Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
84 Indlæg 64 Posters 18 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • hohokam@mastodon.sdf.orgH hohokam@mastodon.sdf.org

    @GossiTheDog sure, but it did that so much faster than a human could!

    androcat@toot.catA This user is from outside of this forum
    androcat@toot.catA This user is from outside of this forum
    androcat@toot.cat
    wrote sidst redigeret af
    #12

    @hohokam @GossiTheDog

    The LLM can fuck up your project much faster than human developers ever could.

    1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      Today in InfoSec Job Security News:

      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

      harrysintonen@infosec.exchangeH This user is from outside of this forum
      harrysintonen@infosec.exchangeH This user is from outside of this forum
      harrysintonen@infosec.exchange
      wrote sidst redigeret af
      #13

      It's almost as if the language models are actually not intelligent at all.

      Who would have thought!?

      1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        Today in InfoSec Job Security News:

        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchange
        wrote sidst redigeret af
        #14

        @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

        fennix@infosec.spaceF alan@mindly.socialA 2 Replies Last reply
        0
        • da_667@infosec.exchangeD da_667@infosec.exchange

          @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

          derbruesseler@chaos.socialD This user is from outside of this forum
          derbruesseler@chaos.socialD This user is from outside of this forum
          derbruesseler@chaos.social
          wrote sidst redigeret af
          #15

          @da_667 @GossiTheDog maybe it introduced them in the first place. Now its finding its own code.

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            Today in InfoSec Job Security News:

            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

            0xtero@ohai.social0 This user is from outside of this forum
            0xtero@ohai.social0 This user is from outside of this forum
            0xtero@ohai.social
            wrote sidst redigeret af
            #16

            @GossiTheDog I like the part where people are using Claude to write CLAUDE.md to explain Claude about directory traversal.

            Nothing in this supply chain could ever go wrong.

            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              Today in InfoSec Job Security News:

              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

              s_bergmann@chaos.socialS This user is from outside of this forum
              s_bergmann@chaos.socialS This user is from outside of this forum
              s_bergmann@chaos.social
              wrote sidst redigeret af
              #17

              @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

              draeath@infosec.exchangeD 1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                Today in InfoSec Job Security News:

                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                thomasfuchs@hachyderm.ioT This user is from outside of this forum
                thomasfuchs@hachyderm.ioT This user is from outside of this forum
                thomasfuchs@hachyderm.io
                wrote sidst redigeret af
                #18

                @GossiTheDog you're just jealous because it will cure cancer and fix climate change

                fennix@infosec.spaceF 1 Reply Last reply
                0
                • da_667@infosec.exchangeD da_667@infosec.exchange

                  @GossiTheDog ladies and gentlemen, it's this stupid shit (tm) that we are paying up the ass for new SSDs and RAM for.

                  drat@infosec.exchangeD This user is from outside of this forum
                  drat@infosec.exchangeD This user is from outside of this forum
                  drat@infosec.exchange
                  wrote sidst redigeret af
                  #19

                  @da_667 @GossiTheDog There's not enough press on the downstream effects this stupid shit (tm) causes for any non-giant corp including those kids trying to build home labs to learn (like mine).

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    Today in InfoSec Job Security News:

                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                    ectopod@hachyderm.ioE This user is from outside of this forum
                    ectopod@hachyderm.ioE This user is from outside of this forum
                    ectopod@hachyderm.io
                    wrote sidst redigeret af
                    #20

                    @GossiTheDog was it Next.js?

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      Today in InfoSec Job Security News:

                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                      etchedpixels@mastodon.socialE This user is from outside of this forum
                      etchedpixels@mastodon.socialE This user is from outside of this forum
                      etchedpixels@mastodon.social
                      wrote sidst redigeret af
                      #21

                      @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                      ptesarik@infosec.exchangeP tarheel@mstdn.ioT 2 Replies Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        Today in InfoSec Job Security News:

                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                        hughsie@mastodon.socialH This user is from outside of this forum
                        hughsie@mastodon.socialH This user is from outside of this forum
                        hughsie@mastodon.social
                        wrote sidst redigeret af
                        #22

                        @GossiTheDog I guess the AI security scanners will clean this up with their automated scan and CVE requests.</joke>

                        joshbressers@infosec.exchangeJ 1 Reply Last reply
                        0
                        • da_667@infosec.exchangeD da_667@infosec.exchange

                          @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

                          badsamurai@infosec.exchangeB This user is from outside of this forum
                          badsamurai@infosec.exchangeB This user is from outside of this forum
                          badsamurai@infosec.exchange
                          wrote sidst redigeret af
                          #23

                          @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                          Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                          That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                          @GossiTheDog

                          draeath@infosec.exchangeD iagox86@infosec.exchangeI 2 Replies Last reply
                          0
                          • cr0w@infosec.exchangeC cr0w@infosec.exchange

                            @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                            fennix@infosec.spaceF This user is from outside of this forum
                            fennix@infosec.spaceF This user is from outside of this forum
                            fennix@infosec.space
                            wrote sidst redigeret af
                            #24

                            @cR0w @GossiTheDog

                            1 Reply Last reply
                            0
                            • drat@infosec.exchangeD drat@infosec.exchange

                              @da_667 @GossiTheDog I wish that juice actually existed...

                              draeath@infosec.exchangeD This user is from outside of this forum
                              draeath@infosec.exchangeD This user is from outside of this forum
                              draeath@infosec.exchange
                              wrote sidst redigeret af
                              #25

                              @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

                              1 Reply Last reply
                              0
                              • thomasfuchs@hachyderm.ioT thomasfuchs@hachyderm.io

                                @GossiTheDog you're just jealous because it will cure cancer and fix climate change

                                fennix@infosec.spaceF This user is from outside of this forum
                                fennix@infosec.spaceF This user is from outside of this forum
                                fennix@infosec.space
                                wrote sidst redigeret af
                                #26

                                @thomasfuchs @GossiTheDog

                                I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

                                1 Reply Last reply
                                0
                                • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

                                  @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                                  Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                                  That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                                  @GossiTheDog

                                  draeath@infosec.exchangeD This user is from outside of this forum
                                  draeath@infosec.exchangeD This user is from outside of this forum
                                  draeath@infosec.exchange
                                  wrote sidst redigeret af
                                  #27

                                  @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                                  It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                                  badsamurai@infosec.exchangeB 1 Reply Last reply
                                  0
                                  • cr0w@infosec.exchangeC cr0w@infosec.exchange

                                    @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                                    alan@mindly.socialA This user is from outside of this forum
                                    alan@mindly.socialA This user is from outside of this forum
                                    alan@mindly.social
                                    wrote sidst redigeret af
                                    #28

                                    @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

                                    1 Reply Last reply
                                    0
                                    • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                                      @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                                      draeath@infosec.exchangeD This user is from outside of this forum
                                      draeath@infosec.exchangeD This user is from outside of this forum
                                      draeath@infosec.exchange
                                      wrote sidst redigeret af
                                      #29

                                      @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                                      confuseacat@mastodon.socialC azuaron@cyberpunk.lolA 2 Replies Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        Today in InfoSec Job Security News:

                                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                        dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                                        dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                                        dlakelan@mastodon.sdf.org
                                        wrote sidst redigeret af
                                        #30

                                        @GossiTheDog
                                        The real question is why does a bot have commit privileges on a "major web framework"?

                                        i mean the answer is probably because google owns the repo probably... but why?

                                        1 Reply Last reply
                                        0
                                        • s_bergmann@chaos.socialS s_bergmann@chaos.social

                                          @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                                          draeath@infosec.exchangeD This user is from outside of this forum
                                          draeath@infosec.exchangeD This user is from outside of this forum
                                          draeath@infosec.exchange
                                          wrote sidst redigeret af
                                          #31

                                          @s_bergmann @GossiTheDog I like how AIDER uses co-authors, so you can't escape from blame. All these tools should be doing similar!

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper