Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos.

Scheduled Pinned Locked Moved Uncategorized
23 Posts 10 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • viss@mastodon.socialV viss@mastodon.social

    @dangoodin considering the mythos papers that anthropic wrote which said they found hundreds, mozilla confirming less than 10% of those seems to me like a desperate grasping at straws by anthropic to somehow prove they werent lying through their teeth with their writeup

    mattdm@hachyderm.ioM This user is from outside of this forum
    mattdm@hachyderm.ioM This user is from outside of this forum
    mattdm@hachyderm.io
    wrote last edited by
    #8

    @Viss @dangoodin

    That's... not what the linked article says at all. They're making a few public early, but they did indeed find hundreds.

    viss@mastodon.socialV 1 Reply Last reply
    0
    • mattdm@hachyderm.ioM mattdm@hachyderm.io

      @Viss @dangoodin

      That's... not what the linked article says at all. They're making a few public early, but they did indeed find hundreds.

      viss@mastodon.socialV This user is from outside of this forum
      viss@mastodon.socialV This user is from outside of this forum
      viss@mastodon.social
      wrote last edited by
      #9

      @mattdm @dangoodin have you read this?

      Link Preview Image
      The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin

      favicon

      (www.flyingpenguin.com)

      mattdm@hachyderm.ioM 1 Reply Last reply
      0
      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

        Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

        Link Preview Image
        Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

        New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

        favicon

        Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

        nihilistic_capybara@layer8.spaceN This user is from outside of this forum
        nihilistic_capybara@layer8.spaceN This user is from outside of this forum
        nihilistic_capybara@layer8.space
        wrote last edited by
        #10

        @dangoodin second that. Sharing for visibility

        1 Reply Last reply
        0
        • viss@mastodon.socialV viss@mastodon.social

          @mattdm @dangoodin have you read this?

          Link Preview Image
          The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin

          favicon

          (www.flyingpenguin.com)

          mattdm@hachyderm.ioM This user is from outside of this forum
          mattdm@hachyderm.ioM This user is from outside of this forum
          mattdm@hachyderm.io
          wrote last edited by
          #11

          @Viss @dangoodin

          Yes. And I also read the Mozilla post linked above.

          viss@mastodon.socialV 1 Reply Last reply
          0
          • mattdm@hachyderm.ioM mattdm@hachyderm.io

            @Viss @dangoodin

            Yes. And I also read the Mozilla post linked above.

            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.socialV This user is from outside of this forum
            viss@mastodon.social
            wrote last edited by
            #12

            @mattdm @dangoodin and youre ok with anthropics approach here where they disable protections so their new flagship model can pump the numbers? and youre ok with how older models can find the same bug? and theres no gell-mann amnesia going on here?

            mattdm@hachyderm.ioM 1 Reply Last reply
            0
            • viss@mastodon.socialV viss@mastodon.social

              @mattdm @dangoodin and youre ok with anthropics approach here where they disable protections so their new flagship model can pump the numbers? and youre ok with how older models can find the same bug? and theres no gell-mann amnesia going on here?

              mattdm@hachyderm.ioM This user is from outside of this forum
              mattdm@hachyderm.ioM This user is from outside of this forum
              mattdm@hachyderm.io
              wrote last edited by
              #13

              @Viss @dangoodin

              I'm not saying any of those things, and neither does the Mozilla post.

              viss@mastodon.socialV 1 Reply Last reply
              0
              • mattdm@hachyderm.ioM mattdm@hachyderm.io

                @Viss @dangoodin

                I'm not saying any of those things, and neither does the Mozilla post.

                viss@mastodon.socialV This user is from outside of this forum
                viss@mastodon.socialV This user is from outside of this forum
                viss@mastodon.social
                wrote last edited by
                #14

                @mattdm @dangoodin but its all written about the same effort. anthroipics writeup and now this one, as well as the flying penguin post. theyre all about the same thing, and they are very very starkly different

                1 Reply Last reply
                0
                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                  Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

                  Link Preview Image
                  Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

                  New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

                  favicon

                  Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

                  psysal@mastodon.socialP This user is from outside of this forum
                  psysal@mastodon.socialP This user is from outside of this forum
                  psysal@mastodon.social
                  wrote last edited by
                  #15

                  @dangoodin I looked at the first one and although I don't know the codebase at all so am missing context, I think I understand it partly (I am a good c++ programmer ) and it certainly looks real to me. There is also discussion on the bugzilla where a developer acknowledges they introduced the bug when doing code cleanup.

                  1 Reply Last reply
                  0
                  • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                    @dangoodin I... 12 is not a bad number but like...

                    Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

                    if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

                    Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

                    this sound straight up off of a entry-level "advertising 101" book...

                    also I looked at some of the bug repports and... meh

                    passocacornio@tech.lgbtP This user is from outside of this forum
                    passocacornio@tech.lgbtP This user is from outside of this forum
                    passocacornio@tech.lgbt
                    wrote last edited by
                    #16

                    @dangoodin if anyone wanna know what I feel about the reports I read

                    :ms_purple_potion: Passoca Witch :v_enby: :ms_purple_potion: (@passocacornio@tech.lgbt)

                    Content warning: mozila, antropic

                    favicon

                    LGBTQIA+ and Tech (tech.lgbt)

                    1 Reply Last reply
                    0
                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                      Mozilla has provided behind-the-scenes details on the 271 vulnerabilities it discovered with the help of Mythos. Those details include full Bugzilla reports on 12 of the vulnerabilities. I'd be curious for people to look at the reports and hear what they think.

                      Link Preview Image
                      Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

                      New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

                      favicon

                      Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

                      mhitza@third-party.cyouM This user is from outside of this forum
                      mhitza@third-party.cyouM This user is from outside of this forum
                      mhitza@third-party.cyou
                      wrote last edited by
                      #17

                      @dangoodin half of a continuation of a report, and half a tech blog discussing the internal security harnessing. Strange to read how it switched between the two and answering interesting questions in the FAQ.

                      I find confusing the fact that I couldn't find a list for all the invidually tracked bugs (?). Even though they are "rolled up"/grouped under a single CVE, they are tracked individually and that would be a more interesting thing to look at.

                      And I'm really surprised about the no. of fixed bugs graph, especially for April. How could they handle that jump in volume? More people working on Firefox? More focus on security than other work? "Looks good to me" merges?

                      1 Reply Last reply
                      0
                      • R relay@relay.publicsquare.global shared this topic
                      • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                        @dangoodin I... 12 is not a bad number but like...

                        Note that a number of these bugs are sandbox escapes, which would need to be combined with other exploits to achieve a full-chain Firefox compromise

                        if they had paid the 20k to a professional code auditor they would have found more... dangerous and relevant exploits

                        Anyone building software can start using a harness with a modern model to find bugs and harden their code today. We recommend getting started now. You will find bugs, and you will set yourself up to take advantage of new models as soon as they become available.

                        this sound straight up off of a entry-level "advertising 101" book...

                        also I looked at some of the bug repports and... meh

                        michaelh@fosstodon.orgM This user is from outside of this forum
                        michaelh@fosstodon.orgM This user is from outside of this forum
                        michaelh@fosstodon.org
                        wrote last edited by
                        #18

                        @passocacornio @dangoodin
                        Its hard to judge without all of them. 12 is what was released.

                        passocacornio@tech.lgbtP dangoodin@infosec.exchangeD michaelh@fosstodon.orgM 3 Replies Last reply
                        0
                        • michaelh@fosstodon.orgM michaelh@fosstodon.org

                          @passocacornio @dangoodin
                          Its hard to judge without all of them. 12 is what was released.

                          passocacornio@tech.lgbtP This user is from outside of this forum
                          passocacornio@tech.lgbtP This user is from outside of this forum
                          passocacornio@tech.lgbt
                          wrote last edited by
                          #19

                          @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

                          dangoodin@infosec.exchangeD 1 Reply Last reply
                          0
                          • michaelh@fosstodon.orgM michaelh@fosstodon.org

                            @passocacornio @dangoodin
                            Its hard to judge without all of them. 12 is what was released.

                            dangoodin@infosec.exchangeD This user is from outside of this forum
                            dangoodin@infosec.exchangeD This user is from outside of this forum
                            dangoodin@infosec.exchange
                            wrote last edited by
                            #20

                            @michaelh @passocacornio

                            Yes, that's true. What I want to know is, what's the quality of the 12?

                            1 Reply Last reply
                            0
                            • passocacornio@tech.lgbtP passocacornio@tech.lgbt

                              @michaelh @dangoodin since this one is more of an advertising piece than an actual post-morten... those are the best ones they could find

                              dangoodin@infosec.exchangeD This user is from outside of this forum
                              dangoodin@infosec.exchangeD This user is from outside of this forum
                              dangoodin@infosec.exchange
                              wrote last edited by
                              #21

                              @passocacornio @michaelh

                              OK, assuming that's true, what's the quality of them?

                              passocacornio@tech.lgbtP 1 Reply Last reply
                              0
                              • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                @passocacornio @michaelh

                                OK, assuming that's true, what's the quality of them?

                                passocacornio@tech.lgbtP This user is from outside of this forum
                                passocacornio@tech.lgbtP This user is from outside of this forum
                                passocacornio@tech.lgbt
                                wrote last edited by
                                #22

                                @dangoodin @michaelh i... posted my actual impression of the reports on a companion toot its linked in this toot

                                1 Reply Last reply
                                0
                                • michaelh@fosstodon.orgM michaelh@fosstodon.org

                                  @passocacornio @dangoodin
                                  Its hard to judge without all of them. 12 is what was released.

                                  michaelh@fosstodon.orgM This user is from outside of this forum
                                  michaelh@fosstodon.orgM This user is from outside of this forum
                                  michaelh@fosstodon.org
                                  wrote last edited by
                                  #23

                                  @passocacornio @dangoodin If some large precentage of those 271 reports is sandbox escapes and they all got patched there is a decent chance of breaking an in the wild exploit campaign.

                                  1 Reply Last reply
                                  0
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups