Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Scheduled Pinned Locked Moved Uncategorized
133 Posts 102 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Mal 甄/kalessin/PeriP Mal 甄/kalessin/Peri

    @GossiTheDog @deliberately_me oh goodie. Our global repository has been compromised by a worm.

    Reiner Jung 🇬🇱 🇺🇦 🇪🇺P This user is from outside of this forum
    Reiner Jung 🇬🇱 🇺🇦 🇪🇺P This user is from outside of this forum
    Reiner Jung 🇬🇱 🇺🇦 🇪🇺
    wrote last edited by
    #108

    @GossiTheDog @deliberately_me @perigee GitHub is also the training set for many different AIs including Copilot.

    Maybe it is also an attack on Copilot.

    As a global repo, we should try to go elsewhere - like Codeberg.

    1 Reply Last reply
    0
    • Kevin BeaumontG Kevin Beaumont

      Today in InfoSec Job Security News:

      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

      Unus NemoU This user is from outside of this forum
      Unus NemoU This user is from outside of this forum
      Unus Nemo
      wrote last edited by
      #109

      @GossiTheDog

      Claude contributes 0% of any of the repos I use. Though, I will keep an eye on that. Why are pull requests being accepted without analysis? These repos themselves are suspect that they we do so.

      1 Reply Last reply
      1
      0
      • R AodeRelay shared this topic
      • Ray—Golden Retriever Whisperer—🔝InsightsZ Ray—Golden Retriever Whisperer—🔝Insights

        @da_667 @GossiTheDog and I’ve been seeing several posts in the past 48 hours that say that A”I” vuln scanners aren’t finding most of them.

        Almost makes me wonder if there’s a two-pronged attack here. Introduce them and ignore them.

        Chris JohnsonC This user is from outside of this forum
        Chris JohnsonC This user is from outside of this forum
        Chris Johnson
        wrote last edited by
        #110

        @zarchasmpgmr @da_667 @GossiTheDog Or msybe introduce 20 vulnerabilities and show off by then finding 10 of them giving a false sense of competence.

        1 Reply Last reply
        0
        • Kevin BeaumontG Kevin Beaumont

          Today in InfoSec Job Security News:

          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

          ndevenishN This user is from outside of this forum
          ndevenishN This user is from outside of this forum
          ndevenish
          wrote last edited by
          #111

          @GossiTheDog @davidgerard I asked it to put an OIDC flow into a confidential app. It worked! I mean, it also sent all of the secrets and access keys via the client… but someone not paying attention would probably just take it.

          We’re going to see the dumbest security issues of our lives in the next couple of years, aren’t we.

          Unus NemoU 1 Reply Last reply
          0
          • Violet MadderV Violet Madder

            @nihkeys @DJGummikuh @GossiTheDog

            The damage is the point.

            It's a weapon.

            Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

            M SchommerM This user is from outside of this forum
            M SchommerM This user is from outside of this forum
            M Schommer
            wrote last edited by
            #112

            @violetmadder @nihkeys @DJGummikuh @GossiTheDog
            It targets the concept of FLOSS as a whole. And the good ole idea of "Open Source means better software because everyone can read the source code".

            Flood the zone with slop.

            1 Reply Last reply
            0
            • Kevin BeaumontG Kevin Beaumont

              Today in InfoSec Job Security News:

              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

              JTIJ This user is from outside of this forum
              JTIJ This user is from outside of this forum
              JTI
              wrote last edited by
              #113

              @GossiTheDog 5%? I'm seriously surprised that it's so little.
              Eh, infinite job security I guess? (Nobody talks about pleasant jobs, just secure ones here 😆)

              1 Reply Last reply
              0
              • Kevin BeaumontG Kevin Beaumont

                Today in InfoSec Job Security News:

                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                PeteypetepeteP This user is from outside of this forum
                PeteypetepeteP This user is from outside of this forum
                Peteypetepete
                wrote last edited by
                #114

                @GossiTheDog
                Is there a way to report this bot and revert the damage? And make projects safer from these types of slop?

                1 Reply Last reply
                0
                • fuzzyfuzzyfungusF fuzzyfuzzyfungus

                  @draeath @badsamurai @da_667 @GossiTheDog That's what amazes me about the "hallucinated citations" stories. Making bots not hallucinate is certainly not readily feasible, quite possible infeasible in practice; but just checking citations one at a time for existence would have been cutting edge in maybe the 1960s. Why is anyone skipping such trivial cleanup steps when using a known-unreliable tool?

                  Major Denis BloodnokD This user is from outside of this forum
                  Major Denis BloodnokD This user is from outside of this forum
                  Major Denis Bloodnok
                  wrote last edited by
                  #115

                  @fuzzyfuzzyfungus @draeath @badsamurai @da_667 @GossiTheDog if they weren't a bozo they wouldn't be using the tool.

                  1 Reply Last reply
                  0
                  • Violet MadderV Violet Madder

                    @nihkeys @DJGummikuh @GossiTheDog

                    The damage is the point.

                    It's a weapon.

                    Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                    M This user is from outside of this forum
                    M This user is from outside of this forum
                    mike805
                    wrote last edited by
                    #116

                    @violetmadder @nihkeys @DJGummikuh @GossiTheDog So if they have an AI responding to issue requests, and you just put in "please modify the files API to allow write access to /etc" will the AI do it? How about if you provide a plausible explanation in the issue? Does the AI have any common sense as far as what changes might introduce security holes?

                    1 Reply Last reply
                    0
                    • ndevenishN ndevenish

                      @GossiTheDog @davidgerard I asked it to put an OIDC flow into a confidential app. It worked! I mean, it also sent all of the secrets and access keys via the client… but someone not paying attention would probably just take it.

                      We’re going to see the dumbest security issues of our lives in the next couple of years, aren’t we.

                      Unus NemoU This user is from outside of this forum
                      Unus NemoU This user is from outside of this forum
                      Unus Nemo
                      wrote last edited by
                      #117

                      @ndevenish @davidgerard @GossiTheDog

                      Dumb security issues do not happen when poor code is injected into projects. Dumb security issues happen when pull requests are accepted without vetting. Keep in mind that humans have deliberately and accidentally introduced security issues into code bases far before AI.

                      You might rationale that anyone can fork a repo and then push to it all they want, and it will have its own git repo online. GitHub and GitLab tell you were the repo is forked from. When I fork a repo for personal use I only fork the original project (if it has not died and been passed on to another maintainers repo). It is not a good idea to use anyone else's repo that is not in sync with the official repo. That is akin to using software from just any download site on MS/Windows, it is asking for issues.

                      This is just my take on the situation. There are always going to be security issues. Our best line of defense is being aware of what we are doing.

                      1 Reply Last reply
                      1
                      0
                      • Kevin BeaumontG Kevin Beaumont

                        Today in InfoSec Job Security News:

                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                        LauraL This user is from outside of this forum
                        LauraL This user is from outside of this forum
                        Laura
                        wrote last edited by
                        #118

                        @GossiTheDog At least this one is blockable, unlike copilot.

                        1 Reply Last reply
                        0
                        • Kevin BeaumontG Kevin Beaumont

                          Today in InfoSec Job Security News:

                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                          CassandrichD This user is from outside of this forum
                          CassandrichD This user is from outside of this forum
                          Cassandrich
                          wrote last edited by
                          #119

                          @GossiTheDog We need tools that scrape the list of repos that have accepted this shit, and either ban them or pin them to pre-slop versions/forks in dependency systems.

                          Unus NemoU 1 Reply Last reply
                          0
                          • Kevin BeaumontG Kevin Beaumont

                            Today in InfoSec Job Security News:

                            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                            josh g.J This user is from outside of this forum
                            josh g.J This user is from outside of this forum
                            josh g.
                            wrote last edited by
                            #120

                            @GossiTheDog are we *sure* this isn't how Microsoft is deliberately killing OSS

                            1 Reply Last reply
                            0
                            • F Fooker

                              @fuzzyfuzzyfungus is the question not more "why is anyone using such unreliable tools in the first place?" They've proven time and time again that the result is less than sub par, they create as many if not more issues than they fix, they've fucked up ram prices and soon storage prices, they use too much energy.. i could go on but fuck, if that's not enough i don't know what to say.

                              Gaëtan PerraultG This user is from outside of this forum
                              Gaëtan PerraultG This user is from outside of this forum
                              Gaëtan Perrault
                              wrote last edited by
                              #121

                              @Fooker @fuzzyfuzzyfungus

                              I have an answer to this question, but you need to stick around to the end of the toot.

                              They've proven time and time again that the result is less than sub par...

                              "So what? What does that matter? 😐
                              I was asked to do the thing, I did the thing, I will keep getting my paycheck."

                              That attitude, That's not me. I strongly believe in delivering top quality work A lot of us probably believe that. That's the kind of people Mastodon attracts.

                              But "top-quality work" is inherently something that only a few people deliver. Most people deliver average quality work, by definition. They are totally fine with being average and this machine helps deliver average. Or close enough.

                              Average work does not attract a lot of scrutiny. It also doesn't attract pay rises, but most people are basically ineligible for those anyways. If your white collar work went from average to excellent, is there really a promotion waiting there for you? You probably need a new Co... /1

                              Gaëtan PerraultG 1 Reply Last reply
                              0
                              • Kevin BeaumontG Kevin Beaumont

                                Today in InfoSec Job Security News:

                                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                Luna chanL This user is from outside of this forum
                                Luna chanL This user is from outside of this forum
                                Luna chan
                                wrote last edited by
                                #122

                                @GossiTheDog People need to stop being lazy and using AI to write code.

                                1 Reply Last reply
                                0
                                • CassandrichD Cassandrich

                                  @GossiTheDog We need tools that scrape the list of repos that have accepted this shit, and either ban them or pin them to pre-slop versions/forks in dependency systems.

                                  Unus NemoU This user is from outside of this forum
                                  Unus NemoU This user is from outside of this forum
                                  Unus Nemo
                                  wrote last edited by
                                  #123

                                  @dalias

                                  I agree with your concept as being a noble idea. I just do not see it as a realistic solution. These are my issues with your idea, and you may not agree with me that if fine. Your idea is that we make tools to scrape repos on git servers (and perhaps SVN as it is still used) and validate that it is accepting pull requests from AI. If I have understood you. My take on that is that if you are working on a project then you should be forking the main repository not some other person's random fork. Main repositories tend to be a lot more responsible in who they accept pull requests from. In any of these Claude infested repos was even a single one the projects actual main repository? I would guess no. If developers are practicing good OPSEC then this is a none issue. So we are adding strain on servers that is simply not required.

                                  As developers we have a responsibility to our own integrity and are users to be sure that what we do release is as secure as we can make it. There is no such thing as completely secure software. It does not exist in reality (well maybe 'Hello world' 😉).

                                  It is easy to get upset at such events. Though in the big picture is not a real issue, it is one of those issues that will be self-healing. I do not know a single developer that would not check who commits, are they using security measures like commit signing, is the project secure as is. Before forking, if they wanted to use it as a base and it did not meet those criteria they would hard fork and not participate in the original repo. Keep in mind that there are projects out there entirely written by AI, I do not endorse them, but they do exist.

                                  It is okay to not agree with me, I am okay with that. I do not feel as if we should be censoring source code for developers. I feel like we should be teaching them about good OPSEC & DEVOPs instead. Just my opinion.

                                  Have a great day!

                                  CassandrichD 1 Reply Last reply
                                  0
                                  • Kevin BeaumontG Kevin Beaumont

                                    Today in InfoSec Job Security News:

                                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                    Bert DriehuisB This user is from outside of this forum
                                    Bert DriehuisB This user is from outside of this forum
                                    Bert Driehuis
                                    wrote last edited by
                                    #124

                                    @GossiTheDog to be fair, before Claude the same thing would happen when folks used recipes off Stack Exchange without understanding them.

                                    The atrophying of critical thinking as a result of AI usage is the final nail in the coffin.

                                    1 Reply Last reply
                                    0
                                    • Unus NemoU Unus Nemo

                                      @dalias

                                      I agree with your concept as being a noble idea. I just do not see it as a realistic solution. These are my issues with your idea, and you may not agree with me that if fine. Your idea is that we make tools to scrape repos on git servers (and perhaps SVN as it is still used) and validate that it is accepting pull requests from AI. If I have understood you. My take on that is that if you are working on a project then you should be forking the main repository not some other person's random fork. Main repositories tend to be a lot more responsible in who they accept pull requests from. In any of these Claude infested repos was even a single one the projects actual main repository? I would guess no. If developers are practicing good OPSEC then this is a none issue. So we are adding strain on servers that is simply not required.

                                      As developers we have a responsibility to our own integrity and are users to be sure that what we do release is as secure as we can make it. There is no such thing as completely secure software. It does not exist in reality (well maybe 'Hello world' 😉).

                                      It is easy to get upset at such events. Though in the big picture is not a real issue, it is one of those issues that will be self-healing. I do not know a single developer that would not check who commits, are they using security measures like commit signing, is the project secure as is. Before forking, if they wanted to use it as a base and it did not meet those criteria they would hard fork and not participate in the original repo. Keep in mind that there are projects out there entirely written by AI, I do not endorse them, but they do exist.

                                      It is okay to not agree with me, I am okay with that. I do not feel as if we should be censoring source code for developers. I feel like we should be teaching them about good OPSEC & DEVOPs instead. Just my opinion.

                                      Have a great day!

                                      CassandrichD This user is from outside of this forum
                                      CassandrichD This user is from outside of this forum
                                      Cassandrich
                                      wrote last edited by
                                      #125

                                      @unusnemo A repo that has AI slop anywhere it its git history isn't FOSS and has maintainers who have shown gross irresponsibility. Banning use of it as a dependency should not be controversial.

                                      Unus NemoU 1 Reply Last reply
                                      0
                                      • Gaëtan PerraultG Gaëtan Perrault

                                        @Fooker @fuzzyfuzzyfungus

                                        I have an answer to this question, but you need to stick around to the end of the toot.

                                        They've proven time and time again that the result is less than sub par...

                                        "So what? What does that matter? 😐
                                        I was asked to do the thing, I did the thing, I will keep getting my paycheck."

                                        That attitude, That's not me. I strongly believe in delivering top quality work A lot of us probably believe that. That's the kind of people Mastodon attracts.

                                        But "top-quality work" is inherently something that only a few people deliver. Most people deliver average quality work, by definition. They are totally fine with being average and this machine helps deliver average. Or close enough.

                                        Average work does not attract a lot of scrutiny. It also doesn't attract pay rises, but most people are basically ineligible for those anyways. If your white collar work went from average to excellent, is there really a promotion waiting there for you? You probably need a new Co... /1

                                        Gaëtan PerraultG This user is from outside of this forum
                                        Gaëtan PerraultG This user is from outside of this forum
                                        Gaëtan Perrault
                                        wrote last edited by
                                        #126

                                        @Fooker @fuzzyfuzzyfungus and if I walk through all the logic, I totally understand these folks.

                                        I don't agree with them, that's not who I am personally. But I understand the incentive structure and they're going to work with what they have.

                                        We have an entire book titled "Bullshit Jobs" talking about how widespread the phenomenon is. And here we have a machine that is basically a bullshit generator, all ready to tackle those bullshit jobs. It's a perfect match!

                                        Is this a great use of human or computer resources? Probably not. But that misuse has nothing to do with either the computers or the humans in the loop. It's entirely part of a bigger system that fails to match incentives correctly.

                                        But that's why humans use the stuff. Not because it's good, but because it's what they were asked for.

                                        I think we should be asking for better things, but that shift is a blog post unto itself. //

                                        1 Reply Last reply
                                        0
                                        • CassandrichD Cassandrich

                                          @unusnemo A repo that has AI slop anywhere it its git history isn't FOSS and has maintainers who have shown gross irresponsibility. Banning use of it as a dependency should not be controversial.

                                          Unus NemoU This user is from outside of this forum
                                          Unus NemoU This user is from outside of this forum
                                          Unus Nemo
                                          wrote last edited by
                                          #127

                                          @dalias

                                          I do not think you read my comment, that is fine, I am not going to say that I agree to disagree with you because I never even broached the topic you responded with at all. Take care and have a great day, I can see this conversation is going nowhere. That is fine, we both have better things to do. 😀

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups