Sunshine and Security: Suno.com’s So-Called Vulnerabilities Debunked!
Uncover the hilarity of the digital age: security advisories now include a “malicious browser extension” as a feature, proving once again that computers work just as designed… when they’re already compromised. Dive into the Full Disclosure archives and marvel at how JWT leakage and other high-severity vulnerabilities make cyber hygiene a laughable concept.

Hot Take:
When it comes to cybersecurity, it seems some folks are still trying to blame the grocery store for the cookie crumbs left in their own living room. Seriously, blaming a website for a malicious browser extension is like blaming your fridge for your pizza delivery being late. Nice try, but let’s get real!
Key Points:
- Multiple vulnerabilities reported in Suno.com, including JWT leakage, IDOR, and DoS.
- JWT token leakage arises from malicious browser extensions, not Suno.com itself.
- Vendor dismisses claim, stating the issue is not with their site but with the user’s compromised browser.
- Gynvael Coldwind clarifies the misunderstanding, emphasizing the importance of user-side security.
- Highlights the misuse of CVEs in attributing vulnerabilities to services instead of software.
Already a member? Log in here
