Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Scheduled Pinned Locked Moved Uncategorized
23 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mattdm@hachyderm.ioM mattdm@hachyderm.io

    @Viss @dangoodin

    I'm not saying any of those things, and neither does the Mozilla post.

    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.social
    wrote last edited by
    #14

    @mattdm @dangoodin but its all written about the same effort. anthroipics writeup and now this one, as well as the flying penguin post. theyre all about the same thing, and they are very very starkly different

    1 Reply Last reply
    0
    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

      Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

      Link Preview Image
      Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

      New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

      favicon

      Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

      psysal@mastodon.socialP This user is from outside of this forum
      psysal@mastodon.socialP This user is from outside of this forum
      psysal@mastodon.social
      wrote last edited by
      #15

      @dangoodin I looked at the first one and although I don't know the codebase at all so am missing context, I think I understand it partly (I am a good c++ programmer ) and it certainly looks real to me. There is also discussion on the bugzilla where a developer acknowledges they introduced the bug when doing code cleanup.

      1 Reply Last reply
      0
      • passocacornio@tech.lgbtP passocacornio@tech.lgbt

        @dangoodin I... 12 is not a bad number but like...

        Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

        if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

        Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

        this sound straight up off of a entry-level "advertising 101" book...

        also I looked at some of the bug repports and... meh

        passocacornio@tech.lgbtP This user is from outside of this forum
        passocacornio@tech.lgbtP This user is from outside of this forum
        passocacornio@tech.lgbt
        wrote last edited by
        #16

        @dangoodin if anyone wanna know what I feel about the reports I read

        :ms_purple_potion: Passoca Witch :v_enby: :ms_purple_potion: (@passocacornio@tech.lgbt)

        Content warning: mozila, antropic

        favicon

        LGBTQIA+ and Tech (tech.lgbt)

        1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

          Link Preview Image
          Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

          New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

          favicon

          Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

          mhitza@third-party.cyouM This user is from outside of this forum
          mhitza@third-party.cyouM This user is from outside of this forum
          mhitza@third-party.cyou
          wrote last edited by
          #17

          @dangoodin half of a continuation of a report, and half a tech blog discussing the internal security harnessing. Strange to read how it switched between the two and answering interesting questions in the FAQ.

          I find confusing the fact that I couldn't find a list for all the invidually tracked bugs (?). Even though they are "rolled up"/grouped under a single CVE, they are tracked individually and that would be a more interesting thing to look at.

          And I'm really surprised about the no. of fixed bugs graph, especially for April. How could they handle that jump in volume? More people working on Firefox? More focus on security than other work? "Looks good to me" merges?

          1 Reply Last reply
          0
          • R relay@relay.publicsquare.global shared this topic
          • passocacornio@tech.lgbtP passocacornio@tech.lgbt

            @dangoodin I... 12 is not a bad number but like...

            Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

            if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

            Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

            this sound straight up off of a entry-level "advertising 101" book...

            also I looked at some of the bug repports and... meh

            michaelh@fosstodon.orgM This user is from outside of this forum
            michaelh@fosstodon.orgM This user is from outside of this forum
            michaelh@fosstodon.org
            wrote last edited by
            #18

            @passocacornio @dangoodin
            Its hard to judge without all of them. 12 is what was released.

            passocacornio@tech.lgbtP dangoodin@infosec.exchangeD michaelh@fosstodon.orgM 3 Replies Last reply
            0
            • michaelh@fosstodon.orgM michaelh@fosstodon.org

              @passocacornio @dangoodin
              Its hard to judge without all of them. 12 is what was released.

              passocacornio@tech.lgbtP This user is from outside of this forum
              passocacornio@tech.lgbtP This user is from outside of this forum
              passocacornio@tech.lgbt
              wrote last edited by
              #19

              @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

              dangoodin@infosec.exchangeD 1 Reply Last reply
              0
              • michaelh@fosstodon.orgM michaelh@fosstodon.org

                @passocacornio @dangoodin
                Its hard to judge without all of them. 12 is what was released.

                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchange
                wrote last edited by
                #20

                @michaelh @passocacornio

                Yes, that's true. What I want to know is, what's the quality of the 12?

                1 Reply Last reply
                0
                • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                  @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

                  dangoodin@infosec.exchangeD This user is from outside of this forum
                  dangoodin@infosec.exchangeD This user is from outside of this forum
                  dangoodin@infosec.exchange
                  wrote last edited by
                  #21

                  @passocacornio @michaelh

                  OK, assuming that's true, what's the quality of them?

                  passocacornio@tech.lgbtP 1 Reply Last reply
                  0
                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                    @passocacornio @michaelh

                    OK, assuming that's true, what's the quality of them?

                    passocacornio@tech.lgbtP This user is from outside of this forum
                    passocacornio@tech.lgbtP This user is from outside of this forum
                    passocacornio@tech.lgbt
                    wrote last edited by
                    #22

                    @dangoodin @michaelh i... posted my actual impression of the reports on a companion toot its linked in this toot

                    1 Reply Last reply
                    0
                    • michaelh@fosstodon.orgM michaelh@fosstodon.org

                      @passocacornio @dangoodin
                      Its hard to judge without all of them. 12 is what was released.

                      michaelh@fosstodon.orgM This user is from outside of this forum
                      michaelh@fosstodon.orgM This user is from outside of this forum
                      michaelh@fosstodon.org
                      wrote last edited by
                      #23

                      @passocacornio @dangoodin If some large precentage of those 271 reports is sandbox escapes and they all got patched there is a decent chance of breaking an in the wild exploit campaign.

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups