The site doesn't seem to be thrown together very well, you can dump the entire DB by searching for a space character [0] (assuming every officer should have a space in their full name). It dumps as a nice JSON format with all the details.
> you can dump the entire DB by searching for a space character
I abused this trick to perform local fuzzy searches for usernames, results would update with no delay on every keypress, the competing devs were so blown away and couldn't tell how I did it lol.
Best exploit ever. It wouldn't have scaled but it was still so funny to see everyone else's reactions.
In my experience the vast majority of the time exploits are found over Ajax APIs. Developers just forget that sanitization client side isn't secure. It's a good party trick for sure.
The funny thing is that you actually didn't do it by searching for an actual space—you would search for an underscore, and they would convert it to a space after checking if the input is empty, but before trimming, so...
All the headshots can easily be extracted by appending "https://watchthewatchers.net/headshots/" to the values from the "imagePath" value in the JSON dump.
[0] https://watchthewatchers.net/api/search/%20