Jiacheng(Gavin) Zhong

DevOps Engineer

United States2 yrs 6 mos experience
AI EnabledAI ML Practitioner

Key Highlights

  • Identified over 10 sandbox escape vulnerabilities in LLM frameworks.
  • Uncovered 600+ vulnerabilities in SaaS platforms during internship.
  • Achieved 2nd place at Raymond James CTF 2024.
Stackforce AI infers this person is a Cybersecurity Researcher specializing in AI and SaaS security.

Contact

Skills

Core Skills

Security ResearchWeb SecurityPwnReverse EngineeringNetwork SecuritySecurity Operations

Other Skills

Code AnalysisStatic AnalysisIDSPenetration TestingVulnerability AssessmentAI SecurityLLM Agent Vulnerability ResearchCodeQL AutomationOffensive Security ResearchSecure Code ReviewCryptographyVulnerability ExploitationTeam LeadershipInformation SecurityC++

About

I am a security researcher (OSCP, BSCP) specializing in AI system security, autonomous LLM agent architectures, OAuth/SaaS exploitation, and large-scale vulnerability discovery. As a graduate researcher at the Johns Hopkins Security Lab under Dr. Yinzhi Cao, I have identified over 10 sandbox escape vulnerabilities in prominent LLM agent frameworks—including LlamaStack, Hugging Face, SmolAgents, and SecretFlow—as well as critical vulnerabilities in widely adopted LLM-integrated application platforms such as Gradio, Llama-Factory and AutoGPT. I have also discovered more than 300 Python class pollution vulnerabilities across open-source ecosystems, impacting major vendors including Google (Mesop) and Microsoft (Azure CLI). My research involves building CodeQL pipelines and LangGraph-based static analysis agents to automate end-to-end exploit path tracing, leading to multiple CVEs and a paper acceptance to the IEEE Symposium on Security and Privacy (S&P) 2026. During my internship at Obsidian Security, I led four offensive security research projects targeting OAuth and OpenID Connect flaws, including misimplementation, misconfiguration, misadoption, and misintegration. Across these projects, I uncovered 600+ critical vulnerabilities in widely used SaaS platforms spanning financial, HR, and CRM sectors, enabling account takeovers, personal/tenant-wide data breaches and authentication/2FA bypass. My work directly drove vendor remediation efforts and strengthened product-level identity threat detection. Earlier in my career, I developed over 800 IDS detection rules and identified 100+ critical vulnerabilities through web and mobile application security assessments across diverse industries in China. Notable achievements include a 2nd place finish at the Raymond James CTF 2024 and top-3 national rankings in multiple bug bounty programs.

Experience

Tiktok

Privacy Engineer - Red Team

Aug 2025Present · 7 mos · San Jose, California, United States · On-site

Obsidian security

Security Researcher

Jul 2025Aug 2025 · 1 mo

  • Crack MCP Authorization Stuffs

The johns hopkins university

2 roles

Research Assistant

Promoted

Jan 2025Aug 2025 · 7 mos · Baltimore, Maryland, United States · On-site

  • Advised by Dr. Yinzhi Cao and mentored by Zhengyu Liu. Conducted advanced research on language security and AI system security, focusing on emerging threats in modern programming language ecosystems, LLM-integrated applications and AI agent frameworks. This work has resulted in 20+ CVEs impacting widely used open-source projects (RCE, XSS, Data Exfiltration, Auth Bypass, DoS), including those maintained by Microsoft, Google, Meta, Ant Group, Hugging Face, and other major vendors.
  • The produced paper was accepted by IEEE S&P 2026 with all positive reviews.
Security ResearchWeb SecurityCode AnalysisStatic Analysis

Course Assistant

Sep 2024Jan 2025 · 4 mos · Baltimore, Maryland, United States · On-site

  • Software Vulnerability Analysis (EN.650.660)
  • Designed and developed concrete homework5 lab binary for students. The binary is vulnerable to heap overflow and unlink vulnerability. By chaining the exploitation of heap overflow, unlink arbitrary write, GOT entry overwrite and ROP chain creation, students are able to pwn the binary to invoke a shell.
  • The program is DEP enabled but combined with these attack techniques, students can hijack the control flow to get shell.
PwnReverse Engineering

Obsidian security

Security Research Intern

May 2024Aug 2024 · 3 mos · Palo Alto, California, United States · On-site

  • Led four offensive research projects on OAuth 2.0 and OpenID Connect flaws (misimplementation, misconfiguration, misadoption, misintegration), uncovering 600+ critical vulnerabilities enabling token hijacking, account takeovers, data exfiltration, and 2FA bypass across CRM, HR, and financial SaaS platforms.
  • Authored 3 in-depth research blogs on identity threats, cited by industry analysts, driving vendor remediation and bounty rewards; amplified Obsidian’s reputation as a leader in identity threat detection.
  • Developed an automated toolkit for detecting OAuth 2.0/OpenID Connect vulnerabilities across SaaS platforms, streamlining end-to-end testing and rapid identification of misconfigurations and token leakage vectors.

Tophant information technology co.

Cyber Security Researcher

May 2021Dec 2021 · 7 mos · Shanghai · On-site

  • Developed and optimized 800+ IDS detection rules to identify network/web attacks, hacking tool fingerprints,
  • and advanced threats (e.g., C2 beacons, lateral movement), improving detection accuracy by 200%.
  • pplied threat intelligence and behavioral analysis to enhance rule efficacy against evasion techniques (e.g.,
  • obfuscation, protocol tunneling).
IDSNetwork SecuritySecurity OperationsPenetration TestingVulnerability Assessment

Dbappsecurity co ltd

Cyber Security Engineer

Dec 2020May 2021 · 5 mos · Hang Zhou · On-site

  • Performed security assessments (web/mobile apps, infrastructure) for 35+ clients from varied sectors (e.g.,
  • finance, healthcare, e-commerce), uncovering 100+ critical vulnerabilities (OWASP Top 10, CVSS ≥7.0).
  • Delivered actionable remediation plans that reduced clients’ attack surface by 60% on average, while
  • developing custom exploit scripts to demonstrate business impact.
Network SecuritySecurity OperationsPenetration TestingVulnerability Assessment

Education

The Johns Hopkins University

Master of Science - MS — Security Informatics

Jan 2023Jan 2025

Stackforce found 100+ more professionals with Security Research & Web Security

Explore similar profiles based on matching skills and experience