7 comments

  • magicalhippo1 hour ago
    Key point is that Claude did not <i>find</i> the bug it exploits. It was given the CVE writeup[1] and was asked to write a program that could exploit the bug.<p>That said, given how things are I wouldn&#x27;t be surprised if you could let Claude or similar have a go at the source code of the kernel or core services, armed with some VMs for the try-fail iteration, and get it pumping out CVEs.<p>If not now, then surely not in a too distant future.<p>[1]: <a href="https:&#x2F;&#x2F;www.freebsd.org&#x2F;security&#x2F;advisories&#x2F;FreeBSD-SA-26:08.rpcsec_gss.asc" rel="nofollow">https:&#x2F;&#x2F;www.freebsd.org&#x2F;security&#x2F;advisories&#x2F;FreeBSD-SA-26:08...</a>
    • fragmede1 hour ago
      &gt; Credits: Nicholas Carlini using Claude, Anthropic<p>Claude was used to <i>find</i> the bug in the first place though. That CVE write-up happened because of Claude, so while there are some very talented humans in the loop, Claude is quite involved with the whole process.
      • magicalhippo1 hour ago
        &gt; Claude was used to find the bug in the first place though. That CVE write-up happened because of Claude<p>Do you have a link to that? A rather important piece of context.<p>Wasn&#x27;t trying to downplay this submission the way, the main point still stands:<p><i>But finding a bug and exploiting it are very different things. Exploit development requires understanding OS internals, crafting ROP chains, managing memory layouts, debugging crashes, and adapting when things go wrong. This has long been considered the frontier that only humans can cross.<p>Each new AI capability is usually met with “AI can do Y, but only humans can do X.” Well, for X = exploit development, that line just moved.</i>
    • petcat1 hour ago
      &gt; have a go at the source code of the kernel or core services, armed with some VMs for the try-fail iteration, and get it pumping out CVEs.<p>FreeBSD kernel is written in C right?<p>AI bots will trivially find CVEs.
      • pjmlp42 minutes ago
        The Morris worm lesson is yet to be taken seriously.
        • pitched28 minutes ago
          We’re here right now looking at a CVE. That has to count as progress?
  • ptx54 minutes ago
    &gt; <i>It&#x27;s worth noting that FreeBSD made this easier than it would be on a modern Linux kernel: FreeBSD 14.x has no KASLR (kernel addresses are fixed and predictable) and no stack canaries for integer arrays (the overflowed buffer is int32_t[]).</i><p>What about FreeBSD 15.x then? I didn&#x27;t see anything in the release notes or the mitigations(7) man page about KASLR. Is it being worked on?<p>NetBSD apparently has it: <a href="https:&#x2F;&#x2F;wiki.netbsd.org&#x2F;security&#x2F;kaslr&#x2F;" rel="nofollow">https:&#x2F;&#x2F;wiki.netbsd.org&#x2F;security&#x2F;kaslr&#x2F;</a>
  • panstromek1 hour ago
    The talk &quot;Black-Hat LLMs&quot; just came out a few days ago:<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=1sd26pWhfmg" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=1sd26pWhfmg</a><p>Looks like LLMs are getting good at finding and exploiting these.
    • baq29 minutes ago
      Everybody is acts so surprised as if nobody (around here of all places!) read the sama tweet in which he was hiring the Head of Preparedness... in December.<p><a href="https:&#x2F;&#x2F;xcancel.com&#x2F;sama&#x2F;status&#x2F;2004939524216910323" rel="nofollow">https:&#x2F;&#x2F;xcancel.com&#x2F;sama&#x2F;status&#x2F;2004939524216910323</a>
  • m1321 hour ago
    Appreciate the full prompt history
    • ptx1 hour ago
      Well, it ends with &quot;can you give me back all the prompts i entered in this session&quot;, so it may be partially the actual prompt history and partially hallucination.
    • dark-star25 minutes ago
      they read like they were done by a 10 year old
  • PunchyHamster1 hour ago
    I&#x27;m just gonna assume it was asked to fix some bug and it wrote exploit instead
  • fragmede1 hour ago
    <a href="https:&#x2F;&#x2F;github.com&#x2F;califio&#x2F;publications&#x2F;tree&#x2F;main&#x2F;MADBugs&#x2F;CVE-2026-4747" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;califio&#x2F;publications&#x2F;tree&#x2F;main&#x2F;MADBugs&#x2F;CV...</a> would have been a better link
  • rithdmc1 hour ago
    Running into a meeting, so won&#x27;t be able to review this for a while, but exciting. I wonder how much it cost in tokens, and what the prompt&#x2F;validator&#x2F;iteration loop looked like.