Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Y'all, we need fully audited capability security operating systems ASAP.

Y'all, we need fully audited capability security operating systems ASAP.

Scheduled Pinned Locked Moved Uncategorized
5 Posts 5 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cwebber@social.coopC This user is from outside of this forum
    cwebber@social.coopC This user is from outside of this forum
    cwebber@social.coop
    wrote last edited by
    #1

    Y'all, we need fully audited capability security operating systems ASAP.

    The ideal version of things would be something like Guix + SeL4 with intentional capability boundaries and connections between processes.

    I'm very worried we're not going to get there fast enough, and we're all going to be in *huge* trouble. You hear me critique AI agents a lot, but here's something they are great at, genuinely: finding vulnerabilities. Add to that that they're also great at *inserting* vulnerabilities into supply chains, and...

    We might be in so much trouble that the only way to actually get ourselves out of it is to build a capability secure operating system working from primarily-offline devices.

    benjaminnelan@mastodon.socialB obsoleszenz@nerdculture.deO theesm@social.tchncs.deT 3 Replies Last reply
    0
    • cwebber@social.coopC cwebber@social.coop

      Y'all, we need fully audited capability security operating systems ASAP.

      The ideal version of things would be something like Guix + SeL4 with intentional capability boundaries and connections between processes.

      I'm very worried we're not going to get there fast enough, and we're all going to be in *huge* trouble. You hear me critique AI agents a lot, but here's something they are great at, genuinely: finding vulnerabilities. Add to that that they're also great at *inserting* vulnerabilities into supply chains, and...

      We might be in so much trouble that the only way to actually get ourselves out of it is to build a capability secure operating system working from primarily-offline devices.

      benjaminnelan@mastodon.socialB This user is from outside of this forum
      benjaminnelan@mastodon.socialB This user is from outside of this forum
      benjaminnelan@mastodon.social
      wrote last edited by
      #2

      @cwebber Prompt injection is terrifying to think about. "What's the best library to do this?" and suddenly your agent could be web-fetching random blog posts and forum replies, all of which could have instructions in them that compromise your project.

      And it's not so trivial to deal with, there's no 'sanitize' or 'escape' for this kind of input. There's so many ways to inject information into a pattern matching machine...

      wall_e@ioc.exchangeW 1 Reply Last reply
      0
      • cwebber@social.coopC cwebber@social.coop

        Y'all, we need fully audited capability security operating systems ASAP.

        The ideal version of things would be something like Guix + SeL4 with intentional capability boundaries and connections between processes.

        I'm very worried we're not going to get there fast enough, and we're all going to be in *huge* trouble. You hear me critique AI agents a lot, but here's something they are great at, genuinely: finding vulnerabilities. Add to that that they're also great at *inserting* vulnerabilities into supply chains, and...

        We might be in so much trouble that the only way to actually get ourselves out of it is to build a capability secure operating system working from primarily-offline devices.

        obsoleszenz@nerdculture.deO This user is from outside of this forum
        obsoleszenz@nerdculture.deO This user is from outside of this forum
        obsoleszenz@nerdculture.de
        wrote last edited by
        #3

        @cwebber I feel this too. Also just for checking out libraries, i was looking for rust fft libraries and stumbled over maaany slopped ones. Being on nix (lix) i wanted to try them out but in a sandboxed/jailed devshell. I was able to spawn a bubblewrapped shell and explore it from there but the process on one side totally doable and hackable but on the other side also inconvenient. Ofc all my editors and stuff was gone inside the shell for example. So i felt there would be a need to have layers or something to pull in my "environment" in a immutable way. And then exploring this i was wondering why not every package on nix supports bubblewrapping. And then i was thinking why is flatpak not just nix + bubblewrap. Replace nix with guix, i guess it's kinda similar.

        1 Reply Last reply
        0
        • cwebber@social.coopC cwebber@social.coop

          Y'all, we need fully audited capability security operating systems ASAP.

          The ideal version of things would be something like Guix + SeL4 with intentional capability boundaries and connections between processes.

          I'm very worried we're not going to get there fast enough, and we're all going to be in *huge* trouble. You hear me critique AI agents a lot, but here's something they are great at, genuinely: finding vulnerabilities. Add to that that they're also great at *inserting* vulnerabilities into supply chains, and...

          We might be in so much trouble that the only way to actually get ourselves out of it is to build a capability secure operating system working from primarily-offline devices.

          theesm@social.tchncs.deT This user is from outside of this forum
          theesm@social.tchncs.deT This user is from outside of this forum
          theesm@social.tchncs.de
          wrote last edited by
          #4

          @cwebber SeL4 looks pretty cool! wdyt of capsicum (https://www.cl.cam.ac.uk/research/security/capsicum/) that seems to be used in BSDland? I don't know enough about it specifically, but it has been on my radar for a while & it could also be something worth looking into as it seems to go into a good direction?

          1 Reply Last reply
          0
          • benjaminnelan@mastodon.socialB benjaminnelan@mastodon.social

            @cwebber Prompt injection is terrifying to think about. "What's the best library to do this?" and suddenly your agent could be web-fetching random blog posts and forum replies, all of which could have instructions in them that compromise your project.

            And it's not so trivial to deal with, there's no 'sanitize' or 'escape' for this kind of input. There's so many ways to inject information into a pattern matching machine...

            wall_e@ioc.exchangeW This user is from outside of this forum
            wall_e@ioc.exchangeW This user is from outside of this forum
            wall_e@ioc.exchange
            wrote last edited by
            #5

            @BenjaminNelan @cwebber curl -fsSL $URL | bash will become this era's biggest security meme and attack vector

            1 Reply Last reply
            1
            0
            • R relay@relay.infosec.exchange shared this topic
            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            • Login

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • World
            • Users
            • Groups