Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
84 Indlæg 64 Posters 18 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • da_667@infosec.exchangeD da_667@infosec.exchange

    @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

    badsamurai@infosec.exchangeB This user is from outside of this forum
    badsamurai@infosec.exchangeB This user is from outside of this forum
    badsamurai@infosec.exchange
    wrote sidst redigeret af
    #23

    @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

    Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

    That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

    @GossiTheDog

    draeath@infosec.exchangeD iagox86@infosec.exchangeI 2 Replies Last reply
    0
    • cr0w@infosec.exchangeC cr0w@infosec.exchange

      @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

      fennix@infosec.spaceF This user is from outside of this forum
      fennix@infosec.spaceF This user is from outside of this forum
      fennix@infosec.space
      wrote sidst redigeret af
      #24

      @cR0w @GossiTheDog

      1 Reply Last reply
      0
      • drat@infosec.exchangeD drat@infosec.exchange

        @da_667 @GossiTheDog I wish that juice actually existed...

        draeath@infosec.exchangeD This user is from outside of this forum
        draeath@infosec.exchangeD This user is from outside of this forum
        draeath@infosec.exchange
        wrote sidst redigeret af
        #25

        @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

        1 Reply Last reply
        0
        • thomasfuchs@hachyderm.ioT thomasfuchs@hachyderm.io

          @GossiTheDog you're just jealous because it will cure cancer and fix climate change

          fennix@infosec.spaceF This user is from outside of this forum
          fennix@infosec.spaceF This user is from outside of this forum
          fennix@infosec.space
          wrote sidst redigeret af
          #26

          @thomasfuchs @GossiTheDog

          I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

          1 Reply Last reply
          0
          • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

            @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

            Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

            That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

            @GossiTheDog

            draeath@infosec.exchangeD This user is from outside of this forum
            draeath@infosec.exchangeD This user is from outside of this forum
            draeath@infosec.exchange
            wrote sidst redigeret af
            #27

            @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

            It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

            badsamurai@infosec.exchangeB 1 Reply Last reply
            0
            • cr0w@infosec.exchangeC cr0w@infosec.exchange

              @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

              alan@mindly.socialA This user is from outside of this forum
              alan@mindly.socialA This user is from outside of this forum
              alan@mindly.social
              wrote sidst redigeret af
              #28

              @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

              1 Reply Last reply
              0
              • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                draeath@infosec.exchangeD This user is from outside of this forum
                draeath@infosec.exchangeD This user is from outside of this forum
                draeath@infosec.exchange
                wrote sidst redigeret af
                #29

                @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                confuseacat@mastodon.socialC azuaron@cyberpunk.lolA 2 Replies Last reply
                0
                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                  Today in InfoSec Job Security News:

                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                  dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                  dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                  dlakelan@mastodon.sdf.org
                  wrote sidst redigeret af
                  #30

                  @GossiTheDog
                  The real question is why does a bot have commit privileges on a "major web framework"?

                  i mean the answer is probably because google owns the repo probably... but why?

                  1 Reply Last reply
                  0
                  • s_bergmann@chaos.socialS s_bergmann@chaos.social

                    @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                    draeath@infosec.exchangeD This user is from outside of this forum
                    draeath@infosec.exchangeD This user is from outside of this forum
                    draeath@infosec.exchange
                    wrote sidst redigeret af
                    #31

                    @s_bergmann @GossiTheDog I like how AIDER uses co-authors, so you can't escape from blame. All these tools should be doing similar!

                    1 Reply Last reply
                    0
                    • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                      @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                      violetmadder@kolektiva.socialV This user is from outside of this forum
                      violetmadder@kolektiva.socialV This user is from outside of this forum
                      violetmadder@kolektiva.social
                      wrote sidst redigeret af
                      #32

                      @nihkeys @DJGummikuh @GossiTheDog

                      The damage is the point.

                      It's a weapon.

                      Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                      1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        Today in InfoSec Job Security News:

                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                        ftp_alun@infosec.exchangeF This user is from outside of this forum
                        ftp_alun@infosec.exchangeF This user is from outside of this forum
                        ftp_alun@infosec.exchange
                        wrote sidst redigeret af
                        #33

                        @GossiTheDog fault injection into production code at scale. Nice.

                        1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          Today in InfoSec Job Security News:

                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                          spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                          spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                          spinnyspinlock@infosec.exchange
                          wrote sidst redigeret af
                          #34

                          @GossiTheDog I became used to checking projects I am checking out for claude (etc) in the source files and commits really fast

                          trivernis@social.funkyfish.coolT 1 Reply Last reply
                          0
                          • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                            @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                            ptesarik@infosec.exchangeP This user is from outside of this forum
                            ptesarik@infosec.exchangeP This user is from outside of this forum
                            ptesarik@infosec.exchange
                            wrote sidst redigeret af
                            #35

                            @etchedpixels Bug bounties? You know nothing about business…
                            You set up a giant scam tool, let venture capital pay for its development, then use it to hack the world and sell all of it:

                            • license use of the tool,
                            • hacking applications,
                            • vulnerability scanning,
                            • protection racket from affected companies.

                            That' how real capitalists do business.
                            The tool is called Claude.
                            @GossiTheDog

                            1 Reply Last reply
                            0
                            • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                              @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                              tarheel@mstdn.ioT This user is from outside of this forum
                              tarheel@mstdn.ioT This user is from outside of this forum
                              tarheel@mstdn.io
                              wrote sidst redigeret af
                              #36

                              @etchedpixels @GossiTheDog

                              Gahhh. Takes a little effort to imagine LESS rewarding work.

                              1 Reply Last reply
                              0
                              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                Today in InfoSec Job Security News:

                                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                keith_lawson@mastodon.socialK This user is from outside of this forum
                                keith_lawson@mastodon.socialK This user is from outside of this forum
                                keith_lawson@mastodon.social
                                wrote sidst redigeret af
                                #37

                                @GossiTheDog This was literally the first major security mistake I made in my early days as a Perl developer and I don't imagine it's that uncommon. Claude has probably been trained with a truckload of code with these vulnerabilities.

                                That's okay because we run everything in single-purpose Docker containers now though, right? /s

                                n1xnx@tilde.zoneN 1 Reply Last reply
                                0
                                • da_667@infosec.exchangeD da_667@infosec.exchange

                                  @GossiTheDog

                                  bradley@techhub.socialB This user is from outside of this forum
                                  bradley@techhub.socialB This user is from outside of this forum
                                  bradley@techhub.social
                                  wrote sidst redigeret af
                                  #38

                                  @da_667 @GossiTheDog

                                  1 Reply Last reply
                                  0
                                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                    Today in InfoSec Job Security News:

                                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                    spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                    spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                    spinnyspinlock@infosec.exchange
                                    wrote sidst redigeret af
                                    #39

                                    @GossiTheDog I see it, could probably start a threat intelligence business off the claude feed 🙂‍↕️

                                    1 Reply Last reply
                                    0
                                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                      Today in InfoSec Job Security News:

                                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                      carpetbomberz@mastodon.onlineC This user is from outside of this forum
                                      carpetbomberz@mastodon.onlineC This user is from outside of this forum
                                      carpetbomberz@mastodon.online
                                      wrote sidst redigeret af
                                      #40

                                      @GossiTheDog

                                      That Claude is a "clod", and boy does Claude get around I tell ya'. 🏃

                                      Claude is everywhere you want an exploit to be. 🚨

                                      1 Reply Last reply
                                      0
                                      • draeath@infosec.exchangeD draeath@infosec.exchange

                                        @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                                        It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                                        badsamurai@infosec.exchangeB This user is from outside of this forum
                                        badsamurai@infosec.exchangeB This user is from outside of this forum
                                        badsamurai@infosec.exchange
                                        wrote sidst redigeret af
                                        #41

                                        @draeath

                                        These MFers yeet DIRFT (Do it right the first time) and TQM principles to play hooky on the plinko and demand you call them a genius.

                                        @da_667 @GossiTheDog

                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          Today in InfoSec Job Security News:

                                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                          abucci@buc.ciA This user is from outside of this forum
                                          abucci@buc.ciA This user is from outside of this forum
                                          abucci@buc.ci
                                          wrote sidst redigeret af
                                          #42
                                          @GossiTheDog@cyberplace.social An instance of eating the seed corn, I'd say ( https://buc.ci/abucci/p/1705679109.757852 ).
                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper