<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability.]]></title><description><![CDATA[<p>Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. Do you think this makes offense or defense harder? Like, seems like everyone might have to go through a battery of automated checks before deploying stuff into the world.</p>]]></description><link>https://board.circlewithadot.net/topic/7b027a9e-04ef-48cc-ac91-842cc7654140/hey-cybersecurity-geeks-so-it-seems-like-anthropic-now-has-really-good-exploit-detection-ability.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 07:20:17 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/7b027a9e-04ef-48cc-ac91-842cc7654140.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 07 Apr 2026 22:19:00 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 17:41:10 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> Depends, it will favour defense in the case of high-value targets with a well-resourced, competent security-team. E.g. Apple defending their iPhones should be able to address issues better than today. Targets which today are secure because nobody has yet gotten around to looking are going to be in trouble...</p>]]></description><link>https://board.circlewithadot.net/post/https://fosstodon.org/users/trademark/statuses/116370313715204438</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://fosstodon.org/users/trademark/statuses/116370313715204438</guid><dc:creator><![CDATA[trademark@fosstodon.org]]></dc:creator><pubDate>Wed, 08 Apr 2026 17:41:10 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 17:40:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/david_chisnall%40infosec.exchange">@<span>david_chisnall</span></a></span> I just squint and say "Gödel's incompleteness theorems" whenever thinking about these</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/malwareminigun/statuses/116370310222878696</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/malwareminigun/statuses/116370310222878696</guid><dc:creator><![CDATA[malwareminigun@infosec.exchange]]></dc:creator><pubDate>Wed, 08 Apr 2026 17:40:16 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 09:28:21 GMT]]></title><description><![CDATA[<p><span><a href="/user/paulf%40mastodon.bsd.cafe" rel="nofollow noopener">@<span>paulf</span></a></span> <span><a href="/user/zachweinersmith%40mastodon.social" rel="nofollow noopener">@<span>ZachWeinersmith</span></a></span> </p><p>I didn't talk about dynamic analysis, but it has a bunch of different tradeoffs.</p><p>In general, dynamic analysis (valgrind, sanitisers, and so on) has a very low false positive rate because every code path that it sees <em>really is a code path that is reachable in a program run</em>.  At the same time, it also has a higher false negative rate.  Most security vulnerabilities come from a case where an attacker provides some unusual input.  Dynamic analysis tools will often only ever see the behaviour of the program with expected (not necessarily <em>correct</em>) inputs.</p><p>The combination of fuzzing (provide a load of different unexpected inputs, with some feedback to try to find corner cases in execution) works nicely, but also hits combinatorial problems.  Even if you have 100% line coverage, some bugs manifest only if lines are hit in a specific order, or even if two threads do the same thing at the same time.  These approaches can never tell you that bugs <em>aren't</em> present, only that they are.</p><p>TL;DR: Dynamic analysis can be sound but not complete.  Static analysis can be complete but not sound.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/david_chisnall/statuses/116368375897282202</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/david_chisnall/statuses/116368375897282202</guid><dc:creator><![CDATA[david_chisnall@infosec.exchange]]></dc:creator><pubDate>Wed, 08 Apr 2026 09:28:21 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 09:16:37 GMT]]></title><description><![CDATA[<p><span><a href="/user/david_chisnall%40infosec.exchange">@<span>david_chisnall</span></a></span> <span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> </p><p>"The bug I found a little while ago in some MISRA C code was of that form: their analyser had found it, someone had determined it was not a bug, and they were wrong."</p><p>It's not just static analysis. Valgrind memcheck has a low false positive rate. For some reason many people seem to believe that if their program does not crash every time on their machine then it must be infallibly and absolutely correct. They might then report a "bug" or seek confirmation of the "false positive" that they have found.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.bsd.cafe/ap/users/115656289862274221/statuses/116368329779854641</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.bsd.cafe/ap/users/115656289862274221/statuses/116368329779854641</guid><dc:creator><![CDATA[paulf@mastodon.bsd.cafe]]></dc:creator><pubDate>Wed, 08 Apr 2026 09:16:37 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 07:21:05 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social" rel="nofollow noopener">@<span>ZachWeinersmith</span></a></span> </p><p>The original Coverity paper found over 300 bugs, most of which had security implications. Static analysis has been great at finding exploitable vulnerabilities for a long time. This is a new approach to doing static analysis.</p><p>The biggest problem is always the false positive rate. If you run a tool and it finds a load of vulnerabilities, that’s great. Except you run the same tool and it <em>also</em> finds a load of things that look like vulnerabilities, but aren’t. So now you have to triage them and that takes effort. You also need to add annotations to silence the ones that aren’t real. With deterministic analysers, you can often provide some extra information (e.g. parameter attributes) that allow this information to be tracked across an analysis boundary.  BCMC has a lot of these. But with a probabilistic tool, these may or may not work. So you’re left with just slapping on an annotation that says ‘ignore the warning here’. The bug I found a little while ago in some MISRA C code was of that form: their analyser had found it, someone had determined it was not a bug, and they were wrong.</p><p>For a defender, if you spend too much time looking at and discounting false positives, you can improve code quality better with something else. I’ve only looked at a few of the bugs Claude reported, but one was a missing bounds check that wasn’t actually a vulnerability because the bounds were checked in the caller. Its fix made things slower, but not less exploitable. A good static analyser would have had a tool for annotating the function parameter to say ‘this is always at least n bytes’ and then checked that callers did this check. Claude has nothing like this because it doesn’t actually have a model of how code executes, it just has a set of probabilities for what exploitable code looks like. Unfortunately (and this is one of the problems with C), correct and vulnerable code can look exactly the same with different call stacks.</p><p>The second problem is the asymmetry. To be secure, you need to investigate <em>and fix</em> all of the vulnerabilities that tools can find. For an attacker, you just need one vulnerability. The ROI for attackers is much higher. Imagine a tool with a 90% false positive rate that finds 1,000 vulnerability-shaped objects. An attacker who triages 6-7 of them has around a 50% chance of finding an attack that they can use.  A defender who does the same amount of work has a 50% chance of reducing the number of vulnerabilities discoverable by attackers using this or similar tools by 1%.</p><p>This is why I build things that deterministically prevent classes of vulnerabilities from being exploitable.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/david_chisnall/statuses/116367875459225050</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/david_chisnall/statuses/116367875459225050</guid><dc:creator><![CDATA[david_chisnall@infosec.exchange]]></dc:creator><pubDate>Wed, 08 Apr 2026 07:21:05 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 05:49:37 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span><br />First of all, it's going to make Anthropic richer, because both sides will use it more.<br />But hear me out: If their detection ability really was so good - why did the <a href="https://mstdn.social/tags/ClaudeCodeLeak" rel="tag">#<span>ClaudeCodeLeak</span></a> immediately result in several high-profile vulnerabilities found? E.g.<br /><a href="https://phoenix.security/claude-code-leak-to-vulnerability-three-cves-in-claude-code-cli-and-the-chain-that-connects-them/" rel="nofollow noopener"><span>https://</span><span>phoenix.security/claude-code-l</span><span>eak-to-vulnerability-three-cves-in-claude-code-cli-and-the-chain-that-connects-them/</span></a><br /><a href="https://mstdn.social/tags/InsecureAI" rel="tag">#<span>InsecureAI</span></a> <a href="https://mstdn.social/tags/Infosec" rel="tag">#<span>Infosec</span></a> <a href="https://mstdn.social/tags/ClaudeCode" rel="tag">#<span>ClaudeCode</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://mstdn.social/users/schmidt_fu/statuses/116367515802818197</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mstdn.social/users/schmidt_fu/statuses/116367515802818197</guid><dc:creator><![CDATA[schmidt_fu@mstdn.social]]></dc:creator><pubDate>Wed, 08 Apr 2026 05:49:37 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 03:13:15 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> </p><p>Statistical models are inherently unreliable, but, "...remember we have only to be lucky once, you will have to be lucky always. "(*)</p><p>But Anthropic will happily sell you all the attempts you want to see if it can find the bug somebody else will use to rock your shit before they do the same.  Better buy some tokens!</p><p>(* - The IRA reminding Thacher of a fundamental advantage of asymetrical warfare - <a href="https://en.wikipedia.org/wiki/Brighton_hotel_bombing" rel="nofollow noopener"><span>https://</span><span>en.wikipedia.org/wiki/Brighton</span><span>_hotel_bombing</span></a> )</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.online/users/Orb2069/statuses/116366900976135455</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.online/users/Orb2069/statuses/116366900976135455</guid><dc:creator><![CDATA[orb2069@mastodon.online]]></dc:creator><pubDate>Wed, 08 Apr 2026 03:13:15 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 00:19:43 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> Meanwhile in open source, this is just going to further tax and then kill bug bounty programs from amateurs willing to pay for these LLM tools in the hopes of easy cash. PRs get harder to prioritize without real people investing time in them. Any PRs that get ignored hard enough become free attack writeups for the less scrupulous.</p>]]></description><link>https://board.circlewithadot.net/post/https://smeap.com/users/max/statuses/116366218573255744</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://smeap.com/users/max/statuses/116366218573255744</guid><dc:creator><![CDATA[max@smeap.com]]></dc:creator><pubDate>Wed, 08 Apr 2026 00:19:43 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 00:19:42 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> But these new tools are also going to be just expensive enough that not just are devs going to want to solely rely on them, business people are going to want to empty the rest of the stables, including the jobs of the people good at finding and solving the novel problems.</p>]]></description><link>https://board.circlewithadot.net/post/https://smeap.com/users/max/statuses/116366218550792395</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://smeap.com/users/max/statuses/116366218550792395</guid><dc:creator><![CDATA[max@smeap.com]]></dc:creator><pubDate>Wed, 08 Apr 2026 00:19:42 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 00:19:42 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> I think it is going to make defense harder in the long run. A lot of these automated checks existed before but were well known to be hindsight-oriented (won’t find truly novel things, just the simplest variations of past mistakes) and imprecise (makes mistakes in both directions). These new ones give more illusions of novelty and precision. Devs will rely on them as their only investigation, not one in a stable full.</p>]]></description><link>https://board.circlewithadot.net/post/https://smeap.com/users/max/statuses/116366218523921789</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://smeap.com/users/max/statuses/116366218523921789</guid><dc:creator><![CDATA[max@smeap.com]]></dc:creator><pubDate>Wed, 08 Apr 2026 00:19:42 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Wed, 08 Apr 2026 00:10:16 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> All we've seen so far is a press release. With "AI" those should be taken cum grano salis.</p>]]></description><link>https://board.circlewithadot.net/post/https://tilde.zone/users/fivetonsflax/statuses/116366181450100255</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://tilde.zone/users/fivetonsflax/statuses/116366181450100255</guid><dc:creator><![CDATA[fivetonsflax@tilde.zone]]></dc:creator><pubDate>Wed, 08 Apr 2026 00:10:16 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Tue, 07 Apr 2026 23:24:50 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> makes defense harder, at least for now - LLM penetration testing is finding new attack vectors quickly but fixing them is hard and slow.</p><p>Example (possibly overblown but plausible): <a href="https://codewall.ai/blog/how-we-hacked-mckinseys-ai-platform" rel="nofollow noopener"><span>https://</span><span>codewall.ai/blog/how-we-hacked</span><span>-mckinseys-ai-platform</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://hachyderm.io/users/rantingnerd/statuses/116366002795946787</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://hachyderm.io/users/rantingnerd/statuses/116366002795946787</guid><dc:creator><![CDATA[rantingnerd@hachyderm.io]]></dc:creator><pubDate>Tue, 07 Apr 2026 23:24:50 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Tue, 07 Apr 2026 22:55:47 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> We already had fuzz testing and it didn't use $$$ RAM not to mention burn up the planet</p>]]></description><link>https://board.circlewithadot.net/post/https://hachyderm.io/users/davidr/statuses/116365888530301918</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://hachyderm.io/users/davidr/statuses/116365888530301918</guid><dc:creator><![CDATA[davidr@hachyderm.io]]></dc:creator><pubDate>Tue, 07 Apr 2026 22:55:47 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Tue, 07 Apr 2026 22:34:53 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> Both sides benefit - but all things considered, the blue team benefits a bit more for now. The challenge for defenders has always been being a small goalie tending a large net. AI makes the net a little smaller. For attackers their attacks are better in it's execution but not necessarily in it's novelty ie. phish are more believable, malicious executables fail less often. But AI is not innovating their existing attacks ie they are still trying to get a user to click a link. So while they get to take more shots, but their targets are shrinking.</p><p>In short - the advantage belongs to the defenders for now. </p><p>Caveat - organizations that haven't implemented security basics (user scoping, vulnerability management, asset inventories, etc) are at a significant disadvantage. </p><p>Apologies for the lengthy reply.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/chronovore/statuses/116365806351233261</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/chronovore/statuses/116365806351233261</guid><dc:creator><![CDATA[chronovore@infosec.exchange]]></dc:creator><pubDate>Tue, 07 Apr 2026 22:34:53 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Tue, 07 Apr 2026 22:34:24 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> I'm thinking that the ongoing flood of spurious bug reports will make it harder on the developers. Attackers only need find one that works, defenders have to shield against more possibilities.</p><p>That said, attackers may also have to evaluate that same large number of possible attack vectors so it may come out a wash. It's probably easier to fix a bug than to exploit it.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.novylen.net/users/rbos/statuses/116365804477292794</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.novylen.net/users/rbos/statuses/116365804477292794</guid><dc:creator><![CDATA[rbos@mastodon.novylen.net]]></dc:creator><pubDate>Tue, 07 Apr 2026 22:34:24 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Tue, 07 Apr 2026 22:27:51 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> </p><p>I think it's going to make AI-bros even more obnoxious when posting to bug trackers.</p>]]></description><link>https://board.circlewithadot.net/post/https://mas.to/users/pedro_mateus/statuses/116365778686823432</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mas.to/users/pedro_mateus/statuses/116365778686823432</guid><dc:creator><![CDATA[pedro_mateus@mas.to]]></dc:creator><pubDate>Tue, 07 Apr 2026 22:27:51 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Tue, 07 Apr 2026 22:26:23 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> That was already the case pre-"AI". Connecting something to the internet has meant 24/7 scans and attack attempts against all running services for a very long time.</p>]]></description><link>https://board.circlewithadot.net/post/https://mastodon.social/users/Sturmflut/statuses/116365772964625503</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://mastodon.social/users/Sturmflut/statuses/116365772964625503</guid><dc:creator><![CDATA[sturmflut@mastodon.social]]></dc:creator><pubDate>Tue, 07 Apr 2026 22:26:23 GMT</pubDate></item><item><title><![CDATA[Reply to Hey cybersecurity geeks-- so it seems like anthropic now has really good exploit detection ability. on Tue, 07 Apr 2026 22:22:06 GMT]]></title><description><![CDATA[<p><span><a href="/user/zachweinersmith%40mastodon.social">@<span>ZachWeinersmith</span></a></span> offense, as they have no moral qualms about using any tool available to them.</p>]]></description><link>https://board.circlewithadot.net/post/https://floss.social/users/LovesTha/statuses/116365756113228514</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://floss.social/users/LovesTha/statuses/116365756113228514</guid><dc:creator><![CDATA[lovestha@floss.social]]></dc:creator><pubDate>Tue, 07 Apr 2026 22:22:06 GMT</pubDate></item></channel></rss>