Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
84 Indlæg 64 Posters 18 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    Today in InfoSec Job Security News:

    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

    etchedpixels@mastodon.socialE This user is from outside of this forum
    etchedpixels@mastodon.socialE This user is from outside of this forum
    etchedpixels@mastodon.social
    wrote sidst redigeret af
    #21

    @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

    ptesarik@infosec.exchangeP tarheel@mstdn.ioT 2 Replies Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      Today in InfoSec Job Security News:

      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

      hughsie@mastodon.socialH This user is from outside of this forum
      hughsie@mastodon.socialH This user is from outside of this forum
      hughsie@mastodon.social
      wrote sidst redigeret af
      #22

      @GossiTheDog I guess the AI security scanners will clean this up with their automated scan and CVE requests.</joke>

      joshbressers@infosec.exchangeJ 1 Reply Last reply
      0
      • da_667@infosec.exchangeD da_667@infosec.exchange

        @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

        badsamurai@infosec.exchangeB This user is from outside of this forum
        badsamurai@infosec.exchangeB This user is from outside of this forum
        badsamurai@infosec.exchange
        wrote sidst redigeret af
        #23

        @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

        Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

        That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

        @GossiTheDog

        draeath@infosec.exchangeD iagox86@infosec.exchangeI 2 Replies Last reply
        0
        • cr0w@infosec.exchangeC cr0w@infosec.exchange

          @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

          fennix@infosec.spaceF This user is from outside of this forum
          fennix@infosec.spaceF This user is from outside of this forum
          fennix@infosec.space
          wrote sidst redigeret af
          #24

          @cR0w @GossiTheDog

          1 Reply Last reply
          0
          • drat@infosec.exchangeD drat@infosec.exchange

            @da_667 @GossiTheDog I wish that juice actually existed...

            draeath@infosec.exchangeD This user is from outside of this forum
            draeath@infosec.exchangeD This user is from outside of this forum
            draeath@infosec.exchange
            wrote sidst redigeret af
            #25

            @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

            1 Reply Last reply
            0
            • thomasfuchs@hachyderm.ioT thomasfuchs@hachyderm.io

              @GossiTheDog you're just jealous because it will cure cancer and fix climate change

              fennix@infosec.spaceF This user is from outside of this forum
              fennix@infosec.spaceF This user is from outside of this forum
              fennix@infosec.space
              wrote sidst redigeret af
              #26

              @thomasfuchs @GossiTheDog

              I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

              1 Reply Last reply
              0
              • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

                @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                @GossiTheDog

                draeath@infosec.exchangeD This user is from outside of this forum
                draeath@infosec.exchangeD This user is from outside of this forum
                draeath@infosec.exchange
                wrote sidst redigeret af
                #27

                @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                badsamurai@infosec.exchangeB 1 Reply Last reply
                0
                • cr0w@infosec.exchangeC cr0w@infosec.exchange

                  @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                  alan@mindly.socialA This user is from outside of this forum
                  alan@mindly.socialA This user is from outside of this forum
                  alan@mindly.social
                  wrote sidst redigeret af
                  #28

                  @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

                  1 Reply Last reply
                  0
                  • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                    @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                    draeath@infosec.exchangeD This user is from outside of this forum
                    draeath@infosec.exchangeD This user is from outside of this forum
                    draeath@infosec.exchange
                    wrote sidst redigeret af
                    #29

                    @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                    confuseacat@mastodon.socialC azuaron@cyberpunk.lolA 2 Replies Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      Today in InfoSec Job Security News:

                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                      dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                      dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                      dlakelan@mastodon.sdf.org
                      wrote sidst redigeret af
                      #30

                      @GossiTheDog
                      The real question is why does a bot have commit privileges on a "major web framework"?

                      i mean the answer is probably because google owns the repo probably... but why?

                      1 Reply Last reply
                      0
                      • s_bergmann@chaos.socialS s_bergmann@chaos.social

                        @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                        draeath@infosec.exchangeD This user is from outside of this forum
                        draeath@infosec.exchangeD This user is from outside of this forum
                        draeath@infosec.exchange
                        wrote sidst redigeret af
                        #31

                        @s_bergmann @GossiTheDog I like how AIDER uses co-authors, so you can't escape from blame. All these tools should be doing similar!

                        1 Reply Last reply
                        0
                        • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                          @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                          violetmadder@kolektiva.socialV This user is from outside of this forum
                          violetmadder@kolektiva.socialV This user is from outside of this forum
                          violetmadder@kolektiva.social
                          wrote sidst redigeret af
                          #32

                          @nihkeys @DJGummikuh @GossiTheDog

                          The damage is the point.

                          It's a weapon.

                          Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            Today in InfoSec Job Security News:

                            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                            ftp_alun@infosec.exchangeF This user is from outside of this forum
                            ftp_alun@infosec.exchangeF This user is from outside of this forum
                            ftp_alun@infosec.exchange
                            wrote sidst redigeret af
                            #33

                            @GossiTheDog fault injection into production code at scale. Nice.

                            1 Reply Last reply
                            0
                            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                              Today in InfoSec Job Security News:

                              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                              spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                              spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                              spinnyspinlock@infosec.exchange
                              wrote sidst redigeret af
                              #34

                              @GossiTheDog I became used to checking projects I am checking out for claude (etc) in the source files and commits really fast

                              trivernis@social.funkyfish.coolT 1 Reply Last reply
                              0
                              • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                                @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                                ptesarik@infosec.exchangeP This user is from outside of this forum
                                ptesarik@infosec.exchangeP This user is from outside of this forum
                                ptesarik@infosec.exchange
                                wrote sidst redigeret af
                                #35

                                @etchedpixels Bug bounties? You know nothing about business…
                                You set up a giant scam tool, let venture capital pay for its development, then use it to hack the world and sell all of it:

                                • license use of the tool,
                                • hacking applications,
                                • vulnerability scanning,
                                • protection racket from affected companies.

                                That' how real capitalists do business.
                                The tool is called Claude.
                                @GossiTheDog

                                1 Reply Last reply
                                0
                                • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                                  @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                                  tarheel@mstdn.ioT This user is from outside of this forum
                                  tarheel@mstdn.ioT This user is from outside of this forum
                                  tarheel@mstdn.io
                                  wrote sidst redigeret af
                                  #36

                                  @etchedpixels @GossiTheDog

                                  Gahhh. Takes a little effort to imagine LESS rewarding work.

                                  1 Reply Last reply
                                  0
                                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                    Today in InfoSec Job Security News:

                                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                    keith_lawson@mastodon.socialK This user is from outside of this forum
                                    keith_lawson@mastodon.socialK This user is from outside of this forum
                                    keith_lawson@mastodon.social
                                    wrote sidst redigeret af
                                    #37

                                    @GossiTheDog This was literally the first major security mistake I made in my early days as a Perl developer and I don't imagine it's that uncommon. Claude has probably been trained with a truckload of code with these vulnerabilities.

                                    That's okay because we run everything in single-purpose Docker containers now though, right? /s

                                    n1xnx@tilde.zoneN 1 Reply Last reply
                                    0
                                    • da_667@infosec.exchangeD da_667@infosec.exchange

                                      @GossiTheDog

                                      bradley@techhub.socialB This user is from outside of this forum
                                      bradley@techhub.socialB This user is from outside of this forum
                                      bradley@techhub.social
                                      wrote sidst redigeret af
                                      #38

                                      @da_667 @GossiTheDog

                                      1 Reply Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        Today in InfoSec Job Security News:

                                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                        spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                        spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                        spinnyspinlock@infosec.exchange
                                        wrote sidst redigeret af
                                        #39

                                        @GossiTheDog I see it, could probably start a threat intelligence business off the claude feed 🙂‍↕️

                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          Today in InfoSec Job Security News:

                                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                          carpetbomberz@mastodon.onlineC This user is from outside of this forum
                                          carpetbomberz@mastodon.onlineC This user is from outside of this forum
                                          carpetbomberz@mastodon.online
                                          wrote sidst redigeret af
                                          #40

                                          @GossiTheDog

                                          That Claude is a "clod", and boy does Claude get around I tell ya'. 🏃

                                          Claude is everywhere you want an exploit to be. 🚨

                                          1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper