Project Description
Building a Rust-based security research tool that correlates multiple CVEs across different classes — privilege escalation, information disclosure, misconfigurations in email/SMS APIs, SMTP relays, and databases.
The goal: simulate real-world attack chains that lead to exposure of sensitive data (API keys, database credentials, communication logs) so defenders can identify weak links.
Looking for 2–3 motivated Rust developers to collaborate.
You should know:
· Rust (systems-level)
· CVE analysis (any class — info leak, auth bypass, misconfig)
· Working with APIs, databases, or network protocols
What we're building:
A detection engine that chains unrelated CVEs (e.g., an info leak + a weak SMTP config + a database misconfig) to map full exposure paths — not just single exploits.
Strictly for authorized security research and defense testing.
Looking for:
· Developers who think in systems, not single bugs
· Village builders, not lone villagers
Message with:
· A Rust code sample
· One CVE (any type) you find interesting