The tweet suggests that if an vulnerable input is found and a basic XSS payload works quickly, then a simple XSS payload can be used. However, if it takes 5-8 hours to bypass the WAF, then a complex XSS payload may be required. This highlights the importance of understanding the target system and adapting the payload based on the WAF response time. It's a good reminder for security researchers to constantly explore new techniques for bypassing WAFs.
Check out the original tweet here: https://twitter.com/SamArk91/status/1796413855364686212