The tweet mentions creating an XSS payload to bypass a WAF. The payload used is <script>alert('Bypassed!')</script>. The vendor of the WAF is unknown. This shows that security engineers also code to develop bypass scripts for security testing purposes.
For more insights, check out the original tweet here: https://twitter.com/Ch3tan_bug/status/1853119039994040584