Hacking the World Poker Tour: Inside Clubwpt Gold's Back Office
Posted2 months agoActive2 months ago
samcurry.netTechstory
calmmixed
Debate
20/100
SecurityVulnerability DisclosureOnline Gaming
Key topics
Security
Vulnerability Disclosure
Online Gaming
The article details how the author discovered and reported a security vulnerability in the World Poker Tour's ClubWPT Gold back office, highlighting both the vulnerability and the responsible disclosure process.
Snapshot generated from the HN discussion
Discussion Activity
Moderate engagementFirst comment
3d
Peak period
7
72-84h
Avg / period
3.3
Key moments
- 01Story posted
Oct 26, 2025 at 7:48 AM EDT
2 months ago
Step 01 - 02First comment
Oct 29, 2025 at 2:55 PM EDT
3d after posting
Step 02 - 03Peak activity
7 comments in 72-84h
Hottest window of the conversation
Step 03 - 04Latest activity
Oct 31, 2025 at 8:07 AM EDT
2 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
ID: 45710981Type: storyLast synced: 11/20/2025, 1:23:53 PM
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
https://crt.sh/?q=liuxinyi1.cn
"CONTEXT: PL/pgSQL function web_apis(text,text[],text[]) line 4671 at FOR over EXECUTE statement ERROR: server conn crashed?"
May be pushing a bit too hard on their postgres-rest ?
Meaning all PII (name, address , id scans, ip, ...) are available to Chinese individuals.
The argument that the dev website is just developped in China doesn't hold as you can see that the prod admin panel is also partially in Chinese.
And what to say about the admin that is really using 123456 as password in production...