vulnerability-discovery

1 article
Sort: New Top Best
clear filter
0 8/10

Researchers automated Java deserialization gadget chain discovery using LLM-driven analysis combined with static call graph analysis, discovering novel chains against WildFly and other application servers. The methodology uses WALA-based call graph construction, dynamic bytecode analysis for type confusion, and Claude Code to iteratively explore and validate gadget chains through a REST API query interface.

ysoserial GadgetInspector Claude Code IBM Watson Libraries for Analysis (WALA) CFR Java ASM FastAPI SQLite WildFly WebLogic WebSphere JBoss Jenkins OpenNMS Foxglove Security
atredis.com · Stephen Breen · 6 hours ago · details