Search Posts identity verification vulnerabilities