Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Scheduled Pinned Locked Moved Uncategorized
23 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • mattdm@hachyderm.ioM mattdm@hachyderm.io

    @Viss @dangoodin

    Yes. And I also read the Mozilla post linked above.

    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.socialV This user is from outside of this forum
    viss@mastodon.social
    wrote last edited by
    #12

    @mattdm @dangoodin and youre ok with anthropics approach here where they disable protections so their new flagship model can pump the numbers? and youre ok with how older models can find the same bug? and theres no gell-mann amnesia going on here?

    mattdm@hachyderm.ioM 1 Reply Last reply
    0
    • viss@mastodon.socialV viss@mastodon.social

      @mattdm @dangoodin and youre ok with anthropics approach here where they disable protections so their new flagship model can pump the numbers? and youre ok with how older models can find the same bug? and theres no gell-mann amnesia going on here?

      mattdm@hachyderm.ioM This user is from outside of this forum
      mattdm@hachyderm.ioM This user is from outside of this forum
      mattdm@hachyderm.io
      wrote last edited by
      #13

      @Viss @dangoodin

      I'm not saying any of those things, and neither does the Mozilla post.

      viss@mastodon.socialV 1 Reply Last reply
      0
      • mattdm@hachyderm.ioM mattdm@hachyderm.io

        @Viss @dangoodin

        I'm not saying any of those things, and neither does the Mozilla post.

        viss@mastodon.socialV This user is from outside of this forum
        viss@mastodon.socialV This user is from outside of this forum
        viss@mastodon.social
        wrote last edited by
        #14

        @mattdm @dangoodin but its all written about the same effort. anthroipics writeup and now this one, as well as the flying penguin post. theyre all about the same thing, and they are very very starkly different

        1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

          Link Preview Image
          Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

          New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

          favicon

          Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

          psysal@mastodon.socialP This user is from outside of this forum
          psysal@mastodon.socialP This user is from outside of this forum
          psysal@mastodon.social
          wrote last edited by
          #15

          @dangoodin I looked at the first one and although I don't know the codebase at all so am missing context, I think I understand it partly (I am a good c++ programmer ) and it certainly looks real to me. There is also discussion on the bugzilla where a developer acknowledges they introduced the bug when doing code cleanup.

          1 Reply Last reply
          0
          • passocacornio@tech.lgbtP passocacornio@tech.lgbt

            @dangoodin I... 12 is not a bad number but like...

            Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

            if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

            Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

            this sound straight up off of a entry-level "advertising 101" book...

            also I looked at some of the bug repports and... meh

            passocacornio@tech.lgbtP This user is from outside of this forum
            passocacornio@tech.lgbtP This user is from outside of this forum
            passocacornio@tech.lgbt
            wrote last edited by
            #16

            @dangoodin if anyone wanna know what I feel about the reports I read

            :ms_purple_potion: Passoca Witch :v_enby: :ms_purple_potion: (@passocacornio@tech.lgbt)

            Content warning: mozila, antropic

            favicon

            LGBTQIA+ and Tech (tech.lgbt)

            1 Reply Last reply
            0
            • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

              Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

              Link Preview Image
              Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

              New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

              favicon

              Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

              mhitza@third-party.cyouM This user is from outside of this forum
              mhitza@third-party.cyouM This user is from outside of this forum
              mhitza@third-party.cyou
              wrote last edited by
              #17

              @dangoodin half of a continuation of a report, and half a tech blog discussing the internal security harnessing. Strange to read how it switched between the two and answering interesting questions in the FAQ.

              I find confusing the fact that I couldn't find a list for all the invidually tracked bugs (?). Even though they are "rolled up"/grouped under a single CVE, they are tracked individually and that would be a more interesting thing to look at.

              And I'm really surprised about the no. of fixed bugs graph, especially for April. How could they handle that jump in volume? More people working on Firefox? More focus on security than other work? "Looks good to me" merges?

              1 Reply Last reply
              0
              • R relay@relay.publicsquare.global shared this topic
              • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                @dangoodin I... 12 is not a bad number but like...

                Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

                if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

                Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

                this sound straight up off of a entry-level "advertising 101" book...

                also I looked at some of the bug repports and... meh

                michaelh@fosstodon.orgM This user is from outside of this forum
                michaelh@fosstodon.orgM This user is from outside of this forum
                michaelh@fosstodon.org
                wrote last edited by
                #18

                @passocacornio @dangoodin
                Its hard to judge without all of them. 12 is what was released.

                passocacornio@tech.lgbtP dangoodin@infosec.exchangeD michaelh@fosstodon.orgM 3 Replies Last reply
                0
                • michaelh@fosstodon.orgM michaelh@fosstodon.org

                  @passocacornio @dangoodin
                  Its hard to judge without all of them. 12 is what was released.

                  passocacornio@tech.lgbtP This user is from outside of this forum
                  passocacornio@tech.lgbtP This user is from outside of this forum
                  passocacornio@tech.lgbt
                  wrote last edited by
                  #19

                  @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

                  dangoodin@infosec.exchangeD 1 Reply Last reply
                  0
                  • michaelh@fosstodon.orgM michaelh@fosstodon.org

                    @passocacornio @dangoodin
                    Its hard to judge without all of them. 12 is what was released.

                    dangoodin@infosec.exchangeD This user is from outside of this forum
                    dangoodin@infosec.exchangeD This user is from outside of this forum
                    dangoodin@infosec.exchange
                    wrote last edited by
                    #20

                    @michaelh @passocacornio

                    Yes, that's true. What I want to know is, what's the quality of the 12?

                    1 Reply Last reply
                    0
                    • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                      @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

                      dangoodin@infosec.exchangeD This user is from outside of this forum
                      dangoodin@infosec.exchangeD This user is from outside of this forum
                      dangoodin@infosec.exchange
                      wrote last edited by
                      #21

                      @passocacornio @michaelh

                      OK, assuming that's true, what's the quality of them?

                      passocacornio@tech.lgbtP 1 Reply Last reply
                      0
                      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                        @passocacornio @michaelh

                        OK, assuming that's true, what's the quality of them?

                        passocacornio@tech.lgbtP This user is from outside of this forum
                        passocacornio@tech.lgbtP This user is from outside of this forum
                        passocacornio@tech.lgbt
                        wrote last edited by
                        #22

                        @dangoodin @michaelh i... posted my actual impression of the reports on a companion toot its linked in this toot

                        1 Reply Last reply
                        0
                        • michaelh@fosstodon.orgM michaelh@fosstodon.org

                          @passocacornio @dangoodin
                          Its hard to judge without all of them. 12 is what was released.

                          michaelh@fosstodon.orgM This user is from outside of this forum
                          michaelh@fosstodon.orgM This user is from outside of this forum
                          michaelh@fosstodon.org
                          wrote last edited by
                          #23

                          @passocacornio @dangoodin If some large precentage of those 271 reports is sandbox escapes and they all got patched there is a decent chance of breaking an in the wild exploit campaign.

                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups