<?xml version="1.0" encoding="UTF-8" ?>
  <rss version="2.0">
    <channel>
        <title>Enis Maholli | Blog</title>
        <link>https://enismaholli.com</link>
        <item>
          <title>Hidden Prompt Injection to Cloud Data Exfiltration</title>
          <link>https://enismaholli.com/blog/hidden-injection-cloud</link>
          <description>A vulnerability in Gemini Cloud Assist allowed invisible Unicode prompt injection combined with unsafe HTML rendering. Hidden instructions embedded in normal-looking text could execute automatically, causing the browser to exfiltrate cloud project data, IAM roles, and environment details</description>
          <pubDate>Mon, 16 Feb 2026 00:00:00 GMT</pubDate>
        </item>
<item>
          <title>Prompt Injection, but Make It Invisible</title>
          <link>https://enismaholli.com/blog/hidden-ascii</link>
          <description>This post shows how invisible Unicode characters (U+E0020–U+E007F) can be used to inject hidden instructions into text, causing AI models to respond in unexpected ways. Using the ASCII Smuggler tool, I demonstrated how a simple word like “Hey” or a job title like “Pentester” could carry invisible prompts that change an AI model’s response</description>
          <pubDate>Sun, 29 Jun 2025 00:00:00 GMT</pubDate>
        </item>
<item>
          <title>How a Shared Folder Led to Full Account Access in Nextcloud</title>
          <link>https://enismaholli.com/blog/nextcloud-account-takeover</link>
          <description>A high-severity vulnerability in Nextcloud’s sharing system allowed low-privileged users to bypass restrictions, share external storage, and steal victims’ JWT tokens, enabling account takeover.</description>
          <pubDate>Sat, 28 Jun 2025 00:00:00 GMT</pubDate>
        </item>
<item>
          <title>From Folder Sharing to Data Exposure</title>
          <link>https://enismaholli.com/blog/nextcloud-notes</link>
          <description>We discovered a vulnerability that allowed any authenticated user to access and manipulate notes of other users by exploiting folder-sharing functionality.</description>
          <pubDate>Thu, 26 Jun 2025 00:00:00 GMT</pubDate>
        </item>
<item>
          <title>Nextcloud Workflows Remote Code Execution</title>
          <link>https://enismaholli.com/blog/nextcloud</link>
          <description>We discovered a critical vulnerability in Nextcloud’s Workflow Engine that allowed any authenticated user to achieve remote code execution</description>
          <pubDate>Sat, 21 Jun 2025 00:00:00 GMT</pubDate>
        </item>
    </channel>
  </rss>