Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

Scheduled Pinned Locked Moved Uncategorized
33 Posts 19 Posters 33 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rootwyrm@weird.autosR rootwyrm@weird.autos

    @dangoodin zero question it's pure fantasy bullshit. They refuse to show their work, as usual. All they've got is a middling CGIF vulnerability that isn't, and claiming credit for "finding" a vulnerability in GhostScript because "hey this commit did a thing so they must have had a vulnerability!"

    rootwyrm@weird.autosR This user is from outside of this forum
    rootwyrm@weird.autosR This user is from outside of this forum
    rootwyrm@weird.autos
    wrote last edited by
    #5

    @dangoodin if "this commit changed a thing to fix a bug" is the metric, well fuck, I've found over 100,000 'vulnerabilities' in the past year.

    dangoodin@infosec.exchangeD 1 Reply Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      @dangoodin it would help if they included things like CVE numbers, Github pull requests to fix the issues etc. There's some specific examples in the post.. but they include no information to actually find the vulns and/or validate what they're claiming.

      fritzadalis@infosec.exchangeF This user is from outside of this forum
      fritzadalis@infosec.exchangeF This user is from outside of this forum
      fritzadalis@infosec.exchange
      wrote last edited by
      #6

      @GossiTheDog @dangoodin
      This looks like the first one.

      Link Preview Image
      ghostpdl.git - Ghostscript and GhostPDL

      favicon

      (cgit.ghostscript.com)

      fritzadalis@infosec.exchangeF 1 Reply Last reply
      0
      • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

        @GossiTheDog @dangoodin
        This looks like the first one.

        Link Preview Image
        ghostpdl.git - Ghostscript and GhostPDL

        favicon

        (cgit.ghostscript.com)

        fritzadalis@infosec.exchangeF This user is from outside of this forum
        fritzadalis@infosec.exchangeF This user is from outside of this forum
        fritzadalis@infosec.exchange
        wrote last edited by
        #7

        @GossiTheDog @dangoodin
        Maybe #2
        https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab

        fritzadalis@infosec.exchangeF 1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

          0-Days \ red.anthropic.com

          favicon

          (red.anthropic.com)

          sharlatan@mastodon.socialS This user is from outside of this forum
          sharlatan@mastodon.socialS This user is from outside of this forum
          sharlatan@mastodon.social
          wrote last edited by
          #8

          @dangoodin Daniel Steinberg mentioned on FOSDEM 2026 - full covered test suite is the wall none of "AI" could climb. I guess npm may provide even more vulnerable packages 987654321 🙂

          1 Reply Last reply
          0
          • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

            @GossiTheDog @dangoodin
            Maybe #2
            https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab

            fritzadalis@infosec.exchangeF This user is from outside of this forum
            fritzadalis@infosec.exchangeF This user is from outside of this forum
            fritzadalis@infosec.exchange
            wrote last edited by
            #9

            @GossiTheDog @dangoodin
            For #3 there are a bunch of recent commits to the lzw code.

            These really seem like bugs that existing scanners should have found, especially strcat use (#2).

            bertdriehuis@infosec.exchangeB 1 Reply Last reply
            0
            • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

              I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

              0-Days \ red.anthropic.com

              favicon

              (red.anthropic.com)

              M This user is from outside of this forum
              M This user is from outside of this forum
              mweiss@infosec.exchange
              wrote last edited by
              #10

              @dangoodin I said it elsewhere, but what's missing in my view is the false positive rate. Ok, it found 500. Did it flag 500? 5,000? 5,000,000? That's an important data point.

              1 Reply Last reply
              0
              • rootwyrm@weird.autosR rootwyrm@weird.autos

                @dangoodin if "this commit changed a thing to fix a bug" is the metric, well fuck, I've found over 100,000 'vulnerabilities' in the past year.

                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchange
                wrote last edited by
                #11

                @rootwyrm

                That's not what Antropic said. Antropic said the vulns were high-severity.

                rootwyrm@weird.autosR 1 Reply Last reply
                0
                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                  @rootwyrm

                  That's not what Antropic said. Antropic said the vulns were high-severity.

                  rootwyrm@weird.autosR This user is from outside of this forum
                  rootwyrm@weird.autosR This user is from outside of this forum
                  rootwyrm@weird.autos
                  wrote last edited by
                  #12

                  @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

                  > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

                  dangoodin@infosec.exchangeD rootwyrm@weird.autosR 2 Replies Last reply
                  0
                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                    I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                    0-Days \ red.anthropic.com

                    favicon

                    (red.anthropic.com)

                    dangoodin@infosec.exchangeD This user is from outside of this forum
                    dangoodin@infosec.exchangeD This user is from outside of this forum
                    dangoodin@infosec.exchange
                    wrote last edited by
                    #13

                    Thanks for all the responses. So far, projects I understand to have received reports include: Ghostscript, OpenSC, lzw, and CGIF. Are others known? Links to commits that fix the vulns also appreciated.

                    mhitza@third-party.cyouM 1 Reply Last reply
                    0
                    • rootwyrm@weird.autosR rootwyrm@weird.autos

                      @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

                      > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

                      dangoodin@infosec.exchangeD This user is from outside of this forum
                      dangoodin@infosec.exchangeD This user is from outside of this forum
                      dangoodin@infosec.exchange
                      wrote last edited by
                      #14

                      @rootwyrm

                      Right, but the post doesn't say merely that the reports of the 500 vulns resulted in commits. It says all 500 were high-severity. If true, that would be significant, no?

                      1 Reply Last reply
                      0
                      • rootwyrm@weird.autosR rootwyrm@weird.autos

                        @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

                        > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

                        rootwyrm@weird.autosR This user is from outside of this forum
                        rootwyrm@weird.autosR This user is from outside of this forum
                        rootwyrm@weird.autos
                        wrote last edited by
                        #15

                        @dangoodin to which I said "hang the fuck on" and read a bit more. And hey look, it's in fonts... bounds checking...

                        Link Preview Image
                        Snyk Vulnerability Database | Snyk

                        Medium severity (7.8) Out-of-bounds Read in ghostscript-tools-fonts | CVE-2024-46956

                        favicon

                        Learn more about centos:10 with Snyk Open Source Vulnerability Database (security.snyk.io)

                        dangoodin@infosec.exchangeD 1 Reply Last reply
                        0
                        • rootwyrm@weird.autosR rootwyrm@weird.autos

                          @dangoodin to which I said "hang the fuck on" and read a bit more. And hey look, it's in fonts... bounds checking...

                          Link Preview Image
                          Snyk Vulnerability Database | Snyk

                          Medium severity (7.8) Out-of-bounds Read in ghostscript-tools-fonts | CVE-2024-46956

                          favicon

                          Learn more about centos:10 with Snyk Open Source Vulnerability Database (security.snyk.io)

                          dangoodin@infosec.exchangeD This user is from outside of this forum
                          dangoodin@infosec.exchangeD This user is from outside of this forum
                          dangoodin@infosec.exchange
                          wrote last edited by
                          #16

                          @rootwyrm

                          CVSS is 7.8, which is high, no? That would seem to support the Anthropic's claim. What's the significance of the vulns being in fonts . . . bounds checking?

                          rootwyrm@weird.autosR 1 Reply Last reply
                          0
                          • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                            I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                            0-Days \ red.anthropic.com

                            favicon

                            (red.anthropic.com)

                            cerement@social.targaryen.houseC This user is from outside of this forum
                            cerement@social.targaryen.houseC This user is from outside of this forum
                            cerement@social.targaryen.house
                            wrote last edited by
                            #17

                            @dangoodin

                            (on the flip side, curl ending their bug bounty program because of the flood of slop reports)

                            salty@mastodon.nzS 1 Reply Last reply
                            0
                            • cerement@social.targaryen.houseC cerement@social.targaryen.house

                              @dangoodin

                              (on the flip side, curl ending their bug bounty program because of the flood of slop reports)

                              salty@mastodon.nzS This user is from outside of this forum
                              salty@mastodon.nzS This user is from outside of this forum
                              salty@mastodon.nz
                              wrote last edited by
                              #18

                              @cerement @dangoodin Exactly what I was going to point out.

                              1 Reply Last reply
                              0
                              • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                @rootwyrm

                                CVSS is 7.8, which is high, no? That would seem to support the Anthropic's claim. What's the significance of the vulns being in fonts . . . bounds checking?

                                rootwyrm@weird.autosR This user is from outside of this forum
                                rootwyrm@weird.autosR This user is from outside of this forum
                                rootwyrm@weird.autos
                                wrote last edited by
                                #19

                                @dangoodin the significance is that by their own words, they didn't discover shit. Check the date on that CVE. But they're trying to claim dishonestly that their magical almost-to-AGI stochastic parrot totally discovered it.
                                It did not. Period.

                                dangoodin@infosec.exchangeD 1 Reply Last reply
                                0
                                • rootwyrm@weird.autosR rootwyrm@weird.autos

                                  @dangoodin the significance is that by their own words, they didn't discover shit. Check the date on that CVE. But they're trying to claim dishonestly that their magical almost-to-AGI stochastic parrot totally discovered it.
                                  It did not. Period.

                                  dangoodin@infosec.exchangeD This user is from outside of this forum
                                  dangoodin@infosec.exchangeD This user is from outside of this forum
                                  dangoodin@infosec.exchange
                                  wrote last edited by
                                  #20

                                  @rootwyrm

                                  I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

                                  rootwyrm@weird.autosR hatter@metasocial.comH 2 Replies Last reply
                                  0
                                  • R relay@relay.an.exchange shared this topic
                                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                    @rootwyrm

                                    I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

                                    rootwyrm@weird.autosR This user is from outside of this forum
                                    rootwyrm@weird.autosR This user is from outside of this forum
                                    rootwyrm@weird.autos
                                    wrote last edited by
                                    #21

                                    @dangoodin the tl;dr is basically that they are making the completely bogus claim that they 'discovered' a vulnerability, because they found the commit, which was specifically to fix the already disclosed vulnerability.

                                    This is as insane as claiming to have shockingly discovered someone has a dog after they texted you pictures of them holding a puppy, asked you for name suggestions, set up IG and YT accounts for the puppy you subscribe to, and you hosted a puppy party at your house.

                                    mhitza@third-party.cyouM 1 Reply Last reply
                                    0
                                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                      @rootwyrm

                                      I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

                                      hatter@metasocial.comH This user is from outside of this forum
                                      hatter@metasocial.comH This user is from outside of this forum
                                      hatter@metasocial.com
                                      wrote last edited by
                                      #22

                                      @dangoodin @rootwyrm It seems like their Ai is discovering flaws that have already been patched - the exact mechanisms may not have been disclosed previously and claude now knows there may be unpatched code out there, and how to exploit the, because it''s done some kind of analysis of the applied patch. If you don't patch your systems regularly, you are still vulnerable to older exploits.

                                      1 Reply Last reply
                                      0
                                      • rootwyrm@weird.autosR rootwyrm@weird.autos

                                        @dangoodin the tl;dr is basically that they are making the completely bogus claim that they 'discovered' a vulnerability, because they found the commit, which was specifically to fix the already disclosed vulnerability.

                                        This is as insane as claiming to have shockingly discovered someone has a dog after they texted you pictures of them holding a puppy, asked you for name suggestions, set up IG and YT accounts for the puppy you subscribe to, and you hosted a puppy party at your house.

                                        mhitza@third-party.cyouM This user is from outside of this forum
                                        mhitza@third-party.cyouM This user is from outside of this forum
                                        mhitza@third-party.cyou
                                        wrote last edited by
                                        #23

                                        @rootwyrm then it goes on and says that it found another code path that was similar to the fixed bug which was missing a necessary check.

                                        @dangoodin here is the commit for GhostScript. I'm not an expert to assert on their claim of high severity
                                        https://github.com/ArtifexSoftware/ghostpdl/commit/4e392a82d1b1780cab85804728317f36a9c4f7f7

                                        1 Reply Last reply
                                        0
                                        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                          Thanks for all the responses. So far, projects I understand to have received reports include: Ghostscript, OpenSC, lzw, and CGIF. Are others known? Links to commits that fix the vulns also appreciated.

                                          mhitza@third-party.cyouM This user is from outside of this forum
                                          mhitza@third-party.cyouM This user is from outside of this forum
                                          mhitza@third-party.cyou
                                          wrote last edited by
                                          #24

                                          @dangoodin the OpenSC commit that contains the highlighted code on the post https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab . No detail about the fix and no security disclosure on the GitHub repository.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups