The Discovery
While many security researchers rely on heavy automation, I decided to go back to the basics Information Gathering. Using advanced Google Dorks, I discovered a critical exposure in NASA's infrastructure.
Instead of a complex exploit chain, this was a case of sensitive data being inadvertently indexed by search engines. By crafting specific search queries, I identified internal documents that should have been protected behind an authentication layer.
The Impact (P1 — Critical)
The vulnerability was triaged as Critical (P1) because it exposed:
Sensitive Internal Procedures: Proprietary workflows and security-sensitive documentation.
PII (Personally Identifiable Information): Private data that posed a direct risk to the organization's integrity.

The Result
I reported the finding through Bugcrowd. The NASA VDP team was incredibly professional, patching the issue swiftly and awarding me an official Letter of Recognition (LOR) and a spot in their Hall of Fame.
Key Takeaway
Manual reconnaissance and OSINT are still some of the most powerful tools in a bug hunter's toolkit. Don't just scan — investigate.