Disclosure
[HIGH] - [redacted] DSN Exposed + Event Injection Verified
Finding 6 [HIGH] - [redacted] DSN Exposed + Event Injection Verified Summary: The [redacted] DSN is exposed in the compiled JavaScript and accepts arbitrary event injection from any origin. DSN: `https://2f87dbe19e8c72da1531842a99ad4a9f@[target].[redacted].io/4509219002122240` - In
- Target
- DeFi Lending/DEX Protocol
- Category
- XSS
- Channel
- Responsible Disclosure
- Disclosed
- 2026-03
Redaction note
Vendor identity withheld.
This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.
Coordinated disclosure
How we handled it.
- Reported to the vendor via Responsible Disclosure with a reproducible proof-of-concept.
- Triage + remediation window coordinated with the vendor security team.
- Fix verified before any public reference.
- This record published only after the embargo period closed.