VLESS Vulnerability Exposed by Researcher | Generated by AI

Home 2026.05

Question: What is the GitHub repository Anonymous376c1d0cf28/VLESS-cracker?

Answer:

Overview

This is a GitHub repository created by an anonymous network security professional who claims to have discovered a critical vulnerability in the VLESS/XTLS/REALITY proxy protocol — a popular censorship-circumvention (VPN-like) protocol used mainly in China to bypass the Great Firewall (GFW).


Background: What is VLESS/XTLS/REALITY?

VLESS, XTLS, and REALITY are a family of anti-censorship proxy protocols developed by someone in the community known as RPRX. They are widely used by people in China to bypass internet censorship. RPRX has long claimed these protocols are superior to alternatives like Shadowsocks (SS), Trojan, Hysteria2, etc., and has been very vocal and aggressive in promoting them.


What the Repository Claims

The anonymous author — a self-described network security professional active since around 2010 — makes several serious allegations:

1. A Fatal Detection Vulnerability

The author claims they discovered, in under 10 minutes, a flaw in the VLESS/XTLS/REALITY protocol that allows the traffic to be detected with ~100% accuracy and very low false positive rates. This is far worse than other mainstream circumvention protocols, which can only be probabilistically detected by the GFW.

The critical implication: if a protocol’s traffic can be precisely identified, the user’s IP address and physical location can also be precisely identified — a massive personal security risk.

2. Technical Criticism of the Protocol Design

3. Community and Ethical Criticism


The Ultimatum / Disclosure Timeline

The author issued a 3-day ultimatum (deadline: UTC+8, May 11, 2026, 15:00):

The author also advises current VLESS/REALITY users to migrate to other protocols immediately during this window.


Summary Assessment

Aspect Details
Type Vulnerability disclosure / community call-out
Target VLESS/XTLS/REALITY censorship circumvention protocols
Claimed Severity 100% traffic detection accuracy — catastrophic for user anonymity
Current Status Ultimatum issued; PoC not yet released (as of May 9, 2026)
Author Anonymous network security researcher

Important Note

This repository is politically and technically contentious. The vulnerability has not yet been independently verified by third parties, and no PoC code has been released at this time. Users of VLESS/REALITY-based proxies should monitor this situation closely and consider the author’s advice to evaluate alternative protocols.

References:


Back Donate