SPKZMC:Bug Bounty Program

Information from The State of Sarkhan Official Records

ROYAL DECREE EPISODE ???+101lavacasted

The Hackerman Chronicles: Accidental Pentesting and the Rise of ominachan3575

"In a world where privilege escalation is just another Tuesday, one man dares to scream '5555' into the abyss and bypass AuthMe like it’s 2012." — MoNoRi-Chan, watching console logs from a ThinkPad in the DTLA


It started, as most chaotic stories do, with a "hello."

An otherwise ordinary morning on the anarcho-capitalist server of Art3mis was swiftly turned into a full-on digital exposé when the user known as ominachan3575 (or in his incognito form, notallsystemaresafe[XNHB]) casually flexed his admin command access — obtained via what he described as “just authentication plugin bypass duh.”

Yes, MoNoRi-Chan thought AuthMe and FastLogin would suffice, but what he didn’t know was that ominachan brought with him a little trinket known as the TrouserStreak Addon™, which didn’t care about your firewall or your morals. The server’s login layer folded like a crypto scam under SEC investigation.


✧ The Exploit ✧

Omina’s accidental pentesting was actually a textbook demonstration of an AuthMeVelocity vulnerability (now responsibly disclosed at GitHub Issue #176). Vulnerable versions (≤4.1.1) were susceptible to maliciously crafted LOGIN plugin messages — sent via custompayload — which let clients fake a legit login handshake without proper authentication. Boom. You're admin now.

"What is sent to the channel authmevelocity:main?" — ominachan3575, while casually uploading himself into the Matrix

And like any good white-hat-in-denial, ominachan didn’t destroy the server — he just... logged in as another user, pointed out the bug, and then offered a polite “btw update ur plugins lol.”


✧ The Aftermath ✧

MoNoRi-Chan, ever the reasonable admin archetype with a ThinkPad-powered command post in the middle of Los Angeles Thai Town, actually thanked ominachan.

Why?

Because the exploit was now patched, the security was tightened, and best of all — it was great YouTube content.

“If it’s for YouTube, then thanks for the free publicity.” — MoNoRi-Chan, King of PR Spin


🏛️ Art3mis Bug Bounty Program™

Break it, don’t fake it — and maybe get a statue at spawn

Following ominachan's incident report (read: spontaneous chaos demo), the Art3mis Council of Jaded Sysadmins has decreed the official formation of:

📜 The Art3mis Bug Bounty Program

Whether you’re a broke Minecraft script kiddie or a black-hat-in-recovery, you can now report vulnerabilities, plugin misconfigurations, or interesting exploits to the admins in exchange for server goodies like:

  • 💰 JR Coins (just as fake as the US Dollar)
  • 🗿 Statues in Spawn (if unpaid statue builders aren’t on strike)
  • 🧱 Rare Blocks, Operator Gear, or God Enchanted Armor
  • 🎖️ Special Prefix/Server Titles like White Hat, Certified Menace, or Digital Hackerman
POV Califrog vs Unpaid Spawnbuilders

“We’d rather reward you for seeing The Matrix than ban you for being Neo.” — Califrog, wielding the spawn-rebuilding whip


How to Submit:

  1. DM MoNoRi-Chan or Califrog on Discord or in-game
  2. Include:
    • Description of the bug
    • Steps to replicate
    • What you used (client/tool/plugin)
    • Whether you streamed/screen-recorded it (bonus clout)
  3. Await judgment from the Royal Decree Council (and possibly get turned into a statue)

⚠️ Note: If you grief before reporting, we’ll still patch it, but we reserve the right to laugh at you and put you in Adventure Mode Jail with a book titled “Think Before You /exec.”


🎭 Final Words:

This isn’t just a server. This is Art3mis — an open-world sim of chaotic neutral Minecraft where information is free, anarchy is real, and privilege escalation is a feature, not a bug. We reward creativity, especially the kind that finds holes in the matrix and documents them instead of nuking spawn.

So to ominachan3575, we say:

Thank you, Hackerman. Your statue is being chiseled as we speak.

(Unless Califrog fell asleep again on the bamboo scaffold.)


🪦 Next time on Royal Decree:

"Who gave Abdul operator access again?"

Tune in next episode of Art3mis: The Ricefields Edition.