Raccoon Mascot

access
denied?

.... OR Maybe not?

you break the system rules¹

you claim the ultimate loot²

Discover the PHASES of our competition

access
denied?

.... OR Maybe not?

you break the system rules¹

you claim the ultimate loot²

¹ no actual doors will be harmed.

² if you don't get caught :)

The Objective

This competition is created because we noticed many student projects and club websites heavily rely on Backend-as-a-Service (BaaS) platforms like Firebase Firebase, Appwrite Appwrite, and Supabase Supabase.

** This CTF is designed specifically for the hackers at STEM Assiut STEM School!

The Experience

While powerful, these platforms often have critical security holes (like unauthorized admin access or full data exposure) if they are not secured properly. Here, you'll learn how to exploit these problems safely! All challenges are Appwrite-based, so their Docs are your friend. Feel free to use free tools like Postman, Fiddler, Chrome Dev Tools, and of course, your trusty terminal :)

The Journey

Go solo or gather a team (max 3) from your account page. Phases must be completed in order. Phase 01 & 02 are heavily educational with hints, while 03 & 04 simulate brutal real-world logic errors. Oh, and the phase mascots? They aren't random... good luck figuring out that secret :) Check out the full Rules & Awards.

Rewards Roadmap

See full Rules & Awards →

You can also...

Submit a functional website project connected to a BaaS for review. If it demonstrates excellence and strong security (zero critical or medium vulnerabilities³), you will win a .tech domain for 1 year!

Submit Project
Raccoon Reviewer

³ Vulnerability Scopes:

  • Critical: Allows full system compromise, data deletion, or unauthorized administrative access.
  • Medium: Interacts with sensitive user data, unauthorized modifications, or logic bypasses that impact functionality.
  • Harmless/Low: Informational disclosures, missing minor headers, or visual glitches with no direct security impact.