Richard Hyunho Im (richeeta)

Richard Hyunho Im (@richeeta)

I’m a security researcher who specializes in uncovering logic vulnerabilities, uncommon attack surfaces, and race conditions. My discoveries and work have been publicly credited by Apple, OpenAI, Microsoft, Google, and the BBC.

I am scheduled to present Siri-ously Leaky: Exploring Overlooked Attack Surfaces Across Apple’s Ecosystem at DEF CON 33 and HOU.SEC.CON 2025.

I am also scheduled to co-host the Hacker v. Triage panel discussion with Denis Smajlović at DC 33 Bug Bounty Village.

I am OSCP-certified and am ranked (as of July 2025) in the Top 25 of OpenAI’s bug bounty program.

Some of my published CVEs include:

My main research domains include iOS/iPadOS, macOS, and visionOS, particularly where user experience collides with security boundaries: Shortcuts, Siri, SpringBoard, Face ID, and deep link chains. I also poke at cloud auth flows, buried Apple ID logic, CoreText, and anything else that trusts input a little too eagerly.

Although I have been and remain allergic to Java, I have (somehow) managed to build two Burp extensions:

Also: I have a one year old toy poodle named Peanut, who shares my passion for bug hunting (more literal in his case).