Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #Mythos finds a #curl vulnerability

#Mythos finds a #curl vulnerability

Scheduled Pinned Locked Moved Uncategorized
mythoscurl
60 Posts 41 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • quinn@social.circl.luQ quinn@social.circl.lu

    @kleisli @bagder
    if it's something like 10,000 euros a pop, it might not be worth security scans and reviews, except for governmental clients.

    0x0@hachyderm.io0 This user is from outside of this forum
    0x0@hachyderm.io0 This user is from outside of this forum
    0x0@hachyderm.io
    wrote last edited by
    #40

    @quinn

    Especially if it's subscription-based, as these models seem to be good at finding only specific sets of problems and then dry out, but even 10k per use is really gov or big corpo territory.

    @kleisli @bagder

    quinn@social.circl.luQ 1 Reply Last reply
    0
    • bagder@mastodon.socialB bagder@mastodon.social

      My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.

      redsakana@infosec.exchangeR This user is from outside of this forum
      redsakana@infosec.exchangeR This user is from outside of this forum
      redsakana@infosec.exchange
      wrote last edited by
      #41

      @bagder This suggests a fun exercise for someone interested in messing around with LLMs:

      1. Put back all the curl security issues previously found by LLM tools by dropping the fix commits from history or otherwise obfuscating the revert.

      2. Feed the re-vulnerabilized repo to a selection of models and see what are the cheapest ones (by memory, time and/or monetary cost) that can find, say, 50%/75%/100% of the issues found by the warehouse-scale "foundation models".

      Feels like a large part of the current results should be doable with significantly smaller resources, because being trained on every tweet and reddit post and libgen book ever is not obviously related to the task.

      utf_7@mastodon.socialU 1 Reply Last reply
      0
      • bagder@mastodon.socialB bagder@mastodon.social

        #Mythos finds a #curl vulnerability

        yes, as in singular one.

        Link Preview Image
        Mythos finds a curl vulnerability

        yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

        favicon

        daniel.haxx.se (daniel.haxx.se)

        eobet@oldbytes.spaceE This user is from outside of this forum
        eobet@oldbytes.spaceE This user is from outside of this forum
        eobet@oldbytes.space
        wrote last edited by
        #42

        @bagder great, so even the Linux Foundation are naming things after the ultimate evil of a famous franchise? (Final Fantasy in this instance.)

        1 Reply Last reply
        0
        • bagder@mastodon.socialB bagder@mastodon.social

          #Mythos finds a #curl vulnerability

          yes, as in singular one.

          Link Preview Image
          Mythos finds a curl vulnerability

          yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

          favicon

          daniel.haxx.se (daniel.haxx.se)

          phl@mastodon.socialP This user is from outside of this forum
          phl@mastodon.socialP This user is from outside of this forum
          phl@mastodon.social
          wrote last edited by
          #43

          @bagder “On average, every single production source code line of curl has been written (and then rewritten) 4.14 times.”

          curl is the ship of Theseus not once, not twice, but four times 😄

          1 Reply Last reply
          0
          • gnirre@mastodon.socialG gnirre@mastodon.social

            @bagder How do you explain that Mythos found 271 bugs in Firefox, and counting, and only 1 in cURL. Is the Firefox code base 271 times larger?

            4censord@unfug.social4 This user is from outside of this forum
            4censord@unfug.social4 This user is from outside of this forum
            4censord@unfug.social
            wrote last edited by
            #44

            @gnirre @bagder with the most glancing of looks, looking at the 150 version of firefox (and some rounding),
            curl: 200k lines of c
            firefox:

            • 5M lines of rust
            • 9M lines of C and C++
            • 200k lines of assembly
            • 2M lines of python

            so like, without looking at anything else, firefox is significantly bigger

            natanox@chaos.socialN 1 Reply Last reply
            0
            • km@mastodon.babb.noK km@mastodon.babb.no

              @bagder from my talks with people who had been given access to mythos in their org, they say it does find things which current tools miss, but also overlooks cases which current tools catch. so, yeah, to me it is "mostly marketing" combined with general FUD

              paco@infosec.exchangeP This user is from outside of this forum
              paco@infosec.exchangeP This user is from outside of this forum
              paco@infosec.exchange
              wrote last edited by
              #45

              @km As far as I can tell:

              • No one who has worked with raw Mythos output has ever written about it.
              • No one who has written about it has ever used it.

              They would much rather have @bagder writing about it because his opinion carries weight. That means he can’t have direct access. To give him access, they’d demand to gag him with an NDA, like everyone else who has access.

              This technique of making readers mentally fill in the gaps between what is verifiable and what is claimed is genius marketing and really dishonest. But we have come to expect systematic and casual dishonesty from these companies.

              km@mastodon.babb.noK 1 Reply Last reply
              0
              • paco@infosec.exchangeP paco@infosec.exchange

                @km As far as I can tell:

                • No one who has worked with raw Mythos output has ever written about it.
                • No one who has written about it has ever used it.

                They would much rather have @bagder writing about it because his opinion carries weight. That means he can’t have direct access. To give him access, they’d demand to gag him with an NDA, like everyone else who has access.

                This technique of making readers mentally fill in the gaps between what is verifiable and what is claimed is genius marketing and really dishonest. But we have come to expect systematic and casual dishonesty from these companies.

                km@mastodon.babb.noK This user is from outside of this forum
                km@mastodon.babb.noK This user is from outside of this forum
                km@mastodon.babb.no
                wrote last edited by
                #46

                @paco @bagder yeah, let me clarify: i talked with people who not themselves used mythos, but whose org was given access, so yeah, they just told something which they were told

                paco@infosec.exchangeP 1 Reply Last reply
                0
                • 4censord@unfug.social4 4censord@unfug.social

                  @gnirre @bagder with the most glancing of looks, looking at the 150 version of firefox (and some rounding),
                  curl: 200k lines of c
                  firefox:

                  • 5M lines of rust
                  • 9M lines of C and C++
                  • 200k lines of assembly
                  • 2M lines of python

                  so like, without looking at anything else, firefox is significantly bigger

                  natanox@chaos.socialN This user is from outside of this forum
                  natanox@chaos.socialN This user is from outside of this forum
                  natanox@chaos.social
                  wrote last edited by
                  #47

                  @4censord @gnirre @bagder Also, didn't they intentionally disable all mitigations, sandboxing etc. in Firefox *and* include every teeny tiny bug it found (without mentioning the false-positives, which were probably a metric shit ton) to bolster those numbers?

                  There were lots of shenanigans afaik.

                  1 Reply Last reply
                  0
                  • km@mastodon.babb.noK km@mastodon.babb.no

                    @paco @bagder yeah, let me clarify: i talked with people who not themselves used mythos, but whose org was given access, so yeah, they just told something which they were told

                    paco@infosec.exchangeP This user is from outside of this forum
                    paco@infosec.exchangeP This user is from outside of this forum
                    paco@infosec.exchange
                    wrote last edited by
                    #48

                    @km Yeah. I didn’t mean it personally. I wasn’t criticising what you said, I’m sorry if I sounded that way.

                    I was just pointing out this constant theme. The only thing that ever is made public is the fully-polished, human-vetted final result. They carefully hide all other details and the press don’t care.

                    @bagder

                    1 Reply Last reply
                    0
                    • 0x0@hachyderm.io0 0x0@hachyderm.io

                      @quinn

                      Especially if it's subscription-based, as these models seem to be good at finding only specific sets of problems and then dry out, but even 10k per use is really gov or big corpo territory.

                      @kleisli @bagder

                      quinn@social.circl.luQ This user is from outside of this forum
                      quinn@social.circl.luQ This user is from outside of this forum
                      quinn@social.circl.lu
                      wrote last edited by
                      #49

                      @0x0 @kleisli @bagder to be clear i picked that number out of my butt, but it is clear to me that it's going to be very hard to make up their investment in it, much less than the min 10x (which would probably be a couple trillion dollars)

                      1 Reply Last reply
                      0
                      • rugk@chaos.socialR This user is from outside of this forum
                        rugk@chaos.socialR This user is from outside of this forum
                        rugk@chaos.social
                        wrote last edited by
                        #50

                        @das_robin @oots @bagder maybe @firefoxnightly can comment on that

                        1 Reply Last reply
                        0
                        • bagder@mastodon.socialB bagder@mastodon.social

                          My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.

                          peteriskrisjanis@toot.lvP This user is from outside of this forum
                          peteriskrisjanis@toot.lvP This user is from outside of this forum
                          peteriskrisjanis@toot.lv
                          wrote last edited by
                          #51

                          @bagder 💯☝️this

                          1 Reply Last reply
                          0
                          • bagder@mastodon.socialB bagder@mastodon.social

                            My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.

                            rootwyrm@weird.autosR This user is from outside of this forum
                            rootwyrm@weird.autosR This user is from outside of this forum
                            rootwyrm@weird.autos
                            wrote last edited by
                            #52

                            @bagder it's all marketing. And any improvements are completely moot, as the actual *costs* to find that single bug were in the tens of thousands of dollars minimum. That's the MINIMUM known cost.
                            It would not surprise me if finding that one bug cost $75k, $100k, $200k of compute time. It's a pile of shit, hilariously inefficient slop that sometimes behaves as a fuzzer that occasionally finds a crumb.

                            1 Reply Last reply
                            0
                            • alterelefant@mastodontech.deA alterelefant@mastodontech.de

                              @bagder
                              At least it works. It would have been quite a disaster if it found zero.

                              totoroot@ibe.socialT This user is from outside of this forum
                              totoroot@ibe.socialT This user is from outside of this forum
                              totoroot@ibe.social
                              wrote last edited by
                              #53

                              @alterelefant@mastodontech.de @bagder@mastodon.social Are you a machine?
                              Classifying finding a single vulnerability (1) as success and 0 as failure sure seems like it
                              😁
                              The world is not black and white and the usefulness of LLMs for finding vulnerabilities IMO isn't either

                              alterelefant@mastodontech.deA 1 Reply Last reply
                              0
                              • totoroot@ibe.socialT totoroot@ibe.social

                                @alterelefant@mastodontech.de @bagder@mastodon.social Are you a machine?
                                Classifying finding a single vulnerability (1) as success and 0 as failure sure seems like it
                                😁
                                The world is not black and white and the usefulness of LLMs for finding vulnerabilities IMO isn't either

                                alterelefant@mastodontech.deA This user is from outside of this forum
                                alterelefant@mastodontech.deA This user is from outside of this forum
                                alterelefant@mastodontech.de
                                wrote last edited by
                                #54

                                @totoroot
                                I admit it is very binary.
                                @bagder

                                1 Reply Last reply
                                0
                                • redsakana@infosec.exchangeR redsakana@infosec.exchange

                                  @bagder This suggests a fun exercise for someone interested in messing around with LLMs:

                                  1. Put back all the curl security issues previously found by LLM tools by dropping the fix commits from history or otherwise obfuscating the revert.

                                  2. Feed the re-vulnerabilized repo to a selection of models and see what are the cheapest ones (by memory, time and/or monetary cost) that can find, say, 50%/75%/100% of the issues found by the warehouse-scale "foundation models".

                                  Feels like a large part of the current results should be doable with significantly smaller resources, because being trained on every tweet and reddit post and libgen book ever is not obviously related to the task.

                                  utf_7@mastodon.socialU This user is from outside of this forum
                                  utf_7@mastodon.socialU This user is from outside of this forum
                                  utf_7@mastodon.social
                                  wrote last edited by
                                  #55

                                  @redsakana @bagder

                                  llm tools found security issues in curl? doubt

                                  1 Reply Last reply
                                  0
                                  • peteriskrisjanis@toot.lvP This user is from outside of this forum
                                    peteriskrisjanis@toot.lvP This user is from outside of this forum
                                    peteriskrisjanis@toot.lv
                                    wrote last edited by
                                    #56

                                    @normis Normi, tu taču zini ka tas ir curl autors?

                                    1 Reply Last reply
                                    0
                                    • uint8_t@chaos.socialU This user is from outside of this forum
                                      uint8_t@chaos.socialU This user is from outside of this forum
                                      uint8_t@chaos.social
                                      wrote last edited by
                                      #57

                                      @das_robin @oots @bagder there was this blog post dismissing lots of the myth https://www.flyingpenguin.com/the-boy-that-cried-mythos-verification-is-collapsing-trust-in-anthropic/

                                      1 Reply Last reply
                                      0
                                      • bagder@mastodon.socialB bagder@mastodon.social

                                        #Mythos finds a #curl vulnerability

                                        yes, as in singular one.

                                        Link Preview Image
                                        Mythos finds a curl vulnerability

                                        yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

                                        favicon

                                        daniel.haxx.se (daniel.haxx.se)

                                        elgringomexicano@mastodon.socialE This user is from outside of this forum
                                        elgringomexicano@mastodon.socialE This user is from outside of this forum
                                        elgringomexicano@mastodon.social
                                        wrote last edited by
                                        #58

                                        @bagder I picked 10 in the poll to play it safe, but 1 was my second choice and I'm not surprised at all. Long live #curl .

                                        1 Reply Last reply
                                        0
                                        • bagder@mastodon.socialB bagder@mastodon.social

                                          #Mythos finds a #curl vulnerability

                                          yes, as in singular one.

                                          Link Preview Image
                                          Mythos finds a curl vulnerability

                                          yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

                                          favicon

                                          daniel.haxx.se (daniel.haxx.se)

                                          mikemcquaid@mastodon.socialM This user is from outside of this forum
                                          mikemcquaid@mastodon.socialM This user is from outside of this forum
                                          mikemcquaid@mastodon.social
                                          wrote last edited by
                                          #59

                                          @bagder This closely matches the experience Homebrew has also had with Mythos. Also one vulnerability found and in our case it was a pretty irrelevant one.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups