Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Scheduled Pinned Locked Moved Uncategorized
23 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

    Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

    Link Preview Image
    Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

    New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

    favicon

    Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

    passocacornio@tech.lgbtP This user is from outside of this forum
    passocacornio@tech.lgbtP This user is from outside of this forum
    passocacornio@tech.lgbt
    wrote last edited by
    #7

    @dangoodin I... 12 is not a bad number but like...

    Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

    if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

    Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

    this sound straight up off of a entry-level "advertising 101" book...

    also I looked at some of the bug repports and... meh

    passocacornio@tech.lgbtP michaelh@fosstodon.orgM 2 Replies Last reply
    0
    • viss@mastodon.socialV viss@mastodon.social

      @dangoodin considering the mythos papers that anthropic wrote which said they found hundreds, mozilla confirming less than 10% of those seems to me like a desperate grasping at straws by anthropic to somehow prove they werent lying through their teeth with their writeup

      mattdm@hachyderm.ioM This user is from outside of this forum
      mattdm@hachyderm.ioM This user is from outside of this forum
      mattdm@hachyderm.io
      wrote last edited by
      #8

      @Viss @dangoodin

      That's... not what the linked article says at all. They're making a few public early, but they did indeed find hundreds.

      viss@mastodon.socialV 1 Reply Last reply
      0
      • mattdm@hachyderm.ioM mattdm@hachyderm.io

        @Viss @dangoodin

        That's... not what the linked article says at all. They're making a few public early, but they did indeed find hundreds.

        viss@mastodon.socialV This user is from outside of this forum
        viss@mastodon.socialV This user is from outside of this forum
        viss@mastodon.social
        wrote last edited by
        #9

        @mattdm @dangoodin have you read this?

        Link Preview Image
        The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin

        favicon

        (www.flyingpenguin.com)

        mattdm@hachyderm.ioM 1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

          Link Preview Image
          Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

          New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

          favicon

          Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

          nihilistic_capybara@layer8.spaceN This user is from outside of this forum
          nihilistic_capybara@layer8.spaceN This user is from outside of this forum
          nihilistic_capybara@layer8.space
          wrote last edited by
          #10

          @dangoodin second that. Sharing for visibility

          1 Reply Last reply
          0
          • viss@mastodon.socialV viss@mastodon.social

            @mattdm @dangoodin have you read this?

            Link Preview Image
            The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin

            favicon

            (www.flyingpenguin.com)

            mattdm@hachyderm.ioM This user is from outside of this forum
            mattdm@hachyderm.ioM This user is from outside of this forum
            mattdm@hachyderm.io
            wrote last edited by
            #11

            @Viss @dangoodin

            Yes. And I also read the Mozilla post linked above.

            viss@mastodon.socialV 1 Reply Last reply
            0
            • mattdm@hachyderm.ioM mattdm@hachyderm.io

              @Viss @dangoodin

              Yes. And I also read the Mozilla post linked above.

              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.socialV This user is from outside of this forum
              viss@mastodon.social
              wrote last edited by
              #12

              @mattdm @dangoodin and youre ok with anthropics approach here where they disable protections so their new flagship model can pump the numbers? and youre ok with how older models can find the same bug? and theres no gell-mann amnesia going on here?

              mattdm@hachyderm.ioM 1 Reply Last reply
              0
              • viss@mastodon.socialV viss@mastodon.social

                @mattdm @dangoodin and youre ok with anthropics approach here where they disable protections so their new flagship model can pump the numbers? and youre ok with how older models can find the same bug? and theres no gell-mann amnesia going on here?

                mattdm@hachyderm.ioM This user is from outside of this forum
                mattdm@hachyderm.ioM This user is from outside of this forum
                mattdm@hachyderm.io
                wrote last edited by
                #13

                @Viss @dangoodin

                I'm not saying any of those things, and neither does the Mozilla post.

                viss@mastodon.socialV 1 Reply Last reply
                0
                • mattdm@hachyderm.ioM mattdm@hachyderm.io

                  @Viss @dangoodin

                  I'm not saying any of those things, and neither does the Mozilla post.

                  viss@mastodon.socialV This user is from outside of this forum
                  viss@mastodon.socialV This user is from outside of this forum
                  viss@mastodon.social
                  wrote last edited by
                  #14

                  @mattdm @dangoodin but its all written about the same effort. anthroipics writeup and now this one, as well as the flying penguin post. theyre all about the same thing, and they are very very starkly different

                  1 Reply Last reply
                  0
                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                    Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

                    Link Preview Image
                    Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

                    New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

                    favicon

                    Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

                    psysal@mastodon.socialP This user is from outside of this forum
                    psysal@mastodon.socialP This user is from outside of this forum
                    psysal@mastodon.social
                    wrote last edited by
                    #15

                    @dangoodin I looked at the first one and although I don't know the codebase at all so am missing context, I think I understand it partly (I am a good c++ programmer ) and it certainly looks real to me. There is also discussion on the bugzilla where a developer acknowledges they introduced the bug when doing code cleanup.

                    1 Reply Last reply
                    0
                    • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                      @dangoodin I... 12 is not a bad number but like...

                      Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

                      if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

                      Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

                      this sound straight up off of a entry-level "advertising 101" book...

                      also I looked at some of the bug repports and... meh

                      passocacornio@tech.lgbtP This user is from outside of this forum
                      passocacornio@tech.lgbtP This user is from outside of this forum
                      passocacornio@tech.lgbt
                      wrote last edited by
                      #16

                      @dangoodin if anyone wanna know what I feel about the reports I read

                      :ms_purple_potion: Passoca Witch :v_enby: :ms_purple_potion: (@passocacornio@tech.lgbt)

                      Content warning: mozila, antropic

                      favicon

                      LGBTQIA+ and Tech (tech.lgbt)

                      1 Reply Last reply
                      0
                      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                        Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

                        Link Preview Image
                        Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

                        New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

                        favicon

                        Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

                        mhitza@third-party.cyouM This user is from outside of this forum
                        mhitza@third-party.cyouM This user is from outside of this forum
                        mhitza@third-party.cyou
                        wrote last edited by
                        #17

                        @dangoodin half of a continuation of a report, and half a tech blog discussing the internal security harnessing. Strange to read how it switched between the two and answering interesting questions in the FAQ.

                        I find confusing the fact that I couldn't find a list for all the invidually tracked bugs (?). Even though they are "rolled up"/grouped under a single CVE, they are tracked individually and that would be a more interesting thing to look at.

                        And I'm really surprised about the no. of fixed bugs graph, especially for April. How could they handle that jump in volume? More people working on Firefox? More focus on security than other work? "Looks good to me" merges?

                        1 Reply Last reply
                        0
                        • R relay@relay.publicsquare.global shared this topic
                        • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                          @dangoodin I... 12 is not a bad number but like...

                          Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

                          if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

                          Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

                          this sound straight up off of a entry-level "advertising 101" book...

                          also I looked at some of the bug repports and... meh

                          michaelh@fosstodon.orgM This user is from outside of this forum
                          michaelh@fosstodon.orgM This user is from outside of this forum
                          michaelh@fosstodon.org
                          wrote last edited by
                          #18

                          @passocacornio @dangoodin
                          Its hard to judge without all of them. 12 is what was released.

                          passocacornio@tech.lgbtP dangoodin@infosec.exchangeD michaelh@fosstodon.orgM 3 Replies Last reply
                          0
                          • michaelh@fosstodon.orgM michaelh@fosstodon.org

                            @passocacornio @dangoodin
                            Its hard to judge without all of them. 12 is what was released.

                            passocacornio@tech.lgbtP This user is from outside of this forum
                            passocacornio@tech.lgbtP This user is from outside of this forum
                            passocacornio@tech.lgbt
                            wrote last edited by
                            #19

                            @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

                            dangoodin@infosec.exchangeD 1 Reply Last reply
                            0
                            • michaelh@fosstodon.orgM michaelh@fosstodon.org

                              @passocacornio @dangoodin
                              Its hard to judge without all of them. 12 is what was released.

                              dangoodin@infosec.exchangeD This user is from outside of this forum
                              dangoodin@infosec.exchangeD This user is from outside of this forum
                              dangoodin@infosec.exchange
                              wrote last edited by
                              #20

                              @michaelh @passocacornio

                              Yes, that's true. What I want to know is, what's the quality of the 12?

                              1 Reply Last reply
                              0
                              • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                                @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

                                dangoodin@infosec.exchangeD This user is from outside of this forum
                                dangoodin@infosec.exchangeD This user is from outside of this forum
                                dangoodin@infosec.exchange
                                wrote last edited by
                                #21

                                @passocacornio @michaelh

                                OK, assuming that's true, what's the quality of them?

                                passocacornio@tech.lgbtP 1 Reply Last reply
                                0
                                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                  @passocacornio @michaelh

                                  OK, assuming that's true, what's the quality of them?

                                  passocacornio@tech.lgbtP This user is from outside of this forum
                                  passocacornio@tech.lgbtP This user is from outside of this forum
                                  passocacornio@tech.lgbt
                                  wrote last edited by
                                  #22

                                  @dangoodin @michaelh i... posted my actual impression of the reports on a companion toot its linked in this toot

                                  1 Reply Last reply
                                  0
                                  • michaelh@fosstodon.orgM michaelh@fosstodon.org

                                    @passocacornio @dangoodin
                                    Its hard to judge without all of them. 12 is what was released.

                                    michaelh@fosstodon.orgM This user is from outside of this forum
                                    michaelh@fosstodon.orgM This user is from outside of this forum
                                    michaelh@fosstodon.org
                                    wrote last edited by
                                    #23

                                    @passocacornio @dangoodin If some large precentage of those 271 reports is sandbox escapes and they all got patched there is a decent chance of breaking an in the wild exploit campaign.

                                    1 Reply Last reply
                                    0
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • World
                                    • Users
                                    • Groups