literals (CVE-2026-2455)

Better-Auth logo
Better-AuthMedium

Multi-session sign-out hook allows forged cookies to revoke arbitrary sessions

Actix logo
ActixMedium

HTTP/1.1 CL.TE request smuggling in actix-http (GHSA-xhj4-vrgc-hr34)

Hoppscotch logo
HoppscotchHighCVE-2024-34347

Hoppscotch CLI sandbox escape through Node vm pre-request scripts (CVE-2024-34347)

End of transmission.
how does this work?

the winfunc procedure

01

Initiate Contact

Book a demo call to establish secure comms. We'll verify your authorization to audit.

02

Define The Target

Share your scope and repositories. Our agents map the attack surface instantly.

03

Vulnerabilities & Patches

Receive a comprehensive report. We provide the exploits and the fixes.

Frequently Asked Questions

The initial vulnerability scan is free for YC companies. This includes a comprehensive audit and initial findings report.

For ongoing protection, continuous monitoring, and automated patching tailored to your codebase and team requirements, book a call to get a quote.

ship secure code.

Secure your mission-critical systems with the first autonomous hacking agent that thinks deeper than any scanner.