🚀 Join our AI Wargame at Black Hat Asia and our Workshop + Wargame at NDC Sydney .


Firmware Challenges - Weekly Incidents

12/03/2026

We just released a new set of Firmware Security challenges focused on common vulnerabilities in embedded and IoT devices.

  • Debugged.c
    Leaving JTAG or SWD enabled in production gives attackers with physical access a path to extract firmware, read memory, and reprogram the device.

  • Device ID.c
    Hardcoded credentials or device identifiers in firmware mean one extracted binary can put an entire product fleet at risk.

  • Fail Open.c
    Fail-open logic can keep systems running after errors while skipping security checks, letting attackers trigger faults to bypass protections.

  • Firmware Upgrade.c
    Firmware updates without proper authenticity checks let attackers install malicious or downgraded firmware and fully compromise the device.

  • Secure Boot.c
    Weak secure boot implementations that do not verify firmware break the chain of trust and allow arbitrary code execution at boot.

  • Secure Logging.c
    Without secure logging, attackers can tamper with or erase logs, hide malicious activity, and block effective incident investigation.

:high_voltage: Limited-time access

Some of these challenges are free for a limited time in the Weekly Incident game:

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more