Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Scheduled Pinned Locked Moved Uncategorized
133 Posts 102 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • draeathD draeath

    @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

    It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

    fuzzyfuzzyfungusF This user is from outside of this forum
    fuzzyfuzzyfungusF This user is from outside of this forum
    fuzzyfuzzyfungus
    wrote last edited by
    #44

    @draeath @badsamurai @da_667 @GossiTheDog That's what amazes me about the "hallucinated citations" stories. Making bots not hallucinate is certainly not readily feasible, quite possible infeasible in practice; but just checking citations one at a time for existence would have been cutting edge in maybe the 1960s. Why is anyone skipping such trivial cleanup steps when using a known-unreliable tool?

    F Major Denis BloodnokD 2 Replies Last reply
    0
    • Kevin BeaumontG Kevin Beaumont

      Today in InfoSec Job Security News:

      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

      C This user is from outside of this forum
      C This user is from outside of this forum
      claudex
      wrote last edited by
      #45

      @GossiTheDog in a few months, the user creation and password management will be a solved problem, every software will have a semi-public backdoor that everybody will use

      1 Reply Last reply
      0
      • Kevin BeaumontG Kevin Beaumont

        Today in InfoSec Job Security News:

        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

        kpcyrd 🏴K This user is from outside of this forum
        kpcyrd 🏴K This user is from outside of this forum
        kpcyrd 🏴
        wrote last edited by
        #46

        @GossiTheDog what was the vulnerability you found in those search results over and over? I only get html and css stuff when I click that link.

        1 Reply Last reply
        0
        • draeathD draeath

          @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

          It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

          B'ad Samurai 🐐🇺🇦B This user is from outside of this forum
          B'ad Samurai 🐐🇺🇦B This user is from outside of this forum
          B'ad Samurai 🐐🇺🇦
          wrote last edited by
          #47

          @draeath

          These MFers yeet DIRFT (Do it right the first time) and TQM principles to play hooky on the plinko and demand you call them a genius.

          @da_667 @GossiTheDog

          1 Reply Last reply
          0
          • Kevin BeaumontG Kevin Beaumont

            Today in InfoSec Job Security News:

            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

            AnthonyA This user is from outside of this forum
            AnthonyA This user is from outside of this forum
            Anthony
            wrote last edited by
            #48
            @GossiTheDog@cyberplace.social An instance of eating the seed corn, I'd say ( https://buc.ci/abucci/p/1705679109.757852 ).
            1 Reply Last reply
            0
            • Kevin BeaumontG Kevin Beaumont

              Today in InfoSec Job Security News:

              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

              Klaus FrankA This user is from outside of this forum
              Klaus FrankA This user is from outside of this forum
              Klaus Frank
              wrote last edited by
              #49

              @GossiTheDog can you please post this also over on LinkedIn for all of the corporate people and CEOs to see?

              We can't highlight how much of a liability generator all of this is...

              1 Reply Last reply
              0
              • B'ad Samurai 🐐🇺🇦B B'ad Samurai 🐐🇺🇦

                @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                @GossiTheDog

                Ron BowesI This user is from outside of this forum
                Ron BowesI This user is from outside of this forum
                Ron Bowes
                wrote last edited by
                #50

                @badsamurai @da_667 @GossiTheDog Hey, as somebody writing a CTF, it's handy to get randomly introduced vulnerabilities!

                1 Reply Last reply
                0
                • cR0wC cR0w

                  @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                  Klaus FrankA This user is from outside of this forum
                  Klaus FrankA This user is from outside of this forum
                  Klaus Frank
                  wrote last edited by
                  #51

                  @cR0w @GossiTheDog

                  Well I guess this must be what they meant by the saying "only idiots don't learn anything from their failures and smart people even learn from the failures of others, not just their own."

                  #quote

                  1 Reply Last reply
                  0
                  • FennixF Fennix

                    @cR0w @GossiTheDog

                    Dusk to Don :raccoon:D This user is from outside of this forum
                    Dusk to Don :raccoon:D This user is from outside of this forum
                    Dusk to Don :raccoon:
                    wrote last edited by
                    #52

                    @fennix @GossiTheDog

                    I'd invite anyone to enjoy the collection of content at #directoryTraversalMemes

                    (with @cR0w being a delightful contributor)

                    E.g.
                    https://infosec.exchange/@cR0w/115663258594893751

                    1 Reply Last reply
                    0
                    • Richard HughesH Richard Hughes

                      @GossiTheDog I guess the AI security scanners will clean this up with their automated scan and CVE requests.</joke>

                      Josh BressersJ This user is from outside of this forum
                      Josh BressersJ This user is from outside of this forum
                      Josh Bressers
                      wrote last edited by
                      #53

                      @hughsie @GossiTheDog It’s the circle of life. Extra points if the fix has new vulnerabilities in it!

                      1 Reply Last reply
                      0
                      • draeathD draeath

                        @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                        ManniC This user is from outside of this forum
                        ManniC This user is from outside of this forum
                        Manni
                        wrote last edited by
                        #54

                        @draeath @nihkeys @DJGummikuh @GossiTheDog not if you want to understand the system.
                        https://en.wikipedia.org/wiki/The_purpose_of_a_system_is_what_it_does

                        1 Reply Last reply
                        0
                        • spinnyspinlockS spinnyspinlock

                          @GossiTheDog I became used to checking projects I am checking out for claude (etc) in the source files and commits really fast

                          TrivT This user is from outside of this forum
                          TrivT This user is from outside of this forum
                          Triv
                          wrote last edited by
                          #55

                          @spinnyspinlock@infosec.exchange @GossiTheDog@cyberplace.social If github lists claude (or other LLMs) as one of the top contributors I consider that a red flag

                          1 Reply Last reply
                          0
                          • Kevin BeaumontG Kevin Beaumont

                            Today in InfoSec Job Security News:

                            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                            KyleW This user is from outside of this forum
                            KyleW This user is from outside of this forum
                            Kyle
                            wrote last edited by
                            #56

                            @GossiTheDog which framework?

                            1 Reply Last reply
                            0
                            • Kevin BeaumontG Kevin Beaumont

                              Today in InfoSec Job Security News:

                              I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                              So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                              https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                              As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                              pinkforest(she/her) 🦀P This user is from outside of this forum
                              pinkforest(she/her) 🦀P This user is from outside of this forum
                              pinkforest(she/her) 🦀
                              wrote last edited by
                              #57

                              @GossiTheDog I feel sorry for all the persons named Claude https://github.com/search?q=claude&type=commits

                              1 Reply Last reply
                              0
                              • Kevin BeaumontG Kevin Beaumont

                                Today in InfoSec Job Security News:

                                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                Victor NavaV This user is from outside of this forum
                                Victor NavaV This user is from outside of this forum
                                Victor Nava
                                wrote last edited by
                                #58

                                @GossiTheDog this happens when people don’t care nor use AI responsibly… we have to do proper reviews EVERY SINGLE TIME

                                1 Reply Last reply
                                0
                                • Kevin BeaumontG Kevin Beaumont

                                  Today in InfoSec Job Security News:

                                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                  Yiming Wu ✅ Use OurPaintC This user is from outside of this forum
                                  Yiming Wu ✅ Use OurPaintC This user is from outside of this forum
                                  Yiming Wu ✅ Use OurPaint
                                  wrote last edited by
                                  #59

                                  @GossiTheDog but... Do these repositories all not have any review processes for their PRs?

                                  1 Reply Last reply
                                  0
                                  • Kevin BeaumontG Kevin Beaumont

                                    Today in InfoSec Job Security News:

                                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                    Fritz AdalisF This user is from outside of this forum
                                    Fritz AdalisF This user is from outside of this forum
                                    Fritz Adalis
                                    wrote last edited by
                                    #60

                                    @GossiTheDog
                                    So just make a bot that goes around behind claude and files a vuln bug and lists the revert as the fix.

                                    Fritz AdalisF 1 Reply Last reply
                                    0
                                    • Fritz AdalisF Fritz Adalis

                                      @GossiTheDog
                                      So just make a bot that goes around behind claude and files a vuln bug and lists the revert as the fix.

                                      Fritz AdalisF This user is from outside of this forum
                                      Fritz AdalisF This user is from outside of this forum
                                      Fritz Adalis
                                      wrote last edited by
                                      #61

                                      @GossiTheDog
                                      Nvm these are commits, not prs.

                                      1 Reply Last reply
                                      0
                                      • Kevin BeaumontG Kevin Beaumont

                                        Today in InfoSec Job Security News:

                                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                        seism0saurusS This user is from outside of this forum
                                        seism0saurusS This user is from outside of this forum
                                        seism0saurus
                                        wrote last edited by
                                        #62

                                        @GossiTheDog

                                        Is there a cwe (common weakness enumeration) for AI slop usage already?

                                        1 Reply Last reply
                                        0
                                        • kwayk42K kwayk42

                                          @da_667 @GossiTheDog

                                          kwayk42K This user is from outside of this forum
                                          kwayk42K This user is from outside of this forum
                                          kwayk42
                                          wrote last edited by
                                          #63

                                          @da_667 @GossiTheDog took me a while but I finally thought of something :

                                          Who says AI hasn't generated any real value? It's doing wonders for the threat actors

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups