<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Vtk on harpi - Security Researcher</title><link>https://harpi.cc/tags/vtk/</link><description>Recent content in Vtk on harpi - Security Researcher</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 06 Apr 2026 16:17:15 +0300</lastBuildDate><atom:link href="https://harpi.cc/tags/vtk/index.xml" rel="self" type="application/rss+xml"/><item><title>Shaking the Mesh: Four Memory Corruption Bugs in VTK's GLTF Loader</title><link>https://harpi.cc/blog/cves/vtk-gltf/</link><pubDate>Thu, 30 Oct 2025 00:00:00 +0000</pubDate><guid>https://harpi.cc/blog/cves/vtk-gltf/</guid><description>&lt;blockquote>
&lt;p>&lt;em>&amp;ldquo;The future is already here — it&amp;rsquo;s just not evenly distributed.&amp;rdquo;&lt;/em> — William Gibson&lt;/p>&lt;/blockquote>
&lt;h2 id="how-i-got-here">How I Got Here&lt;/h2>
&lt;p>In mid-2025 I scoped out an engagement for &lt;a href="https://www.radicallyopensecurity.com/">Radically Open Security&lt;/a> targeting &lt;a href="https://f3d.app/">F3D&lt;/a> — a fast, minimalist 3D viewer that supports dozens of file formats — and its library counterpart, &lt;code>libf3d&lt;/code>. The proposal focused on three attack surfaces:&lt;/p>
&lt;blockquote>
&lt;p>Code audit and pentesting of &lt;code>f3d&lt;/code> and &lt;code>libf3d&lt;/code>.&lt;/p>
&lt;p>Our primary target is the &lt;code>libf3d&lt;/code> since its API is used by third-party projects and security issues are more critical.&lt;/p></description></item></channel></rss>