---
title: resume
pageLayout: default
slug: resume
permalink: https://stateless.computer/resume.md
generator:
  quartz: v4.5.2
  hostedProvider: Cloudflare
  baseUrl: stateless.computer
full: https://stateless.computer/llms-full.txt
---
<div class="cv-header">
<h1>Debarshi Das</h1>
<p><strong>Hacker | Engineer</strong></p>
<p><a href="mailto:vm@stateless.computer">Mail</a> · <a href="https://linkedin.com/in/debxrshi">LinkedIn</a> · <a href="https://github.com/1ikeadragon">Github</a></p>
</div>

<h2>Achievements</h2>

<div class="cv-entry">
<p><strong>Warner Bros Discovery</strong> — Critical RCE bounty</p>
<p><strong>TikTok</strong> — Business logic vulnerability disclosure</p>
<p><strong>Government of India (NCIIPC)</strong> — Critical infrastructure security acknowledgement</p>
</div>

<h2>Certifications</h2>

<div class="cv-entry">
<div class="cv-row"><span><strong>CREST Practitioner Security Analyst (CPSA)</strong></span><span class="cv-date">2025</span></div>
</div>

<h2>Experience</h2>

<div class="cv-entry">
<div class="cv-row"><span><strong>Founding Engineer · HacktronAI</strong></span><span class="cv-date">Apr 2026 – Present</span></div>
<ul>
<li>Redesigned the <strong>repository analysis pipeline</strong> with census-driven structural classification and high-precision path inference eliminating context starvation in downstream agents while reducing runtime by an order of magnitude on large repositories.</li>
<li>Collaborated in <strong>improving call-graph building pipeline</strong> that directly influenced downstream quality and coverage of vulnerability findings.</li>
<li>Contributed to autonomous <strong>blackbox DAST architecture</strong> supporting authenticated scanning, reachability validation, exploit chaining, and environment-dependent vulnerability confirmation.</li>
<li>Architected and <strong>implemented dynamic vulnerability validation</strong> for code reviews that supported custom environment builds on-demand to remain tech-stack agnostic and multi-agent system to carry out true validation and exploitation over theoretical metrics.</li>
<li>Improved <strong>multi-agent validation precision</strong> across judge pipelines by reducing false-positive propagation through structured context enrichment.</li>
</ul>
</div>

<div class="cv-entry">
<div class="cv-row"><span><strong>Security Product Engineer · SecurityReviewAI (we45)</strong></span><span class="cv-date">Jan 2025 – Apr 2026</span></div>
<ul>
<li>Core architect of <strong>Orchestron v2 (O2)</strong>, an autonomous pentest orchestrator spanning reverse engineering, API testing, and authenticated web-application scanning.</li>
<li>Implemented persistent agent memory enabling multi-step vulnerability chaining and threat-scenario reasoning across attack surfaces.</li>
<li>Built MCP servers integrating Claude and OpenAI SDK workflows for tool-augmented execution.</li>
<li>Reduced per-review LLM cost by <strong>88%</strong> via Langfuse trace-level observability and workflow optimization.</li>
<li>Developed SecurityReview-Kit enabling inline developer threat modeling during code generation workflows.</li>
<li>Automated DevSecOps scanning pipelines adopted org-wide, reducing vulnerability backlog by <strong>90%</strong>.</li>
<li>Performed security architecture reviews for multi-tenant Kubernetes ML inference systems (PyTorch, Ray Serve).</li>
<li>Audited legacy C/C++ enterprise codebases uncovering memory-safety and privilege-escalation vulnerabilities.</li>
<li>Designed libAFL fuzzing harnesses discovering parser corruption and deserialization flaws.</li>
<li>Reverse engineered closed-source binaries using IDA Pro and Ghidra to reproduce exploit chains.</li>
<li>Technical advisor for global HackerOne triage operations improving classification accuracy and turnaround efficiency.</li>
</ul>
</div>

<h2>Technical Skills</h2>

<div class="cv-skills">
<p><strong>Languages</strong> — Python, Rust, C, C++, Java, Assembly (x86_64 / Armv8)</p>
<p><strong>Agentic Systems</strong> — Claude Agent SDK, OpenAI SDK, LangChain, LangGraph, MCP architectures</p>
<p><strong>Backend</strong> — FastAPI, Pydantic, APScheduler, Temporal</p>
<p><strong>Program Analysis</strong> — IDA Pro, Ghidra, Binary Ninja, AFL++, libFuzzer, Frida</p>
<p><strong>Infra</strong> — Docker, Kubernetes, GCP, GitHub Actions, PostgreSQL</p>
</div>

<h2>Projects</h2>

<div class="cv-entry">
<p><strong>Awesome OffSec Claude</strong></p>
<ul>
<li>Curated reusable offensive-security agent skills and prompt schemas for reconnaissance, vulnerability discovery, and exploitation workflows.</li>
</ul>
<p><strong>WordPress Plugin SAST Automation</strong></p>
<ul>
<li>Automated security analysis across top plugins using Semgrep + CodeQL with SARIF reporting pipelines.</li>
</ul>
</div>

<h2>Education</h2>

<div class="cv-entry">
<div class="cv-row"><span><strong>Techno Main Salt Lake — Bachelor's in Computer Application</strong></span><span class="cv-date">2021 – 2024</span></div>
</div>

