The tweet suggests that the third WAF mentioned may be outdated due to new WAF and bypass methods. However, upon reading the payload file, it seems to be effective. It is important to stay updated on WAF technologies and bypass methods to ensure security against evolving threats.