Critical Thinking - Bug Bounty Podcast

Episode 167: Stealing Bugs with Valeriy Shevchenko

Mar 26, 2026
Valeriy Shevchenko (Krevetk0), an experienced bug bounty hunter and program manager known for high-impact findings. He recounts early big wins and how to prove transient vulnerabilities. He explores scope expansion via supplier chains and proxies. He reveals a striking report‑theft case, how leaks happen, and practical mitigations like watermarks and server-side POCs.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

10K Paid For A Burned But Valid Credential Leak

  • Valeriy documented an AWS credential exposure during an acquisition prep that worked briefly then the server was shut down, but credentials in his screenshots still allowed access via CLI.
  • He validated live access, submitted to the program after acquisition completed, and received about $10–12K because the exposure proved real.
ADVICE

Document Everything With Screenshots And POCs

  • Always record strong evidence like screenshots and video POCs because triage delays or service shutdowns can make live replication impossible.
  • Save Burp/requests and reuse captured credentials or CLI validation to prove transient exposure.
ANECDOTE

Third Party Debug Mode Led To Main Site Admin Access

  • Valeriy found a third‑party agency link that exposed a Symfony debug page and PHP info containing credentials, which led to WordPress admin access and content tampering across the main brand.
  • The supplier reused credentials across environments, letting him pivot from an out‑of‑scope supplier to in‑scope main sites, forcing the org to shut services and rotate secrets.
Get the Snipd Podcast app to discover more snips from this episode
Get the app