The tweet mentions an interesting finding where the origin IP leads to bypassing the WAF. This may not be considered a security risk, but it raises questions about the purpose of using a WAF if it can be bypassed in this manner. It is important to understand the role of a WAF and its effectiveness in protecting against web application attacks. More information is needed to analyze the specific scenario and determine the implications of the origin IP bypass for cybersecurity.
For more details, check out the original tweet here: https://twitter.com/pentesterzaman/status/1772704536601264233