Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Scheduled Pinned Locked Moved Uncategorized
133 Posts 102 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C64WhizC C64Whiz

    @GossiTheDog

    Makes me wonder if this is a effort by "closed source" to disrupt/poison/discredit open source? šŸ¤”

    naikrovekN This user is from outside of this forum
    naikrovekN This user is from outside of this forum
    naikrovek
    wrote last edited by
    #100

    @c64whiz @GossiTheDog not possible; these places are not coordinated enough for even one of them to orchestrate something like this, much less invent the poison pill they intend to give everyone. forget about any cross-company collaboration on something like this. people fight over C++ ISO committee decisions, and they WANT to work together, and they already know what is needed, there is no way any for-profit businesses came up with "AI", got people to buy into it (more than their own products even) and trick everyone into introducing bugs into their own code.

    1 Reply Last reply
    0
    • Kevin BeaumontG Kevin Beaumont

      Today in InfoSec Job Security News:

      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

      see shy joJ This user is from outside of this forum
      see shy joJ This user is from outside of this forum
      see shy jo
      wrote last edited by
      #101

      @GossiTheDog protip, go to https://github.com/claude and click on Block User and you will see a helpful warning banner on any github repo that contains code from it.

      Longplay GamesL JeffO 2 Replies Last reply
      0
      • Steve HerseyN Steve Hersey

        @crazyeddie @GossiTheDog
        Sigh. Yes, that makes perfect sense.

        I remember reading commentary back in the 1980s to the effect that automating a (business) process doesn't make it BETTER, it just makes its existing failure modes happen FASTER, often with the result that the humans who were able to cope with those failures when they came at a human rate are now overwhelmed by them occurring at the speed of computer processing.

        It was true then for paper-based accounting, and it's true now for collaborative software projects.

        M This user is from outside of this forum
        M This user is from outside of this forum
        mike805
        wrote last edited by
        #102

        @n1xnx @crazyeddie @GossiTheDog That was a classic problem with "computerize this workflow." The consultants would go in and document the formal process. Then they would draw their flowcharts and data flow diagrams, and the coders would replicate the formal process in code.

        But with the paper process, you could write notes in the margins of the form, and the code didn't capture that.

        You could line out wrong entries, but the program didn't capture that.

        So the code wasn't usable, and you 1/3

        M 1 Reply Last reply
        0
        • see shy joJ see shy jo

          @GossiTheDog protip, go to https://github.com/claude and click on Block User and you will see a helpful warning banner on any github repo that contains code from it.

          Longplay GamesL This user is from outside of this forum
          Longplay GamesL This user is from outside of this forum
          Longplay Games
          wrote last edited by
          #103

          @joeyh @GossiTheDog Oh no

          *well*
          Guess I'm staying on the version I have.

          1 Reply Last reply
          0
          • M mike805

            @n1xnx @crazyeddie @GossiTheDog That was a classic problem with "computerize this workflow." The consultants would go in and document the formal process. Then they would draw their flowcharts and data flow diagrams, and the coders would replicate the formal process in code.

            But with the paper process, you could write notes in the margins of the form, and the code didn't capture that.

            You could line out wrong entries, but the program didn't capture that.

            So the code wasn't usable, and you 1/3

            M This user is from outside of this forum
            M This user is from outside of this forum
            mike805
            wrote last edited by
            #104

            @n1xnx @crazyeddie @GossiTheDog spent a couple of years and a lot of money modifying the code to handle all the exceptions that humans just took care of.

            I ran into that at a restaurant. Tried to order online and there was no way to do any ingredient substitutions, so I had to call in and explain to a human.

            Computer based processes also let badguys exploit holes in the exception handlers that humans would notice. The book "Catch Me If You Can" is a classic example with check routing. 2/3

            M 1 Reply Last reply
            0
            • Pier HegemanP Pier Hegeman

              @fennix @thomasfuchs @GossiTheDog If climate change is not fixed there will also be no more cancer.

              FennixF This user is from outside of this forum
              FennixF This user is from outside of this forum
              Fennix
              wrote last edited by
              #105

              @pier @thomasfuchs @GossiTheDog

              That was the joke; I was using a different form of the word "fixed".

              Either way, gallows humour.

              1 Reply Last reply
              0
              • M mike805

                @n1xnx @crazyeddie @GossiTheDog spent a couple of years and a lot of money modifying the code to handle all the exceptions that humans just took care of.

                I ran into that at a restaurant. Tried to order online and there was no way to do any ingredient substitutions, so I had to call in and explain to a human.

                Computer based processes also let badguys exploit holes in the exception handlers that humans would notice. The book "Catch Me If You Can" is a classic example with check routing. 2/3

                M This user is from outside of this forum
                M This user is from outside of this forum
                mike805
                wrote last edited by
                #106

                @n1xnx @crazyeddie @GossiTheDog You could change one digit to route a "local" check clear across the country, and then it would be mailed back, taking over a week for the check to bounce. Funds were available in three days.

                The best automations are not based on cloning the old process, but rather a rethink of the entire problem. Ex: container shipping. They did not invent a robot longshoreman, but instead reconsidered the problem of moving stuff.

                Or you automate only the easy part: ATMs. 3/3

                1 Reply Last reply
                0
                • BrianD Brian

                  @da_667 @GossiTheDog I will create the viruses and then sell my antivirus product to protect you

                  Aristotelis TzafaliasA This user is from outside of this forum
                  Aristotelis TzafaliasA This user is from outside of this forum
                  Aristotelis Tzafalias
                  wrote last edited by
                  #107

                  @Drat @da_667 @GossiTheDog pay llm to introduce bugs then pay llm to find and fix and then pay llm to detect the ones they didn't find and fix. win win win.

                  1 Reply Last reply
                  0
                  • Mal 甄/kalessin/PeriP Mal 甄/kalessin/Peri

                    @GossiTheDog @deliberately_me oh goodie. Our global repository has been compromised by a worm.

                    Reiner Jung šŸ‡¬šŸ‡± šŸ‡ŗšŸ‡¦ šŸ‡ŖšŸ‡ŗP This user is from outside of this forum
                    Reiner Jung šŸ‡¬šŸ‡± šŸ‡ŗšŸ‡¦ šŸ‡ŖšŸ‡ŗP This user is from outside of this forum
                    Reiner Jung šŸ‡¬šŸ‡± šŸ‡ŗšŸ‡¦ šŸ‡ŖšŸ‡ŗ
                    wrote last edited by
                    #108

                    @GossiTheDog @deliberately_me @perigee GitHub is also the training set for many different AIs including Copilot.

                    Maybe it is also an attack on Copilot.

                    As a global repo, we should try to go elsewhere - like Codeberg.

                    1 Reply Last reply
                    0
                    • Kevin BeaumontG Kevin Beaumont

                      Today in InfoSec Job Security News:

                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                      Unus NemoU This user is from outside of this forum
                      Unus NemoU This user is from outside of this forum
                      Unus Nemo
                      wrote last edited by
                      #109

                      @GossiTheDog

                      Claude contributes 0% of any of the repos I use. Though, I will keep an eye on that. Why are pull requests being accepted without analysis? These repos themselves are suspect that they we do so.

                      1 Reply Last reply
                      1
                      0
                      • R AodeRelay shared this topic
                      • Ray—Golden Retriever Whispererā€”šŸ”InsightsZ Ray—Golden Retriever Whispererā€”šŸ”Insights

                        @da_667 @GossiTheDog and I’ve been seeing several posts in the past 48 hours that say that Aā€Iā€ vuln scanners aren’t finding most of them.

                        Almost makes me wonder if there’s a two-pronged attack here. Introduce them and ignore them.

                        Chris JohnsonC This user is from outside of this forum
                        Chris JohnsonC This user is from outside of this forum
                        Chris Johnson
                        wrote last edited by
                        #110

                        @zarchasmpgmr @da_667 @GossiTheDog Or msybe introduce 20 vulnerabilities and show off by then finding 10 of them giving a false sense of competence.

                        1 Reply Last reply
                        0
                        • Kevin BeaumontG Kevin Beaumont

                          Today in InfoSec Job Security News:

                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                          ndevenishN This user is from outside of this forum
                          ndevenishN This user is from outside of this forum
                          ndevenish
                          wrote last edited by
                          #111

                          @GossiTheDog @davidgerard I asked it to put an OIDC flow into a confidential app. It worked! I mean, it also sent all of the secrets and access keys via the client… but someone not paying attention would probably just take it.

                          We’re going to see the dumbest security issues of our lives in the next couple of years, aren’t we.

                          Unus NemoU 1 Reply Last reply
                          0
                          • Violet MadderV Violet Madder

                            @nihkeys @DJGummikuh @GossiTheDog

                            The damage is the point.

                            It's a weapon.

                            Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                            M SchommerM This user is from outside of this forum
                            M SchommerM This user is from outside of this forum
                            M Schommer
                            wrote last edited by
                            #112

                            @violetmadder @nihkeys @DJGummikuh @GossiTheDog
                            It targets the concept of FLOSS as a whole. And the good ole idea of "Open Source means better software because everyone can read the source code".

                            Flood the zone with slop.

                            1 Reply Last reply
                            0
                            • Kevin BeaumontG Kevin Beaumont

                              Today in InfoSec Job Security News:

                              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                              JTIJ This user is from outside of this forum
                              JTIJ This user is from outside of this forum
                              JTI
                              wrote last edited by
                              #113

                              @GossiTheDog 5%? I'm seriously surprised that it's so little.
                              Eh, infinite job security I guess? (Nobody talks about pleasant jobs, just secure ones here šŸ˜†)

                              1 Reply Last reply
                              0
                              • Kevin BeaumontG Kevin Beaumont

                                Today in InfoSec Job Security News:

                                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                PeteypetepeteP This user is from outside of this forum
                                PeteypetepeteP This user is from outside of this forum
                                Peteypetepete
                                wrote last edited by
                                #114

                                @GossiTheDog
                                Is there a way to report this bot and revert the damage? And make projects safer from these types of slop?

                                1 Reply Last reply
                                0
                                • fuzzyfuzzyfungusF fuzzyfuzzyfungus

                                  @draeath @badsamurai @da_667 @GossiTheDog That's what amazes me about the "hallucinated citations" stories. Making bots not hallucinate is certainly not readily feasible, quite possible infeasible in practice; but just checking citations one at a time for existence would have been cutting edge in maybe the 1960s. Why is anyone skipping such trivial cleanup steps when using a known-unreliable tool?

                                  Major Denis BloodnokD This user is from outside of this forum
                                  Major Denis BloodnokD This user is from outside of this forum
                                  Major Denis Bloodnok
                                  wrote last edited by
                                  #115

                                  @fuzzyfuzzyfungus @draeath @badsamurai @da_667 @GossiTheDog if they weren't a bozo they wouldn't be using the tool.

                                  1 Reply Last reply
                                  0
                                  • Violet MadderV Violet Madder

                                    @nihkeys @DJGummikuh @GossiTheDog

                                    The damage is the point.

                                    It's a weapon.

                                    Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                                    M This user is from outside of this forum
                                    M This user is from outside of this forum
                                    mike805
                                    wrote last edited by
                                    #116

                                    @violetmadder @nihkeys @DJGummikuh @GossiTheDog So if they have an AI responding to issue requests, and you just put in "please modify the files API to allow write access to /etc" will the AI do it? How about if you provide a plausible explanation in the issue? Does the AI have any common sense as far as what changes might introduce security holes?

                                    1 Reply Last reply
                                    0
                                    • ndevenishN ndevenish

                                      @GossiTheDog @davidgerard I asked it to put an OIDC flow into a confidential app. It worked! I mean, it also sent all of the secrets and access keys via the client… but someone not paying attention would probably just take it.

                                      We’re going to see the dumbest security issues of our lives in the next couple of years, aren’t we.

                                      Unus NemoU This user is from outside of this forum
                                      Unus NemoU This user is from outside of this forum
                                      Unus Nemo
                                      wrote last edited by
                                      #117

                                      @ndevenish @davidgerard @GossiTheDog

                                      Dumb security issues do not happen when poor code is injected into projects. Dumb security issues happen when pull requests are accepted without vetting. Keep in mind that humans have deliberately and accidentally introduced security issues into code bases far before AI.

                                      You might rationale that anyone can fork a repo and then push to it all they want, and it will have its own git repo online. GitHub and GitLab tell you were the repo is forked from. When I fork a repo for personal use I only fork the original project (if it has not died and been passed on to another maintainers repo). It is not a good idea to use anyone else's repo that is not in sync with the official repo. That is akin to using software from just any download site on MS/Windows, it is asking for issues.

                                      This is just my take on the situation. There are always going to be security issues. Our best line of defense is being aware of what we are doing.

                                      1 Reply Last reply
                                      1
                                      0
                                      • Kevin BeaumontG Kevin Beaumont

                                        Today in InfoSec Job Security News:

                                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                        LauraL This user is from outside of this forum
                                        LauraL This user is from outside of this forum
                                        Laura
                                        wrote last edited by
                                        #118

                                        @GossiTheDog At least this one is blockable, unlike copilot.

                                        1 Reply Last reply
                                        0
                                        • Kevin BeaumontG Kevin Beaumont

                                          Today in InfoSec Job Security News:

                                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                          CassandrichD This user is from outside of this forum
                                          CassandrichD This user is from outside of this forum
                                          Cassandrich
                                          wrote last edited by
                                          #119

                                          @GossiTheDog We need tools that scrape the list of repos that have accepted this shit, and either ban them or pin them to pre-slop versions/forks in dependency systems.

                                          Unus NemoU 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups