The tweet mentions new advanced WAF bypass payloads for XSS using XSSCANNER. It also highlights basic support for DOM-based XSS and PATH-based XSS. The next few days will involve further testing. This can be a significant development in bypassing WAFs for XSS vulnerabilities. It would be interesting to see the technical details and impact of these new bypass payloads.
Check out the original tweet here: