Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

Scheduled Pinned Locked Moved Uncategorized
73 Posts 38 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

    Link Preview Image
    rhempel@cosocial.caR This user is from outside of this forum
    rhempel@cosocial.caR This user is from outside of this forum
    rhempel@cosocial.ca
    wrote last edited by
    #35

    @GossiTheDog @malwaretech Someday we will have a TV show called "Mythos Busters" where real cyber security experts debunk stuff like this ...

    1 Reply Last reply
    0
    • marius@kiessling.socialM marius@kiessling.social

      @GossiTheDog Even *if* the word prediction box is now capable of findings vulns by throwing massive compute at the problem (leaving all the problems with this aside), you still need to get people to fix their shit. Like have they ever looked at what it takes to get a company to just patch their god damn network edge devices?

      npars01@mstdn.socialN This user is from outside of this forum
      npars01@mstdn.socialN This user is from outside of this forum
      npars01@mstdn.social
      wrote last edited by
      #36

      @marius @GossiTheDog

      In my observation, organizations use these PR announcements & media releases to do layoffs, so they can outsource to a nephew's startup or grandchild's consultancy.

      And the necessary patches or policy changes never get implemented.

      marius@kiessling.socialM 1 Reply Last reply
      0
      • T trademark@fosstodon.org

        @GossiTheDog They aren't claiming it's over, that's a strawman. But interestingly they are providing commit hashes of things they've found. Some of these are seriously scary. I've saved a copy of the webpage and will be waiting to see if the promised commits turn up. If they do check out my opinion of Anthropic will rise. If not...

        dalias@hachyderm.ioD This user is from outside of this forum
        dalias@hachyderm.ioD This user is from outside of this forum
        dalias@hachyderm.io
        wrote last edited by
        #37

        @trademark @GossiTheDog What does "commit hashes of things they've found" even mean? No non-slop project is going to merge the same commits they used in their fixes, because they're LLM slop without provenance to license. If any of these are real, the upstream will fix the bug properly in a way the actual people working on the project understand and can document.

        azonenberg@ioc.exchangeA 1 Reply Last reply
        0
        • npars01@mstdn.socialN npars01@mstdn.social

          @marius @GossiTheDog

          In my observation, organizations use these PR announcements & media releases to do layoffs, so they can outsource to a nephew's startup or grandchild's consultancy.

          And the necessary patches or policy changes never get implemented.

          marius@kiessling.socialM This user is from outside of this forum
          marius@kiessling.socialM This user is from outside of this forum
          marius@kiessling.social
          wrote last edited by
          #38

          @Npars01 from experience, we can even leave out the nepotism and just trace it back to incompetence within the management team

          1 Reply Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

            What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

            It's not though, is it?

            nyanbinary@infosec.exchangeN This user is from outside of this forum
            nyanbinary@infosec.exchangeN This user is from outside of this forum
            nyanbinary@infosec.exchange
            wrote last edited by
            #39

            @GossiTheDog the thing I find the funniest is that their headline vulnerability in OpenBSD was closed as a reliability, not security issue & without a CVE, as far as I can tell?

            1 Reply Last reply
            0
            • bontchev@infosec.exchangeB bontchev@infosec.exchange

              @GossiTheDog Haven't we already been there with fuzzing?

              Anyway, even if Mythos is as good as they claim, that's not really a problem as long as it is available only to a few. It's when every script kiddie gets access to it that we should start worrying.

              L This user is from outside of this forum
              L This user is from outside of this forum
              lhbm@mastodon.social
              wrote last edited by
              #40

              @bontchev @GossiTheDog if it really did burn $20k in tokens to find the vuln, those script kiddies would have to be very well funded.

              1 Reply Last reply
              0
              • dalias@hachyderm.ioD dalias@hachyderm.io

                @trademark @GossiTheDog What does "commit hashes of things they've found" even mean? No non-slop project is going to merge the same commits they used in their fixes, because they're LLM slop without provenance to license. If any of these are real, the upstream will fix the bug properly in a way the actual people working on the project understand and can document.

                azonenberg@ioc.exchangeA This user is from outside of this forum
                azonenberg@ioc.exchangeA This user is from outside of this forum
                azonenberg@ioc.exchange
                wrote last edited by
                #41

                @dalias @trademark @GossiTheDog the hashes are of advisories they claim they will publish in the future afaik, not patches.

                azonenberg@ioc.exchangeA 1 Reply Last reply
                0
                • azonenberg@ioc.exchangeA azonenberg@ioc.exchange

                  @dalias @trademark @GossiTheDog the hashes are of advisories they claim they will publish in the future afaik, not patches.

                  azonenberg@ioc.exchangeA This user is from outside of this forum
                  azonenberg@ioc.exchangeA This user is from outside of this forum
                  azonenberg@ioc.exchange
                  wrote last edited by
                  #42

                  @dalias @trademark @GossiTheDog so easily verifiable if they actually turn up but the hype cycle will have moved on by then and they already got the PR benefit of claiming a huge number of bugs

                  T 1 Reply Last reply
                  0
                  • agowa338@chaos.socialA agowa338@chaos.social

                    @GossiTheDog

                    Well cybersecurity is over but not because of this but because of everyone and their mother deploying openclaw in production...

                    drwho@masto.hackers.townD This user is from outside of this forum
                    drwho@masto.hackers.townD This user is from outside of this forum
                    drwho@masto.hackers.town
                    wrote last edited by
                    #43

                    @agowa338 @GossiTheDog And anybody with a lick of knowledge about security getting laid off.

                    1 Reply Last reply
                    0
                    • wall_e@ioc.exchangeW wall_e@ioc.exchange

                      @GossiTheDog but other than that... yeah hype-marketing playbook 101.

                      Didn't OpenAI pull the:"oh no it's too powerful, humanity couldn't take it yet so we're not releasing it to the public", stunt with one of their earlier models as well?^^

                      drwho@masto.hackers.townD This user is from outside of this forum
                      drwho@masto.hackers.townD This user is from outside of this forum
                      drwho@masto.hackers.town
                      wrote last edited by
                      #44

                      @wall_e @GossiTheDog Yep.

                      1 Reply Last reply
                      0
                      • azonenberg@ioc.exchangeA azonenberg@ioc.exchange

                        @dalias @trademark @GossiTheDog so easily verifiable if they actually turn up but the hype cycle will have moved on by then and they already got the PR benefit of claiming a huge number of bugs

                        T This user is from outside of this forum
                        T This user is from outside of this forum
                        trademark@fosstodon.org
                        wrote last edited by
                        #45

                        @azonenberg @dalias @GossiTheDog I think it will be a big deal if they don't keep their promises. It's the sort of thing journalists will use for attack pieces. We do already know that some of the bugs are real, for instance Anthropic is keeping the exploit for CVE-2026-4747 secret, but somebody else used public version of Claude to create their own working exploit: https://blog.calif.io/p/mad-bugs-claude-wrote-a-full-freebsd

                        dalias@hachyderm.ioD 1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                          What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                          It's not though, is it?

                          mkoek@mastodon.nlM This user is from outside of this forum
                          mkoek@mastodon.nlM This user is from outside of this forum
                          mkoek@mastodon.nl
                          wrote last edited by
                          #46

                          @GossiTheDog They’re doing the right thing with responsible disclosure, but omg they’re full of themselves. Zero days are not part of the daily cybersecurity churn to begin with, at all, but even so what they’ve found is unimpressive. Yet they literally take it as a given that they’ve turned the industry upside-down. Quod effing none.

                          1 Reply Last reply
                          0
                          • T trademark@fosstodon.org

                            @azonenberg @dalias @GossiTheDog I think it will be a big deal if they don't keep their promises. It's the sort of thing journalists will use for attack pieces. We do already know that some of the bugs are real, for instance Anthropic is keeping the exploit for CVE-2026-4747 secret, but somebody else used public version of Claude to create their own working exploit: https://blog.calif.io/p/mad-bugs-claude-wrote-a-full-freebsd

                            dalias@hachyderm.ioD This user is from outside of this forum
                            dalias@hachyderm.ioD This user is from outside of this forum
                            dalias@hachyderm.io
                            wrote last edited by
                            #47

                            @trademark @azonenberg @GossiTheDog I love how they hype what's a vuln in the in-kernel NFS server (FFS we've been doing this shit at least 2/3 of my lifetime, stop doing NFS/sunrpc shit already) as "FreeBSD RCE".

                            I knew when I was like 15 that you don't run NFS unless you want to get popped.

                            T 1 Reply Last reply
                            0
                            • dalias@hachyderm.ioD dalias@hachyderm.io

                              @trademark @azonenberg @GossiTheDog I love how they hype what's a vuln in the in-kernel NFS server (FFS we've been doing this shit at least 2/3 of my lifetime, stop doing NFS/sunrpc shit already) as "FreeBSD RCE".

                              I knew when I was like 15 that you don't run NFS unless you want to get popped.

                              T This user is from outside of this forum
                              T This user is from outside of this forum
                              trademark@fosstodon.org
                              wrote last edited by
                              #48

                              @dalias @azonenberg @GossiTheDog To summarize your position: "If Anthropic witholds something to give defenders time to fix it, it means they're lying and have nothing. When they do release a real bug it means that it was for some stupid thing you shouldn't be running anyway." Got it.

                              dalias@hachyderm.ioD 1 Reply Last reply
                              0
                              • T trademark@fosstodon.org

                                @dalias @azonenberg @GossiTheDog To summarize your position: "If Anthropic witholds something to give defenders time to fix it, it means they're lying and have nothing. When they do release a real bug it means that it was for some stupid thing you shouldn't be running anyway." Got it.

                                dalias@hachyderm.ioD This user is from outside of this forum
                                dalias@hachyderm.ioD This user is from outside of this forum
                                dalias@hachyderm.io
                                wrote last edited by
                                #49

                                @trademark @azonenberg @GossiTheDog Huh? Did your LLM just vomit that? Because it's completely unrelated to what I said.

                                What I said is that they're hyping a vuln in one small thing, an NFS server, that FreeBSD happens to have a version of that runs in kernelspace, that nobody security-conscious would be using to begin with, and calling it "vuln in FreeBSD!" to make it sound important and impressive.

                                Absolutely nothing to do with disclosure timeines or whether their findings are real.

                                T 1 Reply Last reply
                                0
                                • dalias@hachyderm.ioD dalias@hachyderm.io

                                  @trademark @azonenberg @GossiTheDog Huh? Did your LLM just vomit that? Because it's completely unrelated to what I said.

                                  What I said is that they're hyping a vuln in one small thing, an NFS server, that FreeBSD happens to have a version of that runs in kernelspace, that nobody security-conscious would be using to begin with, and calling it "vuln in FreeBSD!" to make it sound important and impressive.

                                  Absolutely nothing to do with disclosure timeines or whether their findings are real.

                                  T This user is from outside of this forum
                                  T This user is from outside of this forum
                                  trademark@fosstodon.org
                                  wrote last edited by
                                  #50

                                  @dalias @azonenberg @GossiTheDog Let me try explaining more clearly: Anthropic does this to demonstrate the technical capabilities of their new model. Your denigration of the utility of the FreeBSD NFS-server does not detract from that in the slightest, so Anthropic and their customers are not going to care in the slightest. You're being rather insulting to FreeBSD though, is that intentional?

                                  dalias@hachyderm.ioD 1 Reply Last reply
                                  0
                                  • T trademark@fosstodon.org

                                    @dalias @azonenberg @GossiTheDog Let me try explaining more clearly: Anthropic does this to demonstrate the technical capabilities of their new model. Your denigration of the utility of the FreeBSD NFS-server does not detract from that in the slightest, so Anthropic and their customers are not going to care in the slightest. You're being rather insulting to FreeBSD though, is that intentional?

                                    dalias@hachyderm.ioD This user is from outside of this forum
                                    dalias@hachyderm.ioD This user is from outside of this forum
                                    dalias@hachyderm.io
                                    wrote last edited by
                                    #51

                                    @trademark @azonenberg @GossiTheDog They do this to impress investors/C-suites and to keep the grift train going.

                                    I'm not going to address any claims about whether the "technical capabilities of their new model" are a thing.

                                    And to be impressive, yes, they need the thing they attack to be highly regarded in terms of its reputation for security and quality. "Vuln in NFS server module that runs on FreeBSD" does not impress. "Vuln in FreeBSD" does. And it's a lie.

                                    I have no idea how you think this is "insulting to FreeBSD".

                                    T 1 Reply Last reply
                                    0
                                    • dalias@hachyderm.ioD dalias@hachyderm.io

                                      @trademark @azonenberg @GossiTheDog They do this to impress investors/C-suites and to keep the grift train going.

                                      I'm not going to address any claims about whether the "technical capabilities of their new model" are a thing.

                                      And to be impressive, yes, they need the thing they attack to be highly regarded in terms of its reputation for security and quality. "Vuln in NFS server module that runs on FreeBSD" does not impress. "Vuln in FreeBSD" does. And it's a lie.

                                      I have no idea how you think this is "insulting to FreeBSD".

                                      T This user is from outside of this forum
                                      T This user is from outside of this forum
                                      trademark@fosstodon.org
                                      wrote last edited by
                                      #52

                                      @dalias @azonenberg @GossiTheDog You're saying nobody should run the NFS-server they are making. How is that not insulting? Why don't you go to their mailing lists and tell them to stop? For extra effect repeat the phrase you used: "I knew when I was like 15 that you don't run NFS unless you want to get popped."

                                      dalias@hachyderm.ioD 1 Reply Last reply
                                      0
                                      • T trademark@fosstodon.org

                                        @dalias @azonenberg @GossiTheDog You're saying nobody should run the NFS-server they are making. How is that not insulting? Why don't you go to their mailing lists and tell them to stop? For extra effect repeat the phrase you used: "I knew when I was like 15 that you don't run NFS unless you want to get popped."

                                        dalias@hachyderm.ioD This user is from outside of this forum
                                        dalias@hachyderm.ioD This user is from outside of this forum
                                        dalias@hachyderm.io
                                        wrote last edited by
                                        #53

                                        @trademark @azonenberg @GossiTheDog I don't know the project dynamics of this NFS server module, but I doubt it's something core folks are proud of. NFS is basically a domain of meeting very old legacy requirements, and for old die-hard Sun fans who run it by choice. Back in the day it had utterly zero access control. You just told the server "hey, I'm root" and it said "ok, cool". AIUI the vuln here is in part of an authentication layer bolted on.

                                        T 1 Reply Last reply
                                        0
                                        • dalias@hachyderm.ioD dalias@hachyderm.io

                                          @trademark @azonenberg @GossiTheDog I don't know the project dynamics of this NFS server module, but I doubt it's something core folks are proud of. NFS is basically a domain of meeting very old legacy requirements, and for old die-hard Sun fans who run it by choice. Back in the day it had utterly zero access control. You just told the server "hey, I'm root" and it said "ok, cool". AIUI the vuln here is in part of an authentication layer bolted on.

                                          T This user is from outside of this forum
                                          T This user is from outside of this forum
                                          trademark@fosstodon.org
                                          wrote last edited by
                                          #54

                                          @dalias @azonenberg @GossiTheDog You are being incredibly rude and even more ignorant. FreeBSD support latest NFSv4 including Kerberos encryption and authentication. if you don't believe me ask on the relevant mailing list. Though if you do I recommend you tone down your rudeness.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups