Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Scheduled Pinned Locked Moved Uncategorized
133 Posts 102 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • da_667D da_667

    @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

    B'ad Samurai 🐐🇺🇦B This user is from outside of this forum
    B'ad Samurai 🐐🇺🇦B This user is from outside of this forum
    B'ad Samurai 🐐🇺🇦
    wrote last edited by
    #25

    @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

    Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

    That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

    @GossiTheDog

    draeathD Ron BowesI 2 Replies Last reply
    0
    • cR0wC cR0w

      @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

      FennixF This user is from outside of this forum
      FennixF This user is from outside of this forum
      Fennix
      wrote last edited by
      #26

      @cR0w @GossiTheDog

      Dusk to Don :raccoon:D 1 Reply Last reply
      0
      • BrianD Brian

        @da_667 @GossiTheDog I wish that juice actually existed...

        draeathD This user is from outside of this forum
        draeathD This user is from outside of this forum
        draeath
        wrote last edited by
        #27

        @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

        1 Reply Last reply
        0
        • Thomas 🔭🕹️T Thomas 🔭🕹️

          @GossiTheDog you're just jealous because it will cure cancer and fix climate change

          FennixF This user is from outside of this forum
          FennixF This user is from outside of this forum
          Fennix
          wrote last edited by
          #28

          @thomasfuchs @GossiTheDog

          I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

          Pier HegemanP 1 Reply Last reply
          0
          • B'ad Samurai 🐐🇺🇦B B'ad Samurai 🐐🇺🇦

            @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

            Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

            That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

            @GossiTheDog

            draeathD This user is from outside of this forum
            draeathD This user is from outside of this forum
            draeath
            wrote last edited by
            #29

            @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

            It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

            fuzzyfuzzyfungusF B'ad Samurai 🐐🇺🇦B 2 Replies Last reply
            0
            • cR0wC cR0w

              @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

              Alan Langford 🇨🇦🧤🧊摏A This user is from outside of this forum
              Alan Langford 🇨🇦🧤🧊摏A This user is from outside of this forum
              Alan Langford 🇨🇦🧤🧊摏
              wrote last edited by
              #30

              @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

              1 Reply Last reply
              0
              • Aleksandr KoltsoffN Aleksandr Koltsoff

                @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                draeathD This user is from outside of this forum
                draeathD This user is from outside of this forum
                draeath
                wrote last edited by
                #31

                @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                ManniC AzuaronA 2 Replies Last reply
                0
                • Kevin BeaumontG Kevin Beaumont

                  Today in InfoSec Job Security News:

                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                  Daniel LakelandD This user is from outside of this forum
                  Daniel LakelandD This user is from outside of this forum
                  Daniel Lakeland
                  wrote last edited by
                  #32

                  @GossiTheDog
                  The real question is why does a bot have commit privileges on a "major web framework"?

                  i mean the answer is probably because google owns the repo probably... but why?

                  1 Reply Last reply
                  0
                  • Sebastian BergmannS Sebastian Bergmann

                    @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                    draeathD This user is from outside of this forum
                    draeathD This user is from outside of this forum
                    draeath
                    wrote last edited by
                    #33

                    @s_bergmann @GossiTheDog I like how AIDER uses co-authors, so you can't escape from blame. All these tools should be doing similar!

                    1 Reply Last reply
                    0
                    • Aleksandr KoltsoffN Aleksandr Koltsoff

                      @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                      Violet MadderV This user is from outside of this forum
                      Violet MadderV This user is from outside of this forum
                      Violet Madder
                      wrote last edited by
                      #34

                      @nihkeys @DJGummikuh @GossiTheDog

                      The damage is the point.

                      It's a weapon.

                      Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                      M SchommerM M 2 Replies Last reply
                      0
                      • Kevin BeaumontG Kevin Beaumont

                        Today in InfoSec Job Security News:

                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                        Alun JonesF This user is from outside of this forum
                        Alun JonesF This user is from outside of this forum
                        Alun Jones
                        wrote last edited by
                        #35

                        @GossiTheDog fault injection into production code at scale. Nice.

                        1 Reply Last reply
                        0
                        • Kevin BeaumontG Kevin Beaumont

                          Today in InfoSec Job Security News:

                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                          spinnyspinlockS This user is from outside of this forum
                          spinnyspinlockS This user is from outside of this forum
                          spinnyspinlock
                          wrote last edited by
                          #36

                          @GossiTheDog I became used to checking projects I am checking out for claude (etc) in the source files and commits really fast

                          TrivT 1 Reply Last reply
                          0
                          • The Penguin of EvilE The Penguin of Evil

                            @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                            Petr TesaříkP This user is from outside of this forum
                            Petr TesaříkP This user is from outside of this forum
                            Petr Tesařík
                            wrote last edited by
                            #37

                            @etchedpixels Bug bounties? You know nothing about business…
                            You set up a giant scam tool, let venture capital pay for its development, then use it to hack the world and sell all of it:

                            • license the tool,
                            • hacked applications,
                            • vulnerability scanning,
                            • protection racket from affected companies.

                            That' how real capitalists do business.
                            @GossiTheDog

                            1 Reply Last reply
                            0
                            • The Penguin of EvilE The Penguin of Evil

                              @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                              John LuskT This user is from outside of this forum
                              John LuskT This user is from outside of this forum
                              John Lusk
                              wrote last edited by
                              #38

                              @etchedpixels @GossiTheDog

                              Gahhh. Takes a little effort to imagine LESS rewarding work.

                              1 Reply Last reply
                              0
                              • Kevin BeaumontG Kevin Beaumont

                                Today in InfoSec Job Security News:

                                I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                Keith LawsonK This user is from outside of this forum
                                Keith LawsonK This user is from outside of this forum
                                Keith Lawson
                                wrote last edited by
                                #39

                                @GossiTheDog This was literally the first major security mistake I made in my early days as a Perl developer and I don't imagine it's that uncommon. Claude has probably been trained with a truckload of code with these vulnerabilities.

                                That's okay because we run everything in single-purpose Docker containers now though, right? /s

                                Steve HerseyN 1 Reply Last reply
                                0
                                • Kevin BeaumontG Kevin Beaumont

                                  Today in InfoSec Job Security News:

                                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                  RachelR This user is from outside of this forum
                                  RachelR This user is from outside of this forum
                                  Rachel
                                  wrote last edited by
                                  #40

                                  @GossiTheDog@cyberplace.social I wonder across the industry how common is it for orgs to skip static code analysis, or other code vulnerability scans as part of their pipelines? Even then how many of those scans are actually effective?

                                  Looks like AI is potentially an insider threat, and code generated by it has to be treated accordingly, even in the case of it being generated by project members and "reviewed"

                                  1 Reply Last reply
                                  0
                                  • da_667D da_667

                                    @GossiTheDog

                                    BradleyB This user is from outside of this forum
                                    BradleyB This user is from outside of this forum
                                    Bradley
                                    wrote last edited by
                                    #41

                                    @da_667 @GossiTheDog

                                    1 Reply Last reply
                                    0
                                    • Kevin BeaumontG Kevin Beaumont

                                      Today in InfoSec Job Security News:

                                      I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                      So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                      https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                      As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                      spinnyspinlockS This user is from outside of this forum
                                      spinnyspinlockS This user is from outside of this forum
                                      spinnyspinlock
                                      wrote last edited by
                                      #42

                                      @GossiTheDog I see it, could probably start a threat intelligence business off the claude feed 🙂‍↕️

                                      1 Reply Last reply
                                      0
                                      • Kevin BeaumontG Kevin Beaumont

                                        Today in InfoSec Job Security News:

                                        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                        Eric LiknessC This user is from outside of this forum
                                        Eric LiknessC This user is from outside of this forum
                                        Eric Likness
                                        wrote last edited by
                                        #43

                                        @GossiTheDog

                                        That Claude is a "clod", and boy does Claude get around I tell ya'. 🏃

                                        Claude is everywhere you want an exploit to be. 🚨

                                        1 Reply Last reply
                                        0
                                        • draeathD draeath

                                          @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                                          It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                                          fuzzyfuzzyfungusF This user is from outside of this forum
                                          fuzzyfuzzyfungusF This user is from outside of this forum
                                          fuzzyfuzzyfungus
                                          wrote last edited by
                                          #44

                                          @draeath @badsamurai @da_667 @GossiTheDog That's what amazes me about the "hallucinated citations" stories. Making bots not hallucinate is certainly not readily feasible, quite possible infeasible in practice; but just checking citations one at a time for existence would have been cutting edge in maybe the 1960s. Why is anyone skipping such trivial cleanup steps when using a known-unreliable tool?

                                          F Major Denis BloodnokD 2 Replies Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups