Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
84 Indlæg 64 Posters 18 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • cr0w@infosec.exchangeC cr0w@infosec.exchange

    @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

    fennix@infosec.spaceF This user is from outside of this forum
    fennix@infosec.spaceF This user is from outside of this forum
    fennix@infosec.space
    wrote sidst redigeret af
    #24

    @cR0w @GossiTheDog

    1 Reply Last reply
    0
    • drat@infosec.exchangeD drat@infosec.exchange

      @da_667 @GossiTheDog I wish that juice actually existed...

      draeath@infosec.exchangeD This user is from outside of this forum
      draeath@infosec.exchangeD This user is from outside of this forum
      draeath@infosec.exchange
      wrote sidst redigeret af
      #25

      @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

      1 Reply Last reply
      0
      • thomasfuchs@hachyderm.ioT thomasfuchs@hachyderm.io

        @GossiTheDog you're just jealous because it will cure cancer and fix climate change

        fennix@infosec.spaceF This user is from outside of this forum
        fennix@infosec.spaceF This user is from outside of this forum
        fennix@infosec.space
        wrote sidst redigeret af
        #26

        @thomasfuchs @GossiTheDog

        I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

        1 Reply Last reply
        0
        • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

          @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

          Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

          That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

          @GossiTheDog

          draeath@infosec.exchangeD This user is from outside of this forum
          draeath@infosec.exchangeD This user is from outside of this forum
          draeath@infosec.exchange
          wrote sidst redigeret af
          #27

          @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

          It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

          badsamurai@infosec.exchangeB 1 Reply Last reply
          0
          • cr0w@infosec.exchangeC cr0w@infosec.exchange

            @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

            alan@mindly.socialA This user is from outside of this forum
            alan@mindly.socialA This user is from outside of this forum
            alan@mindly.social
            wrote sidst redigeret af
            #28

            @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

            1 Reply Last reply
            0
            • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

              @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

              draeath@infosec.exchangeD This user is from outside of this forum
              draeath@infosec.exchangeD This user is from outside of this forum
              draeath@infosec.exchange
              wrote sidst redigeret af
              #29

              @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

              confuseacat@mastodon.socialC azuaron@cyberpunk.lolA 2 Replies Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                Today in InfoSec Job Security News:

                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                dlakelan@mastodon.sdf.org
                wrote sidst redigeret af
                #30

                @GossiTheDog
                The real question is why does a bot have commit privileges on a "major web framework"?

                i mean the answer is probably because google owns the repo probably... but why?

                1 Reply Last reply
                0
                • s_bergmann@chaos.socialS s_bergmann@chaos.social

                  @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                  draeath@infosec.exchangeD This user is from outside of this forum
                  draeath@infosec.exchangeD This user is from outside of this forum
                  draeath@infosec.exchange
                  wrote sidst redigeret af
                  #31

                  @s_bergmann @GossiTheDog I like how AIDER uses co-authors, so you can't escape from blame. All these tools should be doing similar!

                  1 Reply Last reply
                  0
                  • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                    @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                    violetmadder@kolektiva.socialV This user is from outside of this forum
                    violetmadder@kolektiva.socialV This user is from outside of this forum
                    violetmadder@kolektiva.social
                    wrote sidst redigeret af
                    #32

                    @nihkeys @DJGummikuh @GossiTheDog

                    The damage is the point.

                    It's a weapon.

                    Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      Today in InfoSec Job Security News:

                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                      ftp_alun@infosec.exchangeF This user is from outside of this forum
                      ftp_alun@infosec.exchangeF This user is from outside of this forum
                      ftp_alun@infosec.exchange
                      wrote sidst redigeret af
                      #33

                      @GossiTheDog fault injection into production code at scale. Nice.

                      1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        Today in InfoSec Job Security News:

                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                        spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                        spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                        spinnyspinlock@infosec.exchange
                        wrote sidst redigeret af
                        #34

                        @GossiTheDog I became used to checking projects I am checking out for claude (etc) in the source files and commits really fast

                        trivernis@social.funkyfish.coolT 1 Reply Last reply
                        0
                        • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                          @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                          ptesarik@infosec.exchangeP This user is from outside of this forum
                          ptesarik@infosec.exchangeP This user is from outside of this forum
                          ptesarik@infosec.exchange
                          wrote sidst redigeret af
                          #35

                          @etchedpixels Bug bounties? You know nothing about business…
                          You set up a giant scam tool, let venture capital pay for its development, then use it to hack the world and sell all of it:

                          • license use of the tool,
                          • hacking applications,
                          • vulnerability scanning,
                          • protection racket from affected companies.

                          That' how real capitalists do business.
                          The tool is called Claude.
                          @GossiTheDog

                          1 Reply Last reply
                          0
                          • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                            @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                            tarheel@mstdn.ioT This user is from outside of this forum
                            tarheel@mstdn.ioT This user is from outside of this forum
                            tarheel@mstdn.io
                            wrote sidst redigeret af
                            #36

                            @etchedpixels @GossiTheDog

                            Gahhh. Takes a little effort to imagine LESS rewarding work.

                            1 Reply Last reply
                            0
                            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                              Today in InfoSec Job Security News:

                              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                              keith_lawson@mastodon.socialK This user is from outside of this forum
                              keith_lawson@mastodon.socialK This user is from outside of this forum
                              keith_lawson@mastodon.social
                              wrote sidst redigeret af
                              #37

                              @GossiTheDog This was literally the first major security mistake I made in my early days as a Perl developer and I don't imagine it's that uncommon. Claude has probably been trained with a truckload of code with these vulnerabilities.

                              That's okay because we run everything in single-purpose Docker containers now though, right? /s

                              n1xnx@tilde.zoneN 1 Reply Last reply
                              0
                              • da_667@infosec.exchangeD da_667@infosec.exchange

                                @GossiTheDog

                                bradley@techhub.socialB This user is from outside of this forum
                                bradley@techhub.socialB This user is from outside of this forum
                                bradley@techhub.social
                                wrote sidst redigeret af
                                #38

                                @da_667 @GossiTheDog

                                1 Reply Last reply
                                0
                                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                  Today in InfoSec Job Security News:

                                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                  spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                  spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                  spinnyspinlock@infosec.exchange
                                  wrote sidst redigeret af
                                  #39

                                  @GossiTheDog I see it, could probably start a threat intelligence business off the claude feed 🙂‍↕️

                                  1 Reply Last reply
                                  0
                                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                    Today in InfoSec Job Security News:

                                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                    carpetbomberz@mastodon.onlineC This user is from outside of this forum
                                    carpetbomberz@mastodon.onlineC This user is from outside of this forum
                                    carpetbomberz@mastodon.online
                                    wrote sidst redigeret af
                                    #40

                                    @GossiTheDog

                                    That Claude is a "clod", and boy does Claude get around I tell ya'. 🏃

                                    Claude is everywhere you want an exploit to be. 🚨

                                    1 Reply Last reply
                                    0
                                    • draeath@infosec.exchangeD draeath@infosec.exchange

                                      @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                                      It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                                      badsamurai@infosec.exchangeB This user is from outside of this forum
                                      badsamurai@infosec.exchangeB This user is from outside of this forum
                                      badsamurai@infosec.exchange
                                      wrote sidst redigeret af
                                      #41

                                      @draeath

                                      These MFers yeet DIRFT (Do it right the first time) and TQM principles to play hooky on the plinko and demand you call them a genius.

                                      @da_667 @GossiTheDog

                                      1 Reply Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        Today in InfoSec Job Security News:

                                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                        abucci@buc.ciA This user is from outside of this forum
                                        abucci@buc.ciA This user is from outside of this forum
                                        abucci@buc.ci
                                        wrote sidst redigeret af
                                        #42
                                        @GossiTheDog@cyberplace.social An instance of eating the seed corn, I'd say ( https://buc.ci/abucci/p/1705679109.757852 ).
                                        1 Reply Last reply
                                        0
                                        • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

                                          @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                                          Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                                          That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                                          @GossiTheDog

                                          iagox86@infosec.exchangeI This user is from outside of this forum
                                          iagox86@infosec.exchangeI This user is from outside of this forum
                                          iagox86@infosec.exchange
                                          wrote sidst redigeret af
                                          #43

                                          @badsamurai @da_667 @GossiTheDog Hey, as somebody writing a CTF, it's handy to get randomly introduced vulnerabilities!

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper