+0.41 Zero-click, wormable, cross-platform remote code execution in Microsoft Teams (github.com S:+0.28 )
1307 points by Tomte 1911 days ago | 317 comments on HN | Moderate positive Contested Editorial · v3.7 · 2026-02-28 07:50:50 0
Summary Security & Privacy Advocates
This GitHub repository hosts a detailed security vulnerability disclosure documenting critical remote code execution flaws in Microsoft Teams that enable zero-interaction attacks threatening user security and privacy. The author advocates forcefully that these threats warrant maximum severity recognition, criticizes the vendor's inadequate response, and publicly exercises freedom of expression to expose a corporate accountability failure affecting millions of users.
Article Heatmap
Preamble: +0.38 — Preamble P Article 1: +0.30 — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: +0.60 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: +0.20 — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: +0.30 — Equality Before Law 7 Article 8: +0.30 — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.56 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: +0.20 — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.52 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: +0.10 — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: ND — Cultural Participation Article 27: No Data — Cultural Participation 27 Article 28: +0.40 — Social & International Order 28 Article 29: +0.40 — Duties to Community 29 Article 30: ND — No Destruction of Rights Article 30: No Data — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.41 Structural Mean +0.28
Weighted Mean +0.40 Unweighted Mean +0.35
Max +0.60 Article 3 Min +0.10 Article 23
Signal 12 No Data 19
Volatility 0.15 (Medium)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.52 Editorial-dominant
FW Ratio 61% 28 facts · 18 inferences
Evidence 21% coverage
2H 6M 4L 19 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.34 (2 articles) Security: 0.40 (2 articles) Legal: 0.30 (2 articles) Privacy & Movement: 0.56 (1 articles) Personal: 0.20 (1 articles) Expression: 0.52 (1 articles) Economic & Social: 0.10 (1 articles) Cultural: 0.00 (0 articles) Order & Duties: 0.40 (2 articles)
HN Discussion 20 top-level · 30 replies
bouke 2020-12-07 13:54 UTC link
> Microsoft accepted this chain of bugs as "Important" (severity), "Spoofing" (impact) in O365 cloud bug bounty program. That is one of the lowest in-scope ratings possible.

This is beyond believe: a RCE classified as "Spoofing".

baq 2020-12-07 14:02 UTC link
> Sooo, after around 3 months it ended as-is: "Important, Spoofing" and that the desktop client - remote code execution - is "out of scope".

literally unbelievable. wow.

ipostonthisacc 2020-12-07 14:08 UTC link
read the report fully - RCE is "out of scope", however the impact from stored XSS itself is crazy!
oskarsv 2020-12-07 14:33 UTC link
I wrote this. This is one of five similar reports for MS Teams.

Even outside RCE, just consider the impact of access to SSO tokens and wormability :)

timvisee 2020-12-07 14:42 UTC link
This essentially allows you to infect all (online) machines running Teams in some timespan, because of the wormability, if I understand this correctly. There are 115 million daily active users.

The absurdly low rating by Microsoft is horrendous.

Havoc 2020-12-07 14:42 UTC link
hmm...seems a bit counterproductive trying to build good will by offering a bounty program and promptly nuking said good will with questionable ratings decisions.

Immediate money saved, long term rep damage incurred.

arnaudsm 2020-12-07 14:52 UTC link
It's because of behavior like this that future Microsoft RCEs may be sold on the black market instead.
prussian 2020-12-07 15:07 UTC link
These are some of the reasons why I refuse to use the desktop application and on Linux at least, it isn't hard to define a shortcut that works like one; path ~/.local/share/applications/ms-teams.desktop

  [Desktop Entry]
  Version=1.0
  Name=Microsoft Teams
  Comment=Teams without Electron
  GenericName=Teams
  Exec=/usr/bin/chromium-browser --user-data-dir=/home/prussian/.config/ms-teams --app=https://teams.microsoft.com/_#/conversations/General
  Terminal=false
  X-MultipleArgs=false
  Type=Application
  Icon=ms-teams
  Categories=Network;InstantMessaging;
  Keywords=teams;messaging;internet;
  X-Desktop-File-Install-Version=0.23
post_break 2020-12-07 15:25 UTC link
So glad Microsoft installed teams on our server with an update even though we never asked for it.
mwcampbell 2020-12-07 15:25 UTC link
I'm confused about the scope of the RCE. Can it escape the Chromium renderer sandbox? Or is that sandbox disabled? Based on the following:

> MS Teams ElectronJS security: remote-require is disabled & filtered, nodeIntegration is false, webview creation is filtered and normally removes insecure params/options. You cannot simply import child_process and execute arbitrary code or create a webview with a custom preload option.

it looks like they did everything right.

I would like this thread to go beyond outrage at how Microsoft handled this, or another excuse to bash Electron. What lessons can developers using Electron take from this? (No, "don't use Electron" doesn't count.)

jstsch 2020-12-07 15:26 UTC link
Unbelievably lax response. However, I've encountered a similar response with Microsoft 365 login phishing sites being hosted with a nice windows.net SSL certificate. Sites remained up for more than a week after reporting through official channels (CERT). Never received a response.
jacquesm 2020-12-07 15:44 UTC link
I refuse to install this junk, it's Google Meet or bust for us and so far that has served us well. Zoom, MS and lots of others besides have all had their share of vulnerabilities to the point that I'm not happy discussing anything under NDA on one of those channels. For now Google seems to have their act together on this.
eitland 2020-12-07 15:44 UTC link
Reported information leaking from password fields back in Windows 8 days.

I was even busier back then than now and found no application besides getting information about an already filled in password, but I was still massively underwhelmed by the response which basically boiled down to "that's funny, thanks, bye".

Last year I found a really ugly glitch were you can easily get files unencrypted past an older (but still available) version of Azure Information Protection tooling.

This time I haven't bothered to report it yet.

whoopdedo 2020-12-07 15:45 UTC link
And on the same day Microsoft announces they're enabling guest access by default.
ds 2020-12-07 15:55 UTC link
Whats the reason to even participate in most bug bounties for serious shit like this knowing you could get 10-100x more submitting to Zerodium? Is it the hope of getting on some 'hall of fame' which might land a job offer?

Like, If I found a exploit for something random like skype/slack/etc.. that let you run code on any targets machine with zero interaction, there is zero chance my first stop would be the bug bounty program. For serious exploits, I believe you can get up to 2 million bucks with zerodium. Just seems like a no brainer.

Now that said, I would definitely use the bug bounty program for boring/low impact stuff like XSS and whatnot that has limited value/impact as nobody else would likely ever buy it for that much higher of a price.

jwiley 2020-12-07 16:12 UTC link
This reminds me of finding and trying to report a bug in Internet Explorer 5.5 20+ years ago (not a difficult task). To report a bug, I had to pay. Yes that's right, I had to put in a credit card, and pay $100.

If it turned out it was deemed to be a real bug, I would be refunded my $100 money. If it wasn't, well that should teach me for wasting their time.

Guess the folks running the bug program got promoted.

haolez 2020-12-07 18:07 UTC link
Microsoft Teams is clearly a product worrying about user base growth and nothing else. There are bugs, quirks and performance issues everywhere, and then - out of nowhere - you get an update about its new "AI Real-time Speech Translation for Your Calls!".

They are just pushing new features in and hoping that everything will hold together until they dominate the market. I'm not saying that this is wrong, just that this is a fact for anyone that uses Teams on a daily basis.

tw3d6624e6dd83 2020-12-07 18:12 UTC link
IMO the best situation _for customers_ would be for researchers to sell their discoveries in an open market, one in which MS is free to pay "market price" (they certainly have the funds).

In the short-term, MS buying these discoveries would allow them to close vulnerabilities, ensure researchers are compensated appropriately, and establish a clear financial cost to poor security. The long-term effects would be increased security research, shorter windows of vulnerability, and more secure software.

A4ET8a8uTh0 2020-12-07 19:45 UTC link
Fun. What is interesting to me is that my work computer just got unannounced update that included MS Teams pop up. I get that my IT team dropped the ball by just allowing this to show willy nilly, but I don't think we can take MS off the hook for installing, promoting their own solution in user's face ( along with telling me snip tool is moving away, resetting all file associations, and making pdf default to IE.. ).

Whatever happened to user agency?

dannyw 2020-12-08 01:28 UTC link
Greyhats with good anonymization need to start forcing companies to take their bounty programs seriously instead of the joke that it is now. We are too nice.

This is a bug that should have a minimum payment of $1 million.

lhoff 2020-12-07 14:03 UTC link
The reason is probably to safe money. The bug bounty for a critical RCE would be between 10k$ and 20k$ depending on the quality of the report. Important Spoofing is rated for 3k$ and 500$.

So that is basically a giant middle finger to the security researchers.

Source: https://www.microsoft.com/en-us/msrc/bounty-microsoft-cloud

lhoff 2020-12-07 14:04 UTC link
Its out of scope because the scope microsofts bug bounty programm is limited to web applications and endpoints.
artjomb 2020-12-07 14:34 UTC link
Could you provide a disclosure timeline and the version or indication of the version which has fixed this issue?
lucideer 2020-12-07 14:48 UTC link
The RCE isn't classed as "Spoofing". The RCE is in a product for which Microsoft don't have any bug bounty product at all (they only run a bug bounty for a very limited number of products, and Microsoft Teams Desktop is not one of them). Hence the RCE falls outside of the classification.

The technicality is still absurd and beyond belief, but I'd say the responsibility for that absurdity falls with company policy, not with the MS security staffer's classification.

oskarsv 2020-12-07 15:29 UTC link
there are different levels of security for ElectronJS, some, like in this case are not enough.

I think it will take a long time before we can call ElectronJS secure. there are regular sandbox escapes and that is from what we know publicly

rakoo 2020-12-07 15:30 UTC link
Out of scope for the bounty, but it's still very valid
tclancy 2020-12-07 15:30 UTC link
Is there any tell-tale sign this happened to you? I had a really weird experience on Mac last week: I opened up my machine and when I focused on teams I got a security alert saying something called Endgame from Elastico was demanding permissions. Never downloaded it but there it was in Applications.
thesimon 2020-12-07 15:32 UTC link
Just for comparison: I reported a Facebook phishing site to Netlify, it was taken down within 9 minutes.
x86_64Ubuntu 2020-12-07 15:35 UTC link
It seems like 365 has so many problems whether they are security or uptime related. I'm glad my company hasn't moved over to it yet.
oskarsv 2020-12-07 15:43 UTC link
Yeah, although technically it's "out of scope", I think there are times when you should stop debating the technicalities and consider the business impact.

I mean, do you look at that demo and think "yeah, that's technically just 'important' let's fix it in 2 months"?

stagger87 2020-12-07 15:43 UTC link
What lessons can we learn from banging our heads on the wall? (No, "don't bang your head on the wall" doesn't count.)
arendtio 2020-12-07 15:46 UTC link
I do similar things, but a few weeks ago I had to learn, that many of the issues I had with the online Spotify Player (slow loading times, incomplete pages, not playing music) were caused by the included ServiceWorker. Gladly I could disable it in my Firefox Profile and now everything works just fine.

Maybe the local version wouldn't have had that problem.

dbjorge 2020-12-07 15:57 UTC link
The article explains the technical details of the render process escape. Contrary to all the current replies to this comment, it does not look to me that this is using a generalized Electron escape; rather, it is using specific main/render IPC calls which Teams has implemented unsafely as the escape mechanism. Perhaps folks are confusing this with an electron sandbox issue because Teams happens to have called the variable containing their IPC APIs "electronSafeIpc".
tonyedgecombe 2020-12-07 15:57 UTC link
In case anybody else was wondering about this: https://tomtalks.blog/2020/12/important-microsoft-teams-chan...
tartrate 2020-12-07 15:58 UTC link
Everyone, literally everyone working on exploits right now will see this and potentially be influenced by how Microsoft chose to handle it.
eightysixfour 2020-12-07 16:02 UTC link
Maybe some people are ethically against selling to an organization that then resells the zero day to governments instead of, you know, fixing the problem.
thrower123 2020-12-07 16:06 UTC link
This is incredibly believable for Teams development and bug fixing timelines.
thawab 2020-12-07 16:12 UTC link
Have you been tempted to build a worm and click send? not to brake anything, just a text popup with an optimistic optimistic quote.
cogman10 2020-12-07 16:18 UTC link
Which is pretty despicable for a chat application.

I blame the constant bloat of unwanted features. Each comes with it's own inherent risk of vulnerability, yet it seems like these companies can help themselves but to add "integrations" that nobody wants or asks for from a chat application.

hezag 2020-12-07 16:32 UTC link
The hope of not letting thousands of people being easily attacked by some shady organization, maybe?
bogwog 2020-12-07 16:50 UTC link
I wonder if the team giving these ratings is the same team responsible for introducing the bug in the first place? I could see why someone in that situation would be incentivized to downplay the severity of a bug report like this.
kasajian 2020-12-07 16:52 UTC link
I had the same reaction to this when I was told by Microsoft, however this description seems intentionally misleading. Microsoft Support accepts calls for support and bug reports. There's a fee for the support. If it turns out that the issue is a defect, then you won't pay for the support call.

Unfortunately, this was the only way to report a bug at the time.

johnwalkr 2020-12-07 17:05 UTC link
Well, somehow I'm happy if they keep this lower priority than fixing broken notifications.
ciarannolan 2020-12-07 17:06 UTC link
Microsoft only grossed $100,000,000,000 last year. What makes you think they can afford more than $500 for a bug bounty?
coldtea 2020-12-07 17:39 UTC link
>No, "don't use Electron" doesn't count

Why would it count? The situation would have more easily occured and be even worse with a C/C++ native app.

blntechie 2020-12-07 17:45 UTC link
I just today switched to Google Chat from Teams and find it severely lacking. I don’t see a way to call or screenshare with another person/group unless I generate a Meet url and paste it in the chat? Is it meant to be that way or our admin has not enabled something?
edwintorok 2020-12-07 17:53 UTC link
Could you clarify the "one of five" statement please? Are the other 4 vulnerabilities still unfixed, or they are fixed but a write-up is still pending? If there are still 4 unfixed RCE bugs in Teams I'd rather people uninstall Teams than wait for the fix...
jonathanlydall 2020-12-07 18:10 UTC link
How sure are you that it wasn’t some sort of Active Directory group policy which did the install?
qz2 2020-12-07 18:12 UTC link
Oh that's nothing.

When they introduced IE7, they broke ClickOnce launchers all around the globe due to the new download prompting. I raised a defect with my MS Partner support dude and normal MS support. All they managed was a registry fix shipped out to turn an old flag on that was removed from the UI but was still in the code inside IE. I did the diagnostic work to get that far.

After arguing for months with various support people at Microsoft I managed to get hold of people on both the IE and CLR teams and they both pointed at each other and refused to fix anything blaming the other team.

They called me every 6 months to ask me to close the ticket and I denied it because it wasn't fucking fixed. Eventually they stopped calling when Microsoft Connect was shut down. I wonder how many millions of issues they solved at that time!

Oh no wait, the issue still exists in IE11. They fixed it in old Edge.

This was a manual registry fix we had to deploy to 20,000 users at over 500 companies for 10 years.

Eventually we rewrote the software so it didn't use ClickOnce, instead passing context to the application via a shell protocol handler (much like Slack does).

Incidentally we're no longer an MS Gold partner and have no certified staff any more. This is not a coincidence. They did a shitty job and like hell we were paying any further. Amazon got our business in the end.

The issue?

You can't set window.location.href=""; to a clickonce activation link because of a race condition in the download bar in IE.

CyanLite2 2020-12-07 18:13 UTC link
They could ummm.... build a cross-platform UI framework that rivals Electron without the security and memory bloat issues? I think that's the plan with MAUI.
Editorial Channel
What the content says
+0.80
Article 3 Life, Liberty, Security
High Advocacy Framing Coverage
Editorial
+0.80
SETL
+0.63

Content directly advocates that the vulnerability represents a critical threat to the security of person; explicitly details how code execution undermines personal security and bodily autonomy (microphone/camera access); criticizes vendor's failure to recognize this severity

+0.80
Article 12 Privacy
High Advocacy Framing Coverage
Editorial
+0.80
SETL
+0.69

Content strongly advocates for privacy protection by detailing how the vulnerability enables comprehensive invasion of privacy: access to 'private conversations, messages, files, call logs,' O365 documents, mail, notes, SSO tokens; frames privacy as fundamental right that was violated

+0.60
Article 19 Freedom of Expression
Medium Advocacy Framing
Editorial
+0.60
SETL
+0.35

Content is itself a prominent exercise in freedom of expression: detailed critical analysis of a major technology company's security response, published without censorship; author advocates for the right to publicly disclose vulnerabilities affecting millions

+0.50
Preamble Preamble
Medium Advocacy Framing
Editorial
+0.50
SETL
+0.39

Content frames security threats as fundamental violations of human dignity and the rule of law; advocates that inadequate response to critical vulnerabilities contradicts justice principles

+0.40
Article 28 Social & International Order
Medium Advocacy
Editorial
+0.40
SETL
ND

Content advocates for proper security standards and international norms around responsible disclosure; critiques deviation from expected industry standards; supports accountable global governance of technology

+0.40
Article 29 Duties to Community
Medium Advocacy
Editorial
+0.40
SETL
ND

Author demonstrates sense of responsibility to disclose security vulnerabilities responsibly; maintains ethical approach (redacted payloads, vendor notification before public disclosure), advocating for responsible community conduct in security research

+0.30
Article 1 Freedom, Equality, Brotherhood
Low Advocacy Framing
Editorial
+0.30
SETL
ND

Content notes the vulnerability affects all Microsoft Teams users uniformly ('Impacts all messaging thread types'), implicitly advocating for equal protection of all persons

+0.30
Article 7 Equality Before Law
Medium Advocacy Framing
Editorial
+0.30
SETL
ND

Content critiques unequal treatment by Microsoft: cloud version rated 'Important, Spoofing' while desktop version rated 'Critical, Remote Code Execution'; advocates for equal protection and consistent legal treatment

+0.30
Article 8 Right to Remedy
Medium Advocacy
Editorial
+0.30
SETL
ND

Content documents the author's engagement with Microsoft's vulnerability disclosure process and complaint mechanisms; shows attempt to seek remedy for inadequate response, though process was ultimately unsuccessful

+0.20
Article 5 No Torture
Low Framing
Editorial
+0.20
SETL
ND

Content discusses potential for unwanted surveillance (access to microphone, camera, keystroke logging) which relates to protection from degrading treatment; mild advocacy for such protections

+0.20
Article 17 Property
Low Framing
Editorial
+0.20
SETL
ND

Content mentions vulnerability enables access to 'company internal documents, O365 documents' and 'private data...outside MS Teams,' implying threat to property rights in personal and corporate information

+0.10
Article 23 Work & Equal Pay
Low Framing
Editorial
+0.10
SETL
ND

Content discusses vulnerability affecting workplace security for millions of Microsoft Teams users; mild implication that work environment security is a right

ND
Article 2 Non-Discrimination

ND
Article 4 No Slavery

ND
Article 6 Legal Personhood

ND
Article 9 No Arbitrary Detention

ND
Article 10 Fair Hearing

ND
Article 11 Presumption of Innocence

ND
Article 13 Freedom of Movement

ND
Article 14 Asylum

ND
Article 15 Nationality

ND
Article 16 Marriage & Family

ND
Article 18 Freedom of Thought

ND
Article 20 Assembly & Association

ND
Article 21 Political Participation

ND
Article 22 Social Security

ND
Article 24 Rest & Leisure

ND
Article 25 Standard of Living

ND
Article 26 Education

ND
Article 27 Cultural Participation

ND
Article 30 No Destruction of Rights

Structural Channel
What the site does
+0.40
Article 19 Freedom of Expression
Medium Advocacy Framing
Structural
+0.40
Context Modifier
ND
SETL
+0.35

GitHub's structure explicitly enables freedom of expression by hosting controversial, critical security research; public accessibility demonstrates platform's commitment to enabling speech about corporate accountability

+0.30
Article 3 Life, Liberty, Security
High Advocacy Framing Coverage
Structural
+0.30
Context Modifier
ND
SETL
+0.63

GitHub's public hosting of this security disclosure structurally enables awareness and protective action; transparency about threats to security of person aligns with this right

+0.20
Preamble Preamble
Medium Advocacy Framing
Structural
+0.20
Context Modifier
ND
SETL
+0.39

GitHub's public, transparent hosting of security disclosures supports the Preamble's commitment to freedom and justice as foundational to human rights

+0.20
Article 12 Privacy
High Advocacy Framing Coverage
Structural
+0.20
Context Modifier
ND
SETL
+0.69

GitHub's transparent hosting of privacy-threat disclosure structurally supports awareness and protective action regarding privacy rights

ND
Article 1 Freedom, Equality, Brotherhood
Low Advocacy Framing

Content notes the vulnerability affects all Microsoft Teams users uniformly ('Impacts all messaging thread types'), implicitly advocating for equal protection of all persons

ND
Article 2 Non-Discrimination

ND
Article 4 No Slavery

ND
Article 5 No Torture
Low Framing

Content discusses potential for unwanted surveillance (access to microphone, camera, keystroke logging) which relates to protection from degrading treatment; mild advocacy for such protections

ND
Article 6 Legal Personhood

ND
Article 7 Equality Before Law
Medium Advocacy Framing

Content critiques unequal treatment by Microsoft: cloud version rated 'Important, Spoofing' while desktop version rated 'Critical, Remote Code Execution'; advocates for equal protection and consistent legal treatment

ND
Article 8 Right to Remedy
Medium Advocacy

Content documents the author's engagement with Microsoft's vulnerability disclosure process and complaint mechanisms; shows attempt to seek remedy for inadequate response, though process was ultimately unsuccessful

ND
Article 9 No Arbitrary Detention

ND
Article 10 Fair Hearing

ND
Article 11 Presumption of Innocence

ND
Article 13 Freedom of Movement

ND
Article 14 Asylum

ND
Article 15 Nationality

ND
Article 16 Marriage & Family

ND
Article 17 Property
Low Framing

Content mentions vulnerability enables access to 'company internal documents, O365 documents' and 'private data...outside MS Teams,' implying threat to property rights in personal and corporate information

ND
Article 18 Freedom of Thought

ND
Article 20 Assembly & Association

ND
Article 21 Political Participation

ND
Article 22 Social Security

ND
Article 23 Work & Equal Pay
Low Framing

Content discusses vulnerability affecting workplace security for millions of Microsoft Teams users; mild implication that work environment security is a right

ND
Article 24 Rest & Leisure

ND
Article 25 Standard of Living

ND
Article 26 Education

ND
Article 27 Cultural Participation

ND
Article 28 Social & International Order
Medium Advocacy

Content advocates for proper security standards and international norms around responsible disclosure; critiques deviation from expected industry standards; supports accountable global governance of technology

ND
Article 29 Duties to Community
Medium Advocacy

Author demonstrates sense of responsibility to disclose security vulnerabilities responsibly; maintains ethical approach (redacted payloads, vendor notification before public disclosure), advocating for responsible community conduct in security research

ND
Article 30 No Destruction of Rights

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.85 medium claims
Sources
0.9
Evidence
0.9
Uncertainty
0.7
Purpose
1.0
Propaganda Flags
3 manipulative rhetoric techniques found
3 techniques detected
loaded language
Thanks Microsoft! 😂 and A new joke is born — sarcasm and mockery of vendor response
appeal to fear
Repeated emphasis on wormable spread, everyone getting exploited, complete loss of confidentiality, access to microphone/camera
exaggeration
Statements like Everyone gets exploited, Everyone reposts to contacts, groups use absolute language for probabilistic scenarios
Emotional Tone
Emotional character: positive/negative, intensity, authority
confrontational
Valence
-0.7
Arousal
0.7
Dominance
0.7
Transparency
Does the content identify its author and disclose interests?
0.95
✓ Author
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.53 problem only
Reader Agency
0.6
Stakeholder Voice
Whose perspectives are represented in this content?
0.40 2 perspectives
Speaks: individualscorporation
About: individualscorporation
Temporal Framing
Is this content looking backward, at the present, or forward?
retrospective historical
Geographic Scope
What geographic area does this content cover?
global
macOS, Windows, Linux
Complexity
How accessible is this content to a general audience?
technical high jargon domain specific
Longitudinal · 8 evals
+1 0 −1 HN
Audit Trail 28 entries
2026-02-28 07:50 model_divergence Cross-model spread 0.40 exceeds threshold (5 models) - -
2026-02-28 07:50 eval Evaluated by claude-haiku-4-5-20251001: +0.40 (Moderate positive)
2026-02-28 01:58 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 01:58 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 01:43 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 01:43 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 01:41 dlq Dead-lettered after 1 attempts: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:41 dlq Dead-lettered after 1 attempts: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:41 dlq Dead-lettered after 1 attempts: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:40 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 01:40 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral) 0.00
2026-02-28 01:38 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:38 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:38 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:37 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:37 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:37 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-28 01:36 dlq_replay DLQ message 97716 replayed to WORKERS_AI_QUEUE: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:36 dlq_replay DLQ message 97711 replayed to LLAMA_QUEUE: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:36 dlq_replay DLQ message 97700 replayed to WORKERS_AI_QUEUE: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:36 dlq_replay DLQ message 97695 replayed to LLAMA_QUEUE: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:36 dlq_replay DLQ message 97687 replayed to WORKERS_AI_QUEUE: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 01:36 dlq_replay DLQ message 97684 replayed to LLAMA_QUEUE: Zero-click, wormable, cross-platform remote code execution in Microsoft Teams - -
2026-02-28 00:02 eval_success Light evaluated: Neutral (0.00) - -
2026-02-28 00:02 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral)
2026-02-27 22:56 eval Evaluated by llama-4-scout-wai: 0.00 (Neutral)
2026-02-27 22:37 eval Evaluated by deepseek-v3.2: +0.32 (Moderate positive) 162,381 tokens
2026-02-27 22:15 eval Evaluated by claude-haiku-4-5: 0.00 (Neutral)