Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
84 Indlæg 64 Posters 18 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

    @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

    tarheel@mstdn.ioT This user is from outside of this forum
    tarheel@mstdn.ioT This user is from outside of this forum
    tarheel@mstdn.io
    wrote sidst redigeret af
    #36

    @etchedpixels @GossiTheDog

    Gahhh. Takes a little effort to imagine LESS rewarding work.

    1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      Today in InfoSec Job Security News:

      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

      keith_lawson@mastodon.socialK This user is from outside of this forum
      keith_lawson@mastodon.socialK This user is from outside of this forum
      keith_lawson@mastodon.social
      wrote sidst redigeret af
      #37

      @GossiTheDog This was literally the first major security mistake I made in my early days as a Perl developer and I don't imagine it's that uncommon. Claude has probably been trained with a truckload of code with these vulnerabilities.

      That's okay because we run everything in single-purpose Docker containers now though, right? /s

      n1xnx@tilde.zoneN 1 Reply Last reply
      0
      • da_667@infosec.exchangeD da_667@infosec.exchange

        @GossiTheDog

        bradley@techhub.socialB This user is from outside of this forum
        bradley@techhub.socialB This user is from outside of this forum
        bradley@techhub.social
        wrote sidst redigeret af
        #38

        @da_667 @GossiTheDog

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          Today in InfoSec Job Security News:

          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

          spinnyspinlock@infosec.exchangeS This user is from outside of this forum
          spinnyspinlock@infosec.exchangeS This user is from outside of this forum
          spinnyspinlock@infosec.exchange
          wrote sidst redigeret af
          #39

          @GossiTheDog I see it, could probably start a threat intelligence business off the claude feed 🙂‍↕️

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            Today in InfoSec Job Security News:

            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

            carpetbomberz@mastodon.onlineC This user is from outside of this forum
            carpetbomberz@mastodon.onlineC This user is from outside of this forum
            carpetbomberz@mastodon.online
            wrote sidst redigeret af
            #40

            @GossiTheDog

            That Claude is a "clod", and boy does Claude get around I tell ya'. 🏃

            Claude is everywhere you want an exploit to be. 🚨

            1 Reply Last reply
            0
            • draeath@infosec.exchangeD draeath@infosec.exchange

              @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

              It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

              badsamurai@infosec.exchangeB This user is from outside of this forum
              badsamurai@infosec.exchangeB This user is from outside of this forum
              badsamurai@infosec.exchange
              wrote sidst redigeret af
              #41

              @draeath

              These MFers yeet DIRFT (Do it right the first time) and TQM principles to play hooky on the plinko and demand you call them a genius.

              @da_667 @GossiTheDog

              1 Reply Last reply
              0
              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                Today in InfoSec Job Security News:

                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                abucci@buc.ciA This user is from outside of this forum
                abucci@buc.ciA This user is from outside of this forum
                abucci@buc.ci
                wrote sidst redigeret af
                #42
                @GossiTheDog@cyberplace.social An instance of eating the seed corn, I'd say ( https://buc.ci/abucci/p/1705679109.757852 ).
                1 Reply Last reply
                0
                • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

                  @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                  Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                  That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                  @GossiTheDog

                  iagox86@infosec.exchangeI This user is from outside of this forum
                  iagox86@infosec.exchangeI This user is from outside of this forum
                  iagox86@infosec.exchange
                  wrote sidst redigeret af
                  #43

                  @badsamurai @da_667 @GossiTheDog Hey, as somebody writing a CTF, it's handy to get randomly introduced vulnerabilities!

                  1 Reply Last reply
                  0
                  • hughsie@mastodon.socialH hughsie@mastodon.social

                    @GossiTheDog I guess the AI security scanners will clean this up with their automated scan and CVE requests.</joke>

                    joshbressers@infosec.exchangeJ This user is from outside of this forum
                    joshbressers@infosec.exchangeJ This user is from outside of this forum
                    joshbressers@infosec.exchange
                    wrote sidst redigeret af
                    #44

                    @hughsie @GossiTheDog It’s the circle of life. Extra points if the fix has new vulnerabilities in it!

                    1 Reply Last reply
                    0
                    • draeath@infosec.exchangeD draeath@infosec.exchange

                      @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                      confuseacat@mastodon.socialC This user is from outside of this forum
                      confuseacat@mastodon.socialC This user is from outside of this forum
                      confuseacat@mastodon.social
                      wrote sidst redigeret af
                      #45

                      @draeath @nihkeys @DJGummikuh @GossiTheDog not if you want to understand the system.
                      https://en.wikipedia.org/wiki/The_purpose_of_a_system_is_what_it_does

                      1 Reply Last reply
                      0
                      • spinnyspinlock@infosec.exchangeS spinnyspinlock@infosec.exchange

                        @GossiTheDog I became used to checking projects I am checking out for claude (etc) in the source files and commits really fast

                        trivernis@social.funkyfish.coolT This user is from outside of this forum
                        trivernis@social.funkyfish.coolT This user is from outside of this forum
                        trivernis@social.funkyfish.cool
                        wrote sidst redigeret af
                        #46

                        @spinnyspinlock@infosec.exchange @GossiTheDog@cyberplace.social If github lists claude (or other LLMs) as one of the top contributors I consider that a red flag

                        1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          Today in InfoSec Job Security News:

                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                          wgwz@hachyderm.ioW This user is from outside of this forum
                          wgwz@hachyderm.ioW This user is from outside of this forum
                          wgwz@hachyderm.io
                          wrote sidst redigeret af
                          #47

                          @GossiTheDog which framework?

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            Today in InfoSec Job Security News:

                            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                            pinkforest@hachyderm.ioP This user is from outside of this forum
                            pinkforest@hachyderm.ioP This user is from outside of this forum
                            pinkforest@hachyderm.io
                            wrote sidst redigeret af
                            #48

                            @GossiTheDog I feel sorry for all the persons named Claude https://github.com/search?q=claude&type=commits

                            1 Reply Last reply
                            0
                            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                              Today in InfoSec Job Security News:

                              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                              vikonava@bijaiv.comV This user is from outside of this forum
                              vikonava@bijaiv.comV This user is from outside of this forum
                              vikonava@bijaiv.com
                              wrote sidst redigeret af
                              #49

                              @GossiTheDog this happens when people don’t care nor use AI responsibly… we have to do proper reviews EVERY SINGLE TIME

                              1 Reply Last reply
                              0
                              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                Today in InfoSec Job Security News:

                                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                chengdulittlea@mastodon.artC This user is from outside of this forum
                                chengdulittlea@mastodon.artC This user is from outside of this forum
                                chengdulittlea@mastodon.art
                                wrote sidst redigeret af
                                #50

                                @GossiTheDog but... Do these repositories all not have any review processes for their PRs?

                                1 Reply Last reply
                                0
                                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                  Today in InfoSec Job Security News:

                                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                  fritzadalis@infosec.exchangeF This user is from outside of this forum
                                  fritzadalis@infosec.exchangeF This user is from outside of this forum
                                  fritzadalis@infosec.exchange
                                  wrote sidst redigeret af
                                  #51

                                  @GossiTheDog
                                  So just make a bot that goes around behind claude and files a vuln bug and lists the revert as the fix.

                                  fritzadalis@infosec.exchangeF 1 Reply Last reply
                                  0
                                  • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                                    @GossiTheDog
                                    So just make a bot that goes around behind claude and files a vuln bug and lists the revert as the fix.

                                    fritzadalis@infosec.exchangeF This user is from outside of this forum
                                    fritzadalis@infosec.exchangeF This user is from outside of this forum
                                    fritzadalis@infosec.exchange
                                    wrote sidst redigeret af
                                    #52

                                    @GossiTheDog
                                    Nvm these are commits, not prs.

                                    1 Reply Last reply
                                    0
                                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                      Today in InfoSec Job Security News:

                                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                      seism0saurus@infosec.exchangeS This user is from outside of this forum
                                      seism0saurus@infosec.exchangeS This user is from outside of this forum
                                      seism0saurus@infosec.exchange
                                      wrote sidst redigeret af
                                      #53

                                      @GossiTheDog

                                      Is there a cwe (common weakness enumeration) for AI slop usage already?

                                      1 Reply Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        Today in InfoSec Job Security News:

                                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                        sassinake@mastodon.socialS This user is from outside of this forum
                                        sassinake@mastodon.socialS This user is from outside of this forum
                                        sassinake@mastodon.social
                                        wrote sidst redigeret af
                                        #54

                                        @GossiTheDog

                                        fuck.

                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          Today in InfoSec Job Security News:

                                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                          apples_and_pears@mastodon.worldA This user is from outside of this forum
                                          apples_and_pears@mastodon.worldA This user is from outside of this forum
                                          apples_and_pears@mastodon.world
                                          wrote sidst redigeret af
                                          #55

                                          @GossiTheDog I'm anti-AI. I used program generators long ago - they didn't work. They aren't maintainable. Major updates required complete rewrites.

                                          Now there's AI. It's a manager's wet dream...until it isn't.

                                          ...but look how productive AI is. It can whip out code as fast as a gossip can spread noise. Sure, there will be glitches, but they'll be fixed when found.

                                          What about the $$$$$ liability of glitches that are not found?

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper