Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #Mythos finds a #curl vulnerability

#Mythos finds a #curl vulnerability

Scheduled Pinned Locked Moved Uncategorized
mythoscurl
60 Posts 41 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • bagder@mastodon.socialB bagder@mastodon.social

    My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.

    peteriskrisjanis@toot.lvP This user is from outside of this forum
    peteriskrisjanis@toot.lvP This user is from outside of this forum
    peteriskrisjanis@toot.lv
    wrote last edited by
    #51

    @bagder 💯☝️this

    1 Reply Last reply
    0
    • bagder@mastodon.socialB bagder@mastodon.social

      My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.

      rootwyrm@weird.autosR This user is from outside of this forum
      rootwyrm@weird.autosR This user is from outside of this forum
      rootwyrm@weird.autos
      wrote last edited by
      #52

      @bagder it's all marketing. And any improvements are completely moot, as the actual *costs* to find that single bug were in the tens of thousands of dollars minimum. That's the MINIMUM known cost.
      It would not surprise me if finding that one bug cost $75k, $100k, $200k of compute time. It's a pile of shit, hilariously inefficient slop that sometimes behaves as a fuzzer that occasionally finds a crumb.

      1 Reply Last reply
      0
      • alterelefant@mastodontech.deA alterelefant@mastodontech.de

        @bagder
        At least it works. It would have been quite a disaster if it found zero.

        totoroot@ibe.socialT This user is from outside of this forum
        totoroot@ibe.socialT This user is from outside of this forum
        totoroot@ibe.social
        wrote last edited by
        #53

        @alterelefant@mastodontech.de @bagder@mastodon.social Are you a machine?
        Classifying finding a single vulnerability (1) as success and 0 as failure sure seems like it
        😁
        The world is not black and white and the usefulness of LLMs for finding vulnerabilities IMO isn't either

        alterelefant@mastodontech.deA 1 Reply Last reply
        0
        • totoroot@ibe.socialT totoroot@ibe.social

          @alterelefant@mastodontech.de @bagder@mastodon.social Are you a machine?
          Classifying finding a single vulnerability (1) as success and 0 as failure sure seems like it
          😁
          The world is not black and white and the usefulness of LLMs for finding vulnerabilities IMO isn't either

          alterelefant@mastodontech.deA This user is from outside of this forum
          alterelefant@mastodontech.deA This user is from outside of this forum
          alterelefant@mastodontech.de
          wrote last edited by
          #54

          @totoroot
          I admit it is very binary.
          @bagder

          1 Reply Last reply
          0
          • redsakana@infosec.exchangeR redsakana@infosec.exchange

            @bagder This suggests a fun exercise for someone interested in messing around with LLMs:

            1. Put back all the curl security issues previously found by LLM tools by dropping the fix commits from history or otherwise obfuscating the revert.

            2. Feed the re-vulnerabilized repo to a selection of models and see what are the cheapest ones (by memory, time and/or monetary cost) that can find, say, 50%/75%/100% of the issues found by the warehouse-scale "foundation models".

            Feels like a large part of the current results should be doable with significantly smaller resources, because being trained on every tweet and reddit post and libgen book ever is not obviously related to the task.

            utf_7@mastodon.socialU This user is from outside of this forum
            utf_7@mastodon.socialU This user is from outside of this forum
            utf_7@mastodon.social
            wrote last edited by
            #55

            @redsakana @bagder

            llm tools found security issues in curl? doubt

            1 Reply Last reply
            0
            • peteriskrisjanis@toot.lvP This user is from outside of this forum
              peteriskrisjanis@toot.lvP This user is from outside of this forum
              peteriskrisjanis@toot.lv
              wrote last edited by
              #56

              @normis Normi, tu taču zini ka tas ir curl autors?

              1 Reply Last reply
              0
              • uint8_t@chaos.socialU This user is from outside of this forum
                uint8_t@chaos.socialU This user is from outside of this forum
                uint8_t@chaos.social
                wrote last edited by
                #57

                @das_robin @oots @bagder there was this blog post dismissing lots of the myth https://www.flyingpenguin.com/the-boy-that-cried-mythos-verification-is-collapsing-trust-in-anthropic/

                1 Reply Last reply
                0
                • bagder@mastodon.socialB bagder@mastodon.social

                  #Mythos finds a #curl vulnerability

                  yes, as in singular one.

                  Link Preview Image
                  Mythos finds a curl vulnerability

                  yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

                  favicon

                  daniel.haxx.se (daniel.haxx.se)

                  elgringomexicano@mastodon.socialE This user is from outside of this forum
                  elgringomexicano@mastodon.socialE This user is from outside of this forum
                  elgringomexicano@mastodon.social
                  wrote last edited by
                  #58

                  @bagder I picked 10 in the poll to play it safe, but 1 was my second choice and I'm not surprised at all. Long live #curl .

                  1 Reply Last reply
                  0
                  • bagder@mastodon.socialB bagder@mastodon.social

                    #Mythos finds a #curl vulnerability

                    yes, as in singular one.

                    Link Preview Image
                    Mythos finds a curl vulnerability

                    yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

                    favicon

                    daniel.haxx.se (daniel.haxx.se)

                    mikemcquaid@mastodon.socialM This user is from outside of this forum
                    mikemcquaid@mastodon.socialM This user is from outside of this forum
                    mikemcquaid@mastodon.social
                    wrote last edited by
                    #59

                    @bagder This closely matches the experience Homebrew has also had with Mythos. Also one vulnerability found and in our case it was a pretty irrelevant one.

                    1 Reply Last reply
                    0
                    • oots@infosec.exchangeO This user is from outside of this forum
                      oots@infosec.exchangeO This user is from outside of this forum
                      oots@infosec.exchange
                      wrote last edited by
                      #60

                      @das_robin @bagder
                      Yes, #Firefox is probably a few orders of magnitude more complex than #curl and definitely much bigger.

                      Still, the blog post explicitly mentions "In addition to fixing the 271 bugs identified by Claude Mythos Preview in the 150 release, we’ve shipped more of these fixes in 149.0.2, 150.0.1, and 150.0.2.", so >270 attributed to #Mythos *alone*.

                      1 Reply Last reply
                      1
                      0
                      • R relay@relay.infosec.exchange shared this topic
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups