Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm a little concerned about the general tech attitude towards the Mozilla bug findings.

I'm a little concerned about the general tech attitude towards the Mozilla bug findings.

Scheduled Pinned Locked Moved Uncategorized
71 Posts 28 Posters 71 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

    @en3py @cR0w
    Had a user just yesterday get all mad because we asked a few governance questions about turning on mcp in salesforce. "We have a policy!" "If you don't see the value of this then go fuck yourselves!" (rephrased).

    taffer@mastodon.gamedev.placeT This user is from outside of this forum
    taffer@mastodon.gamedev.placeT This user is from outside of this forum
    taffer@mastodon.gamedev.place
    wrote last edited by
    #53

    @FritzAdalis @cR0w @en3py I can’t use Thunderbird (or any IMAP client) for email at work because Security hasn’t done an eval. But we can enable every MCP in sight.

    fritzadalis@infosec.exchangeF 1 Reply Last reply
    0
    • taffer@mastodon.gamedev.placeT taffer@mastodon.gamedev.place

      @FritzAdalis @cR0w @en3py I can’t use Thunderbird (or any IMAP client) for email at work because Security hasn’t done an eval. But we can enable every MCP in sight.

      fritzadalis@infosec.exchangeF This user is from outside of this forum
      fritzadalis@infosec.exchangeF This user is from outside of this forum
      fritzadalis@infosec.exchange
      wrote last edited by
      #54

      @Taffer @cR0w @en3py
      Is there an mcp to imap adapter? (I was going to look, there probably is, but only despair lies that way.)

      taffer@mastodon.gamedev.placeT 1 Reply Last reply
      0
      • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

        @Taffer @cR0w @en3py
        Is there an mcp to imap adapter? (I was going to look, there probably is, but only despair lies that way.)

        taffer@mastodon.gamedev.placeT This user is from outside of this forum
        taffer@mastodon.gamedev.placeT This user is from outside of this forum
        taffer@mastodon.gamedev.place
        wrote last edited by
        #55

        @FritzAdalis @cR0w @en3py I love it, that’s terrible

        1 Reply Last reply
        0
        • R relay@relay.publicsquare.global shared this topic
        • crowbriarhexe@tech.lgbtC crowbriarhexe@tech.lgbt

          @mahryekuh @cR0w this is also the canonical “trans women are so resilient!” picture btw

          snowless@defcon.socialS This user is from outside of this forum
          snowless@defcon.socialS This user is from outside of this forum
          snowless@defcon.social
          wrote last edited by
          #56

          @crowbriarhexe @mahryekuh @cR0w Damn, this hit me hard.

          1 Reply Last reply
          0
          • cr0w@infosec.exchangeC cr0w@infosec.exchange

            I'm a little concerned about the general tech attitude towards the Mozilla bug findings. Yes, I'm an AI hater, so add that to the biases, but that's not really the point here.

            People seem excited about the fact that Mythos was used to find a bunch of security bugs in Firefox, which is cool:

            Link Preview Image
            Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

            New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

            favicon

            Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

            However, the general attitude seems to be that devs can keep pushing for more new things because some AI system will catch the bugs for them. But to me, there should be more concern about how there were so many previously unknown unfixed bugs in Firefox to begin with. These findings should be a cause for concern and give pause to evaluate how so many security bugs make it to prod. And I'm not just talking about Firefox, everyone should be learning from each other in this space.

            If nothing else, people celebrating the LLM-fueled bug findings should be recognizing just how much harm the whole Move Fast and Break Shit approach really creates rather than allowing the LLMs to be the excuse to move faster and break more shit.

            hsza@social.tudbut.deH This user is from outside of this forum
            hsza@social.tudbut.deH This user is from outside of this forum
            hsza@social.tudbut.de
            wrote last edited by
            #57

            @cR0w LLM chatbots are not fit for this purpose, or any purpose; if this was being done with purpose-built ML tools thatd be a different story, but all i see is an overblowing of hype around a horribly unethical “tool” that ensnares developers that have no ethics and additionally voids their qualifications to use their brains

            1 Reply Last reply
            0
            • cr0w@infosec.exchangeC cr0w@infosec.exchange

              I'm a little concerned about the general tech attitude towards the Mozilla bug findings. Yes, I'm an AI hater, so add that to the biases, but that's not really the point here.

              People seem excited about the fact that Mythos was used to find a bunch of security bugs in Firefox, which is cool:

              Link Preview Image
              Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

              New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

              favicon

              Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

              However, the general attitude seems to be that devs can keep pushing for more new things because some AI system will catch the bugs for them. But to me, there should be more concern about how there were so many previously unknown unfixed bugs in Firefox to begin with. These findings should be a cause for concern and give pause to evaluate how so many security bugs make it to prod. And I'm not just talking about Firefox, everyone should be learning from each other in this space.

              If nothing else, people celebrating the LLM-fueled bug findings should be recognizing just how much harm the whole Move Fast and Break Shit approach really creates rather than allowing the LLMs to be the excuse to move faster and break more shit.

              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchange
              wrote last edited by
              #58

              @cR0w Browsers are a bit interesting in terms of defining what actually is a security vulnerability. A modern browser's job is to download untrusted code from probably malicious people, run it, and not let them gain access to the host system. As a result, browsers (Firefox was late to the party by a very long time here, but they've done some very interesting work recently in this space) are some of the most aggressively compartmentalised software that exists. This means that most vulnerabilities in a browser are not exploitable by themselves, you need to chain a bunch of them together.

              I suspect there's some psychological effect here, that when you're writing code that you know runs sandboxed, you aren't quite as careful as you would normally be. But there's also a real effect that a lot of the vulnerabilities matter only as step 1 in a chain of several to get to any real kind of compromise that a user would care about.

              cr0w@infosec.exchangeC 1 Reply Last reply
              0
              • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                @cR0w Browsers are a bit interesting in terms of defining what actually is a security vulnerability. A modern browser's job is to download untrusted code from probably malicious people, run it, and not let them gain access to the host system. As a result, browsers (Firefox was late to the party by a very long time here, but they've done some very interesting work recently in this space) are some of the most aggressively compartmentalised software that exists. This means that most vulnerabilities in a browser are not exploitable by themselves, you need to chain a bunch of them together.

                I suspect there's some psychological effect here, that when you're writing code that you know runs sandboxed, you aren't quite as careful as you would normally be. But there's also a real effect that a lot of the vulnerabilities matter only as step 1 in a chain of several to get to any real kind of compromise that a user would care about.

                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchangeC This user is from outside of this forum
                cr0w@infosec.exchange
                wrote last edited by
                #59

                @david_chisnall That's fair, but to my point, it seems like if there is awareness of that whole idea that the main issue is dev attitude, finding out that a bunch of vulns made it to prod seems like the perfect opportunity to address that rather than just be happy there's a new bug finder that will very quickly hit a wall in its effectiveness.

                david_chisnall@infosec.exchangeD 1 Reply Last reply
                0
                • cr0w@infosec.exchangeC cr0w@infosec.exchange

                  @david_chisnall That's fair, but to my point, it seems like if there is awareness of that whole idea that the main issue is dev attitude, finding out that a bunch of vulns made it to prod seems like the perfect opportunity to address that rather than just be happy there's a new bug finder that will very quickly hit a wall in its effectiveness.

                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                  david_chisnall@infosec.exchangeD This user is from outside of this forum
                  david_chisnall@infosec.exchange
                  wrote last edited by
                  #60

                  @cR0w For comparison, Chromium averages one vulnerability every 1.5 days. The Linux kernel is similar.

                  So, yes, I think this is a problem, but it's far from specific to Firefox. Most programming practices came from a time when most software never operated on untrusted data. People are still taught to program as if that were true today.

                  cr0w@infosec.exchangeC 1 Reply Last reply
                  0
                  • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

                    @cR0w For comparison, Chromium averages one vulnerability every 1.5 days. The Linux kernel is similar.

                    So, yes, I think this is a problem, but it's far from specific to Firefox. Most programming practices came from a time when most software never operated on untrusted data. People are still taught to program as if that were true today.

                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchange
                    wrote last edited by
                    #61

                    @david_chisnall Oh I don't mean to imply it's a Firefox-specific issue. Firefox happened to be the one in the article but it absolutely should be an example for all projects to take a step back and reevaluate rather than keep pushing forward and hoping the AI saves them. I don't know the internal discussions around Firefox but the way it's been portrayed in the articles I've read has been that devs can now lean harder on LLMs finding their bugs after the fact rather than preventing them in the first place.

                    1 Reply Last reply
                    0
                    • cr0w@infosec.exchangeC cr0w@infosec.exchange

                      I'm a little concerned about the general tech attitude towards the Mozilla bug findings. Yes, I'm an AI hater, so add that to the biases, but that's not really the point here.

                      People seem excited about the fact that Mythos was used to find a bunch of security bugs in Firefox, which is cool:

                      Link Preview Image
                      Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

                      New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

                      favicon

                      Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

                      However, the general attitude seems to be that devs can keep pushing for more new things because some AI system will catch the bugs for them. But to me, there should be more concern about how there were so many previously unknown unfixed bugs in Firefox to begin with. These findings should be a cause for concern and give pause to evaluate how so many security bugs make it to prod. And I'm not just talking about Firefox, everyone should be learning from each other in this space.

                      If nothing else, people celebrating the LLM-fueled bug findings should be recognizing just how much harm the whole Move Fast and Break Shit approach really creates rather than allowing the LLMs to be the excuse to move faster and break more shit.

                      elexia@catcatnya.comE This user is from outside of this forum
                      elexia@catcatnya.comE This user is from outside of this forum
                      elexia@catcatnya.com
                      wrote last edited by
                      #62

                      @cR0w modern browsers are too complex (literally more so than some entire operating systems) and are becoming essentially unmaintainable and unsafe as they are pushing more and more features over security. browsers are generally the biggest attack surface for the vast majority of users, so security should be the number 1 priority and it isn't and hasn't been for a while.

                      elexia@catcatnya.comE cr0w@infosec.exchangeC 2 Replies Last reply
                      0
                      • elexia@catcatnya.comE elexia@catcatnya.com

                        @cR0w modern browsers are too complex (literally more so than some entire operating systems) and are becoming essentially unmaintainable and unsafe as they are pushing more and more features over security. browsers are generally the biggest attack surface for the vast majority of users, so security should be the number 1 priority and it isn't and hasn't been for a while.

                        elexia@catcatnya.comE This user is from outside of this forum
                        elexia@catcatnya.comE This user is from outside of this forum
                        elexia@catcatnya.com
                        wrote last edited by
                        #63

                        @cR0w we don't need browsers to be the everything application with 50 million features and they should stop trying to be that. we also don't need operating systems to be as bloated and buggy as they are getting but that's another conversation.

                        1 Reply Last reply
                        0
                        • elexia@catcatnya.comE elexia@catcatnya.com

                          @cR0w modern browsers are too complex (literally more so than some entire operating systems) and are becoming essentially unmaintainable and unsafe as they are pushing more and more features over security. browsers are generally the biggest attack surface for the vast majority of users, so security should be the number 1 priority and it isn't and hasn't been for a while.

                          cr0w@infosec.exchangeC This user is from outside of this forum
                          cr0w@infosec.exchangeC This user is from outside of this forum
                          cr0w@infosec.exchange
                          wrote last edited by
                          #64

                          @elexia

                          1 Reply Last reply
                          0
                          • cr0w@infosec.exchangeC cr0w@infosec.exchange

                            I'm a little concerned about the general tech attitude towards the Mozilla bug findings. Yes, I'm an AI hater, so add that to the biases, but that's not really the point here.

                            People seem excited about the fact that Mythos was used to find a bunch of security bugs in Firefox, which is cool:

                            Link Preview Image
                            Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

                            New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

                            favicon

                            Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

                            However, the general attitude seems to be that devs can keep pushing for more new things because some AI system will catch the bugs for them. But to me, there should be more concern about how there were so many previously unknown unfixed bugs in Firefox to begin with. These findings should be a cause for concern and give pause to evaluate how so many security bugs make it to prod. And I'm not just talking about Firefox, everyone should be learning from each other in this space.

                            If nothing else, people celebrating the LLM-fueled bug findings should be recognizing just how much harm the whole Move Fast and Break Shit approach really creates rather than allowing the LLMs to be the excuse to move faster and break more shit.

                            G This user is from outside of this forum
                            G This user is from outside of this forum
                            guenther@chaos.social
                            wrote last edited by
                            #65

                            @cR0w Looking at *what* the LLM found, I think it shows they actually were on the right path already.

                            Many of these are memory corruption problems, which are eliminated by migrating to Rust, and can be mitigated by using established hardening techniques, both of which they have already been doing for a long time.

                            It's a codebase with a 30 year history and a limited set of people who dare understand it enough to do security audits. These LLMs are basically fresh eyes.

                            G cr0w@infosec.exchangeC 2 Replies Last reply
                            0
                            • G guenther@chaos.social

                              @cR0w Looking at *what* the LLM found, I think it shows they actually were on the right path already.

                              Many of these are memory corruption problems, which are eliminated by migrating to Rust, and can be mitigated by using established hardening techniques, both of which they have already been doing for a long time.

                              It's a codebase with a 30 year history and a limited set of people who dare understand it enough to do security audits. These LLMs are basically fresh eyes.

                              G This user is from outside of this forum
                              G This user is from outside of this forum
                              guenther@chaos.social
                              wrote last edited by
                              #66

                              @cR0w Most old/large codebase will now get audits they didn't get before, resulting in a wave of bugs found by AI. But any code base can only contain a limited number of bugs.

                              1 Reply Last reply
                              0
                              • G guenther@chaos.social

                                @cR0w Looking at *what* the LLM found, I think it shows they actually were on the right path already.

                                Many of these are memory corruption problems, which are eliminated by migrating to Rust, and can be mitigated by using established hardening techniques, both of which they have already been doing for a long time.

                                It's a codebase with a 30 year history and a limited set of people who dare understand it enough to do security audits. These LLMs are basically fresh eyes.

                                cr0w@infosec.exchangeC This user is from outside of this forum
                                cr0w@infosec.exchangeC This user is from outside of this forum
                                cr0w@infosec.exchange
                                wrote last edited by
                                #67

                                @guenther

                                These LLMs are basically fresh eyes.

                                That's my point. LLMs are no inherently better. The problem is that the "best practices" have been ignored and that is the shortcoming here.

                                G 1 Reply Last reply
                                0
                                • cr0w@infosec.exchangeC cr0w@infosec.exchange

                                  @guenther

                                  These LLMs are basically fresh eyes.

                                  That's my point. LLMs are no inherently better. The problem is that the "best practices" have been ignored and that is the shortcoming here.

                                  G This user is from outside of this forum
                                  G This user is from outside of this forum
                                  guenther@chaos.social
                                  wrote last edited by
                                  #68

                                  @cR0w Parts of the codebase is older than those best practices though, I wouldn't hold that against them.

                                  cr0w@infosec.exchangeC 1 Reply Last reply
                                  0
                                  • G guenther@chaos.social

                                    @cR0w Parts of the codebase is older than those best practices though, I wouldn't hold that against them.

                                    cr0w@infosec.exchangeC This user is from outside of this forum
                                    cr0w@infosec.exchangeC This user is from outside of this forum
                                    cr0w@infosec.exchange
                                    wrote last edited by
                                    #69

                                    @guenther I would. They've been working on the same project for how long? And they haven't kept up with best practices? Sounds to me like textbook tech debt and a security vulnerability by design.

                                    G 1 Reply Last reply
                                    0
                                    • cr0w@infosec.exchangeC cr0w@infosec.exchange

                                      @guenther I would. They've been working on the same project for how long? And they haven't kept up with best practices? Sounds to me like textbook tech debt and a security vulnerability by design.

                                      G This user is from outside of this forum
                                      G This user is from outside of this forum
                                      guenther@chaos.social
                                      wrote last edited by
                                      #70

                                      @cR0w given Mozilla's state of funding, abysmal upper management and the sheer size of the project, it's a borderline miracle they actually built a browser capable of rendering most of the web.

                                      cr0w@infosec.exchangeC 1 Reply Last reply
                                      0
                                      • G guenther@chaos.social

                                        @cR0w given Mozilla's state of funding, abysmal upper management and the sheer size of the project, it's a borderline miracle they actually built a browser capable of rendering most of the web.

                                        cr0w@infosec.exchangeC This user is from outside of this forum
                                        cr0w@infosec.exchangeC This user is from outside of this forum
                                        cr0w@infosec.exchange
                                        wrote last edited by
                                        #71

                                        @guenther Imagine if they still focused on that browser instead of all the shiny squirrels like AI.

                                        1 Reply Last reply
                                        1
                                        0
                                        • R relay@relay.infosec.exchange shared this topic
                                        Reply
                                        • Reply as topic
                                        Log in to reply
                                        • Oldest to Newest
                                        • Newest to Oldest
                                        • Most Votes


                                        • Login

                                        • Login or register to search.
                                        • First post
                                          Last post
                                        0
                                        • Categories
                                        • Recent
                                        • Tags
                                        • Popular
                                        • World
                                        • Users
                                        • Groups