Wiz researchers investigated and found the core of the flaw, a threat actor ID bypass due to unanchored regexes, and notified ...
Two major milestones: finalizing my database choice and successfully running a local model for data extraction.