Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Scheduled Pinned Locked Moved Uncategorized
133 Posts 102 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • da_667D da_667

    @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

    Der Brüsseler 🇪🇺D This user is from outside of this forum
    Der Brüsseler 🇪🇺D This user is from outside of this forum
    Der Brüsseler 🇪🇺
    wrote last edited by
    #16

    @da_667 @GossiTheDog maybe it introduced them in the first place. Now its finding its own code.

    1 Reply Last reply
    0
    • Kevin BeaumontG Kevin Beaumont

      Today in InfoSec Job Security News:

      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

      BastianB This user is from outside of this forum
      BastianB This user is from outside of this forum
      Bastian
      wrote last edited by
      #17

      @GossiTheDog

      1 Reply Last reply
      0
      • Kevin BeaumontG Kevin Beaumont

        Today in InfoSec Job Security News:

        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

        Tero Hänninen0 This user is from outside of this forum
        Tero Hänninen0 This user is from outside of this forum
        Tero Hänninen
        wrote last edited by
        #18

        @GossiTheDog I like the part where people are using Claude to write CLAUDE.md to explain Claude about directory traversal.

        Nothing in this supply chain could ever go wrong.

        1 Reply Last reply
        0
        • Kevin BeaumontG Kevin Beaumont

          Today in InfoSec Job Security News:

          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

          Sebastian BergmannS This user is from outside of this forum
          Sebastian BergmannS This user is from outside of this forum
          Sebastian Bergmann
          wrote last edited by
          #19

          @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

          draeathD 1 Reply Last reply
          0
          • Kevin BeaumontG Kevin Beaumont

            Today in InfoSec Job Security News:

            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

            Being Left Behind EnjoyerT This user is from outside of this forum
            Being Left Behind EnjoyerT This user is from outside of this forum
            Being Left Behind Enjoyer
            wrote last edited by
            #20

            @GossiTheDog you're just jealous because it will cure cancer and fix climate change

            FennixF 1 Reply Last reply
            0
            • da_667D da_667

              @GossiTheDog ladies and gentlemen, it's this stupid shit (tm) that we are paying up the ass for new SSDs and RAM for.

              BrianD This user is from outside of this forum
              BrianD This user is from outside of this forum
              Brian
              wrote last edited by
              #21

              @da_667 @GossiTheDog There's not enough press on the downstream effects this stupid shit (tm) causes for any non-giant corp including those kids trying to build home labs to learn (like mine).

              1 Reply Last reply
              0
              • Kevin BeaumontG Kevin Beaumont

                Today in InfoSec Job Security News:

                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                Brian DavidE This user is from outside of this forum
                Brian DavidE This user is from outside of this forum
                Brian David
                wrote last edited by
                #22

                @GossiTheDog was it Next.js?

                1 Reply Last reply
                0
                • Kevin BeaumontG Kevin Beaumont

                  Today in InfoSec Job Security News:

                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                  The Penguin of EvilE This user is from outside of this forum
                  The Penguin of EvilE This user is from outside of this forum
                  The Penguin of Evil
                  wrote last edited by
                  #23

                  @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                  Petr TesaříkP John LuskT 2 Replies Last reply
                  0
                  • Kevin BeaumontG Kevin Beaumont

                    Today in InfoSec Job Security News:

                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                    Richard HughesH This user is from outside of this forum
                    Richard HughesH This user is from outside of this forum
                    Richard Hughes
                    wrote last edited by
                    #24

                    @GossiTheDog I guess the AI security scanners will clean this up with their automated scan and CVE requests.</joke>

                    Josh BressersJ 1 Reply Last reply
                    0
                    • da_667D da_667

                      @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

                      B'ad Samurai 🐐🇺🇦B This user is from outside of this forum
                      B'ad Samurai 🐐🇺🇦B This user is from outside of this forum
                      B'ad Samurai 🐐🇺🇦
                      wrote last edited by
                      #25

                      @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                      Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                      That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                      @GossiTheDog

                      draeathD Ron BowesI 2 Replies Last reply
                      0
                      • cR0wC cR0w

                        @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                        FennixF This user is from outside of this forum
                        FennixF This user is from outside of this forum
                        Fennix
                        wrote last edited by
                        #26

                        @cR0w @GossiTheDog

                        Dusk to Don :raccoon:D 1 Reply Last reply
                        0
                        • BrianD Brian

                          @da_667 @GossiTheDog I wish that juice actually existed...

                          draeathD This user is from outside of this forum
                          draeathD This user is from outside of this forum
                          draeath
                          wrote last edited by
                          #27

                          @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

                          1 Reply Last reply
                          0
                          • Being Left Behind EnjoyerT Being Left Behind Enjoyer

                            @GossiTheDog you're just jealous because it will cure cancer and fix climate change

                            FennixF This user is from outside of this forum
                            FennixF This user is from outside of this forum
                            Fennix
                            wrote last edited by
                            #28

                            @thomasfuchs @GossiTheDog

                            I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

                            Pier HegemanP 1 Reply Last reply
                            0
                            • B'ad Samurai 🐐🇺🇦B B'ad Samurai 🐐🇺🇦

                              @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                              Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                              That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                              @GossiTheDog

                              draeathD This user is from outside of this forum
                              draeathD This user is from outside of this forum
                              draeath
                              wrote last edited by
                              #29

                              @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                              It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                              fuzzyfuzzyfungusF B'ad Samurai 🐐🇺🇦B 2 Replies Last reply
                              0
                              • cR0wC cR0w

                                @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                                Alan Langford 🇨🇦🧤🧊摏A This user is from outside of this forum
                                Alan Langford 🇨🇦🧤🧊摏A This user is from outside of this forum
                                Alan Langford 🇨🇦🧤🧊摏
                                wrote last edited by
                                #30

                                @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

                                1 Reply Last reply
                                0
                                • Aleksandr KoltsoffN Aleksandr Koltsoff

                                  @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                                  draeathD This user is from outside of this forum
                                  draeathD This user is from outside of this forum
                                  draeath
                                  wrote last edited by
                                  #31

                                  @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                                  ManniC AzuaronA 2 Replies Last reply
                                  0
                                  • Kevin BeaumontG Kevin Beaumont

                                    Today in InfoSec Job Security News:

                                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                    Daniel LakelandD This user is from outside of this forum
                                    Daniel LakelandD This user is from outside of this forum
                                    Daniel Lakeland
                                    wrote last edited by
                                    #32

                                    @GossiTheDog
                                    The real question is why does a bot have commit privileges on a "major web framework"?

                                    i mean the answer is probably because google owns the repo probably... but why?

                                    1 Reply Last reply
                                    0
                                    • Sebastian BergmannS Sebastian Bergmann

                                      @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                                      draeathD This user is from outside of this forum
                                      draeathD This user is from outside of this forum
                                      draeath
                                      wrote last edited by
                                      #33

                                      @s_bergmann @GossiTheDog I like how AIDER uses co-authors, so you can't escape from blame. All these tools should be doing similar!

                                      1 Reply Last reply
                                      0
                                      • Aleksandr KoltsoffN Aleksandr Koltsoff

                                        @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                                        Violet MadderV This user is from outside of this forum
                                        Violet MadderV This user is from outside of this forum
                                        Violet Madder
                                        wrote last edited by
                                        #34

                                        @nihkeys @DJGummikuh @GossiTheDog

                                        The damage is the point.

                                        It's a weapon.

                                        Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                                        M SchommerM M 2 Replies Last reply
                                        0
                                        • Kevin BeaumontG Kevin Beaumont

                                          Today in InfoSec Job Security News:

                                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                          Alun JonesF This user is from outside of this forum
                                          Alun JonesF This user is from outside of this forum
                                          Alun Jones
                                          wrote last edited by
                                          #35

                                          @GossiTheDog fault injection into production code at scale. Nice.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups