bug-bounty485
google305
xss296
microsoft254
facebook221
rce190
exploit160
apple144
malware139
cve126
account-takeover113
bragging-post110
privilege-escalation86
csrf85
authentication-bypass71
stored-xss66
phishing61
reflected-xss59
writeup58
dos56
supply-chain54
browser53
access-control52
reverse-engineering49
input-validation49
web-security49
react48
defi48
ssrf48
smart-contract47
cross-site-scripting46
oauth45
open-source45
ethereum44
cloudflare44
sql-injection43
web340
aws40
web-application38
docker38
lfi37
race-condition37
ctf37
burp-suite36
api-security36
ai-agents35
node34
info-disclosure33
smart-contract-vulnerability33
information-disclosure33
0
1/10
Educational guide on three common AI agent workflow patterns (sequential, parallel, evaluator-optimizer) with tradeoffs and practical guidance on when to use each pattern in production systems.
Claude Platform
Anthropic