Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
84 Indlæg 64 Posters 18 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    Today in InfoSec Job Security News:

    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

    simonzerafa@infosec.exchangeS This user is from outside of this forum
    simonzerafa@infosec.exchangeS This user is from outside of this forum
    simonzerafa@infosec.exchange
    wrote sidst redigeret af
    #9

    @GossiTheDog

    So a supply chain attack or actually genuine commits (or a mix as camouflage?) 🤯

    1 Reply Last reply
    0
    • djgummikuh@mastodon.socialD djgummikuh@mastodon.social

      @GossiTheDog so would you consider this mass accidents or a targeted supply-chain attack?

      nihkeys@mastodontti.fiN This user is from outside of this forum
      nihkeys@mastodontti.fiN This user is from outside of this forum
      nihkeys@mastodontti.fi
      wrote sidst redigeret af
      #10

      @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

      draeath@infosec.exchangeD violetmadder@kolektiva.socialV 2 Replies Last reply
      0
      • da_667@infosec.exchangeD da_667@infosec.exchange

        @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

        da_667@infosec.exchangeD This user is from outside of this forum
        da_667@infosec.exchangeD This user is from outside of this forum
        da_667@infosec.exchange
        wrote sidst redigeret af
        #11

        @GossiTheDog ladies and gentlemen, it's this stupid shit (tm) that we are paying up the ass for new SSDs and RAM for.

        drat@infosec.exchangeD zarchasmpgmr@infosec.exchangeZ 2 Replies Last reply
        0
        • hohokam@mastodon.sdf.orgH hohokam@mastodon.sdf.org

          @GossiTheDog sure, but it did that so much faster than a human could!

          androcat@toot.catA This user is from outside of this forum
          androcat@toot.catA This user is from outside of this forum
          androcat@toot.cat
          wrote sidst redigeret af
          #12

          @hohokam @GossiTheDog

          The LLM can fuck up your project much faster than human developers ever could.

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            Today in InfoSec Job Security News:

            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

            harrysintonen@infosec.exchangeH This user is from outside of this forum
            harrysintonen@infosec.exchangeH This user is from outside of this forum
            harrysintonen@infosec.exchange
            wrote sidst redigeret af
            #13

            It's almost as if the language models are actually not intelligent at all.

            Who would have thought!?

            1 Reply Last reply
            0
            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

              Today in InfoSec Job Security News:

              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

              cr0w@infosec.exchangeC This user is from outside of this forum
              cr0w@infosec.exchangeC This user is from outside of this forum
              cr0w@infosec.exchange
              wrote sidst redigeret af
              #14

              @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

              fennix@infosec.spaceF alan@mindly.socialA 2 Replies Last reply
              0
              • da_667@infosec.exchangeD da_667@infosec.exchange

                @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

                derbruesseler@chaos.socialD This user is from outside of this forum
                derbruesseler@chaos.socialD This user is from outside of this forum
                derbruesseler@chaos.social
                wrote sidst redigeret af
                #15

                @da_667 @GossiTheDog maybe it introduced them in the first place. Now its finding its own code.

                1 Reply Last reply
                0
                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                  Today in InfoSec Job Security News:

                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                  0xtero@ohai.social0 This user is from outside of this forum
                  0xtero@ohai.social0 This user is from outside of this forum
                  0xtero@ohai.social
                  wrote sidst redigeret af
                  #16

                  @GossiTheDog I like the part where people are using Claude to write CLAUDE.md to explain Claude about directory traversal.

                  Nothing in this supply chain could ever go wrong.

                  1 Reply Last reply
                  0
                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                    Today in InfoSec Job Security News:

                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                    s_bergmann@chaos.socialS This user is from outside of this forum
                    s_bergmann@chaos.socialS This user is from outside of this forum
                    s_bergmann@chaos.social
                    wrote sidst redigeret af
                    #17

                    @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                    draeath@infosec.exchangeD 1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      Today in InfoSec Job Security News:

                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                      thomasfuchs@hachyderm.ioT This user is from outside of this forum
                      thomasfuchs@hachyderm.ioT This user is from outside of this forum
                      thomasfuchs@hachyderm.io
                      wrote sidst redigeret af
                      #18

                      @GossiTheDog you're just jealous because it will cure cancer and fix climate change

                      fennix@infosec.spaceF 1 Reply Last reply
                      0
                      • da_667@infosec.exchangeD da_667@infosec.exchange

                        @GossiTheDog ladies and gentlemen, it's this stupid shit (tm) that we are paying up the ass for new SSDs and RAM for.

                        drat@infosec.exchangeD This user is from outside of this forum
                        drat@infosec.exchangeD This user is from outside of this forum
                        drat@infosec.exchange
                        wrote sidst redigeret af
                        #19

                        @da_667 @GossiTheDog There's not enough press on the downstream effects this stupid shit (tm) causes for any non-giant corp including those kids trying to build home labs to learn (like mine).

                        1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          Today in InfoSec Job Security News:

                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                          ectopod@hachyderm.ioE This user is from outside of this forum
                          ectopod@hachyderm.ioE This user is from outside of this forum
                          ectopod@hachyderm.io
                          wrote sidst redigeret af
                          #20

                          @GossiTheDog was it Next.js?

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            Today in InfoSec Job Security News:

                            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                            etchedpixels@mastodon.socialE This user is from outside of this forum
                            etchedpixels@mastodon.socialE This user is from outside of this forum
                            etchedpixels@mastodon.social
                            wrote sidst redigeret af
                            #21

                            @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                            ptesarik@infosec.exchangeP tarheel@mstdn.ioT 2 Replies Last reply
                            0
                            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                              Today in InfoSec Job Security News:

                              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                              hughsie@mastodon.socialH This user is from outside of this forum
                              hughsie@mastodon.socialH This user is from outside of this forum
                              hughsie@mastodon.social
                              wrote sidst redigeret af
                              #22

                              @GossiTheDog I guess the AI security scanners will clean this up with their automated scan and CVE requests.</joke>

                              joshbressers@infosec.exchangeJ 1 Reply Last reply
                              0
                              • da_667@infosec.exchangeD da_667@infosec.exchange

                                @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

                                badsamurai@infosec.exchangeB This user is from outside of this forum
                                badsamurai@infosec.exchangeB This user is from outside of this forum
                                badsamurai@infosec.exchange
                                wrote sidst redigeret af
                                #23

                                @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                                Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                                That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                                @GossiTheDog

                                draeath@infosec.exchangeD iagox86@infosec.exchangeI 2 Replies Last reply
                                0
                                • cr0w@infosec.exchangeC cr0w@infosec.exchange

                                  @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                                  fennix@infosec.spaceF This user is from outside of this forum
                                  fennix@infosec.spaceF This user is from outside of this forum
                                  fennix@infosec.space
                                  wrote sidst redigeret af
                                  #24

                                  @cR0w @GossiTheDog

                                  1 Reply Last reply
                                  0
                                  • drat@infosec.exchangeD drat@infosec.exchange

                                    @da_667 @GossiTheDog I wish that juice actually existed...

                                    draeath@infosec.exchangeD This user is from outside of this forum
                                    draeath@infosec.exchangeD This user is from outside of this forum
                                    draeath@infosec.exchange
                                    wrote sidst redigeret af
                                    #25

                                    @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

                                    1 Reply Last reply
                                    0
                                    • thomasfuchs@hachyderm.ioT thomasfuchs@hachyderm.io

                                      @GossiTheDog you're just jealous because it will cure cancer and fix climate change

                                      fennix@infosec.spaceF This user is from outside of this forum
                                      fennix@infosec.spaceF This user is from outside of this forum
                                      fennix@infosec.space
                                      wrote sidst redigeret af
                                      #26

                                      @thomasfuchs @GossiTheDog

                                      I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

                                      1 Reply Last reply
                                      0
                                      • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

                                        @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                                        Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                                        That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                                        @GossiTheDog

                                        draeath@infosec.exchangeD This user is from outside of this forum
                                        draeath@infosec.exchangeD This user is from outside of this forum
                                        draeath@infosec.exchange
                                        wrote sidst redigeret af
                                        #27

                                        @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                                        It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                                        badsamurai@infosec.exchangeB 1 Reply Last reply
                                        0
                                        • cr0w@infosec.exchangeC cr0w@infosec.exchange

                                          @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                                          alan@mindly.socialA This user is from outside of this forum
                                          alan@mindly.socialA This user is from outside of this forum
                                          alan@mindly.social
                                          wrote sidst redigeret af
                                          #28

                                          @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper