Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm a little concerned about the general tech attitude towards the Mozilla bug findings.

I'm a little concerned about the general tech attitude towards the Mozilla bug findings.

Scheduled Pinned Locked Moved Uncategorized
71 Posts 28 Posters 69 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

    @cR0w Browsers are a bit interesting in terms of defining what actually is a security vulnerability. A modern browser's job is to download untrusted code from probably malicious people, run it, and not let them gain access to the host system. As a result, browsers (Firefox was late to the party by a very long time here, but they've done some very interesting work recently in this space) are some of the most aggressively compartmentalised software that exists. This means that most vulnerabilities in a browser are not exploitable by themselves, you need to chain a bunch of them together.

    I suspect there's some psychological effect here, that when you're writing code that you know runs sandboxed, you aren't quite as careful as you would normally be. But there's also a real effect that a lot of the vulnerabilities matter only as step 1 in a chain of several to get to any real kind of compromise that a user would care about.

    cr0w@infosec.exchangeC This user is from outside of this forum
    cr0w@infosec.exchangeC This user is from outside of this forum
    cr0w@infosec.exchange
    wrote last edited by
    #59

    @david_chisnall That's fair, but to my point, it seems like if there is awareness of that whole idea that the main issue is dev attitude, finding out that a bunch of vulns made it to prod seems like the perfect opportunity to address that rather than just be happy there's a new bug finder that will very quickly hit a wall in its effectiveness.

    david_chisnall@infosec.exchangeD 1 Reply Last reply
    0
    • cr0w@infosec.exchangeC cr0w@infosec.exchange

      @david_chisnall That's fair, but to my point, it seems like if there is awareness of that whole idea that the main issue is dev attitude, finding out that a bunch of vulns made it to prod seems like the perfect opportunity to address that rather than just be happy there's a new bug finder that will very quickly hit a wall in its effectiveness.

      david_chisnall@infosec.exchangeD This user is from outside of this forum
      david_chisnall@infosec.exchangeD This user is from outside of this forum
      david_chisnall@infosec.exchange
      wrote last edited by
      #60

      @cR0w For comparison, Chromium averages one vulnerability every 1.5 days. The Linux kernel is similar.

      So, yes, I think this is a problem, but it's far from specific to Firefox. Most programming practices came from a time when most software never operated on untrusted data. People are still taught to program as if that were true today.

      cr0w@infosec.exchangeC 1 Reply Last reply
      0
      • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

        @cR0w For comparison, Chromium averages one vulnerability every 1.5 days. The Linux kernel is similar.

        So, yes, I think this is a problem, but it's far from specific to Firefox. Most programming practices came from a time when most software never operated on untrusted data. People are still taught to program as if that were true today.

        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchangeC This user is from outside of this forum
        cr0w@infosec.exchange
        wrote last edited by
        #61

        @david_chisnall Oh I don't mean to imply it's a Firefox-specific issue. Firefox happened to be the one in the article but it absolutely should be an example for all projects to take a step back and reevaluate rather than keep pushing forward and hoping the AI saves them. I don't know the internal discussions around Firefox but the way it's been portrayed in the articles I've read has been that devs can now lean harder on LLMs finding their bugs after the fact rather than preventing them in the first place.

        1 Reply Last reply
        0
        • cr0w@infosec.exchangeC cr0w@infosec.exchange

          I'm a little concerned about the general tech attitude towards the Mozilla bug findings. Yes, I'm an AI hater, so add that to the biases, but that's not really the point here.

          People seem excited about the fact that Mythos was used to find a bunch of security bugs in Firefox, which is cool:

          Link Preview Image
          Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

          New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

          favicon

          Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

          However, the general attitude seems to be that devs can keep pushing for more new things because some AI system will catch the bugs for them. But to me, there should be more concern about how there were so many previously unknown unfixed bugs in Firefox to begin with. These findings should be a cause for concern and give pause to evaluate how so many security bugs make it to prod. And I'm not just talking about Firefox, everyone should be learning from each other in this space.

          If nothing else, people celebrating the LLM-fueled bug findings should be recognizing just how much harm the whole Move Fast and Break Shit approach really creates rather than allowing the LLMs to be the excuse to move faster and break more shit.

          elexia@catcatnya.comE This user is from outside of this forum
          elexia@catcatnya.comE This user is from outside of this forum
          elexia@catcatnya.com
          wrote last edited by
          #62

          @cR0w modern browsers are too complex (literally more so than some entire operating systems) and are becoming essentially unmaintainable and unsafe as they are pushing more and more features over security. browsers are generally the biggest attack surface for the vast majority of users, so security should be the number 1 priority and it isn't and hasn't been for a while.

          elexia@catcatnya.comE cr0w@infosec.exchangeC 2 Replies Last reply
          0
          • elexia@catcatnya.comE elexia@catcatnya.com

            @cR0w modern browsers are too complex (literally more so than some entire operating systems) and are becoming essentially unmaintainable and unsafe as they are pushing more and more features over security. browsers are generally the biggest attack surface for the vast majority of users, so security should be the number 1 priority and it isn't and hasn't been for a while.

            elexia@catcatnya.comE This user is from outside of this forum
            elexia@catcatnya.comE This user is from outside of this forum
            elexia@catcatnya.com
            wrote last edited by
            #63

            @cR0w we don't need browsers to be the everything application with 50 million features and they should stop trying to be that. we also don't need operating systems to be as bloated and buggy as they are getting but that's another conversation.

            1 Reply Last reply
            0
            • elexia@catcatnya.comE elexia@catcatnya.com

              @cR0w modern browsers are too complex (literally more so than some entire operating systems) and are becoming essentially unmaintainable and unsafe as they are pushing more and more features over security. browsers are generally the biggest attack surface for the vast majority of users, so security should be the number 1 priority and it isn't and hasn't been for a while.

              cr0w@infosec.exchangeC This user is from outside of this forum
              cr0w@infosec.exchangeC This user is from outside of this forum
              cr0w@infosec.exchange
              wrote last edited by
              #64

              @elexia

              1 Reply Last reply
              0
              • cr0w@infosec.exchangeC cr0w@infosec.exchange

                I'm a little concerned about the general tech attitude towards the Mozilla bug findings. Yes, I'm an AI hater, so add that to the biases, but that's not really the point here.

                People seem excited about the fact that Mythos was used to find a bunch of security bugs in Firefox, which is cool:

                Link Preview Image
                Behind the Scenes Hardening Firefox with Claude Mythos Preview – Mozilla Hacks - the Web developer blog

                New details about what we found, and how agentic harnesses are now able to reproduce real bugs and dismiss false positives.

                favicon

                Mozilla Hacks – the Web developer blog (hacks.mozilla.org)

                However, the general attitude seems to be that devs can keep pushing for more new things because some AI system will catch the bugs for them. But to me, there should be more concern about how there were so many previously unknown unfixed bugs in Firefox to begin with. These findings should be a cause for concern and give pause to evaluate how so many security bugs make it to prod. And I'm not just talking about Firefox, everyone should be learning from each other in this space.

                If nothing else, people celebrating the LLM-fueled bug findings should be recognizing just how much harm the whole Move Fast and Break Shit approach really creates rather than allowing the LLMs to be the excuse to move faster and break more shit.

                G This user is from outside of this forum
                G This user is from outside of this forum
                guenther@chaos.social
                wrote last edited by
                #65

                @cR0w Looking at *what* the LLM found, I think it shows they actually were on the right path already.

                Many of these are memory corruption problems, which are eliminated by migrating to Rust, and can be mitigated by using established hardening techniques, both of which they have already been doing for a long time.

                It's a codebase with a 30 year history and a limited set of people who dare understand it enough to do security audits. These LLMs are basically fresh eyes.

                G cr0w@infosec.exchangeC 2 Replies Last reply
                0
                • G guenther@chaos.social

                  @cR0w Looking at *what* the LLM found, I think it shows they actually were on the right path already.

                  Many of these are memory corruption problems, which are eliminated by migrating to Rust, and can be mitigated by using established hardening techniques, both of which they have already been doing for a long time.

                  It's a codebase with a 30 year history and a limited set of people who dare understand it enough to do security audits. These LLMs are basically fresh eyes.

                  G This user is from outside of this forum
                  G This user is from outside of this forum
                  guenther@chaos.social
                  wrote last edited by
                  #66

                  @cR0w Most old/large codebase will now get audits they didn't get before, resulting in a wave of bugs found by AI. But any code base can only contain a limited number of bugs.

                  1 Reply Last reply
                  0
                  • G guenther@chaos.social

                    @cR0w Looking at *what* the LLM found, I think it shows they actually were on the right path already.

                    Many of these are memory corruption problems, which are eliminated by migrating to Rust, and can be mitigated by using established hardening techniques, both of which they have already been doing for a long time.

                    It's a codebase with a 30 year history and a limited set of people who dare understand it enough to do security audits. These LLMs are basically fresh eyes.

                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchangeC This user is from outside of this forum
                    cr0w@infosec.exchange
                    wrote last edited by
                    #67

                    @guenther

                    These LLMs are basically fresh eyes.

                    That's my point. LLMs are no inherently better. The problem is that the "best practices" have been ignored and that is the shortcoming here.

                    G 1 Reply Last reply
                    0
                    • cr0w@infosec.exchangeC cr0w@infosec.exchange

                      @guenther

                      These LLMs are basically fresh eyes.

                      That's my point. LLMs are no inherently better. The problem is that the "best practices" have been ignored and that is the shortcoming here.

                      G This user is from outside of this forum
                      G This user is from outside of this forum
                      guenther@chaos.social
                      wrote last edited by
                      #68

                      @cR0w Parts of the codebase is older than those best practices though, I wouldn't hold that against them.

                      cr0w@infosec.exchangeC 1 Reply Last reply
                      0
                      • G guenther@chaos.social

                        @cR0w Parts of the codebase is older than those best practices though, I wouldn't hold that against them.

                        cr0w@infosec.exchangeC This user is from outside of this forum
                        cr0w@infosec.exchangeC This user is from outside of this forum
                        cr0w@infosec.exchange
                        wrote last edited by
                        #69

                        @guenther I would. They've been working on the same project for how long? And they haven't kept up with best practices? Sounds to me like textbook tech debt and a security vulnerability by design.

                        G 1 Reply Last reply
                        0
                        • cr0w@infosec.exchangeC cr0w@infosec.exchange

                          @guenther I would. They've been working on the same project for how long? And they haven't kept up with best practices? Sounds to me like textbook tech debt and a security vulnerability by design.

                          G This user is from outside of this forum
                          G This user is from outside of this forum
                          guenther@chaos.social
                          wrote last edited by
                          #70

                          @cR0w given Mozilla's state of funding, abysmal upper management and the sheer size of the project, it's a borderline miracle they actually built a browser capable of rendering most of the web.

                          cr0w@infosec.exchangeC 1 Reply Last reply
                          0
                          • G guenther@chaos.social

                            @cR0w given Mozilla's state of funding, abysmal upper management and the sheer size of the project, it's a borderline miracle they actually built a browser capable of rendering most of the web.

                            cr0w@infosec.exchangeC This user is from outside of this forum
                            cr0w@infosec.exchangeC This user is from outside of this forum
                            cr0w@infosec.exchange
                            wrote last edited by
                            #71

                            @guenther Imagine if they still focused on that browser instead of all the shiny squirrels like AI.

                            1 Reply Last reply
                            1
                            0
                            • R relay@relay.infosec.exchange shared this topic
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups