Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos.

Scheduled Pinned Locked Moved Uncategorized
73 Posts 38 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

    What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

    It's not though, is it?

    agowa338@chaos.socialA This user is from outside of this forum
    agowa338@chaos.socialA This user is from outside of this forum
    agowa338@chaos.social
    wrote last edited by
    #10

    @GossiTheDog

    Well cybersecurity is over but not because of this but because of everyone and their mother deploying openclaw in production...

    cure53@infosec.exchangeC drwho@masto.hackers.townD 2 Replies Last reply
    0
    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

      I don't think anybody actually watches videos any more, so here's MWT's core point -

      The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

      So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

      The proof is going to be if any of the open source vulns turn out to be important. So far:

      wall_e@ioc.exchangeW This user is from outside of this forum
      wall_e@ioc.exchangeW This user is from outside of this forum
      wall_e@ioc.exchange
      wrote last edited by
      #11

      @GossiTheDog from a practical perspective what worries me more is time to poc/working exploit for known vulns.

      OSS library releases patch, model looks at diff + cve description and drops a working exploit for a couple of hundred $ of compute.

      Most companies (at least this side of the pond) are not currently equipped to deal with continuously applying patches for 1-day vulns in prod.
      Many large orgs here are proud that they've managed to get on a monthly update cycle

      wall_e@ioc.exchangeW 1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

        Link Preview Image
        pyrogenesis@mefi.socialP This user is from outside of this forum
        pyrogenesis@mefi.socialP This user is from outside of this forum
        pyrogenesis@mefi.social
        wrote last edited by
        #12

        @GossiTheDog @malwaretech The number of people who should know better just going "*this time* the PR blather is true, I just know it!" is pretty cringe.

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

          What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

          It's not though, is it?

          bontchev@infosec.exchangeB This user is from outside of this forum
          bontchev@infosec.exchangeB This user is from outside of this forum
          bontchev@infosec.exchange
          wrote last edited by
          #13

          @GossiTheDog Haven't we already been there with fuzzing?

          Anyway, even if Mythos is as good as they claim, that's not really a problem as long as it is available only to a few. It's when every script kiddie gets access to it that we should start worrying.

          cure53@infosec.exchangeC L 2 Replies Last reply
          0
          • wall_e@ioc.exchangeW wall_e@ioc.exchange

            @GossiTheDog from a practical perspective what worries me more is time to poc/working exploit for known vulns.

            OSS library releases patch, model looks at diff + cve description and drops a working exploit for a couple of hundred $ of compute.

            Most companies (at least this side of the pond) are not currently equipped to deal with continuously applying patches for 1-day vulns in prod.
            Many large orgs here are proud that they've managed to get on a monthly update cycle

            wall_e@ioc.exchangeW This user is from outside of this forum
            wall_e@ioc.exchangeW This user is from outside of this forum
            wall_e@ioc.exchange
            wrote last edited by
            #14

            @GossiTheDog to be fair, the current time to poc is in many cases already down ≤ 1 day or so, but this could take some of the skill out of it and make it more broadly available

            wall_e@ioc.exchangeW 1 Reply Last reply
            0
            • agowa338@chaos.socialA agowa338@chaos.social

              @GossiTheDog

              Well cybersecurity is over but not because of this but because of everyone and their mother deploying openclaw in production...

              cure53@infosec.exchangeC This user is from outside of this forum
              cure53@infosec.exchangeC This user is from outside of this forum
              cure53@infosec.exchange
              wrote last edited by
              #15

              @agowa338 Cyber security is an insanely complex beast with some parts being technical, some being human, some being regulatory, etc., and well, finding bugs is one small component.

              Emphasis on small.

              We have not really been great at cyber security in the past, and improvements are needed all across the board. We won't be great at it tomorrow because magic.

              Having one component potentially improve is, especially given how speculative the current situation is, is nothing to really worry about. Rather the contrary.

              Time will tell, some processes might change, and that is likely all that will happen for a long time.

              Most humans in cyber security will very likely notice very little impact for now. Can this all go sideways? Yes, of course. Is it time to say that cyber security is over? I don't think so. At all.

              agowa338@chaos.socialA 1 Reply Last reply
              0
              • wall_e@ioc.exchangeW wall_e@ioc.exchange

                @GossiTheDog to be fair, the current time to poc is in many cases already down ≤ 1 day or so, but this could take some of the skill out of it and make it more broadly available

                wall_e@ioc.exchangeW This user is from outside of this forum
                wall_e@ioc.exchangeW This user is from outside of this forum
                wall_e@ioc.exchange
                wrote last edited by
                #16

                @GossiTheDog but other than that... yeah hype-marketing playbook 101.

                Didn't OpenAI pull the:"oh no it's too powerful, humanity couldn't take it yet so we're not releasing it to the public", stunt with one of their earlier models as well?^^

                drwho@masto.hackers.townD 1 Reply Last reply
                0
                • cure53@infosec.exchangeC cure53@infosec.exchange

                  @agowa338 Cyber security is an insanely complex beast with some parts being technical, some being human, some being regulatory, etc., and well, finding bugs is one small component.

                  Emphasis on small.

                  We have not really been great at cyber security in the past, and improvements are needed all across the board. We won't be great at it tomorrow because magic.

                  Having one component potentially improve is, especially given how speculative the current situation is, is nothing to really worry about. Rather the contrary.

                  Time will tell, some processes might change, and that is likely all that will happen for a long time.

                  Most humans in cyber security will very likely notice very little impact for now. Can this all go sideways? Yes, of course. Is it time to say that cyber security is over? I don't think so. At all.

                  agowa338@chaos.socialA This user is from outside of this forum
                  agowa338@chaos.socialA This user is from outside of this forum
                  agowa338@chaos.social
                  wrote last edited by
                  #17

                  @cure53

                  I know. I've been done that. I was the only technician that talked to the compliance people so I "earned" all of the work involved in communicating and bridging both worlds.

                  And since then it just got worse. Nobody cares about it security. The compliance people are just writing some shit and at this point in many companies they don't even expect their technicians to actually implement it anymore either (if it is even possible at all).

                  It's just a work creation measure at this point…

                  1 Reply Last reply
                  0
                  • bontchev@infosec.exchangeB bontchev@infosec.exchange

                    @GossiTheDog Haven't we already been there with fuzzing?

                    Anyway, even if Mythos is as good as they claim, that's not really a problem as long as it is available only to a few. It's when every script kiddie gets access to it that we should start worrying.

                    cure53@infosec.exchangeC This user is from outside of this forum
                    cure53@infosec.exchangeC This user is from outside of this forum
                    cure53@infosec.exchange
                    wrote last edited by
                    #18

                    @bontchev @GossiTheDog Agreed. Current recommendation from our end:

                    Keep calm, find and fix bugs, make the world a bit safer one bug at a time...

                    And ignore the hype train, but keep an open eye on how real and measurable things develop. Just what we did before.

                    1 Reply Last reply
                    0
                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                      I don't think anybody actually watches videos any more, so here's MWT's core point -

                      The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                      So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                      The proof is going to be if any of the open source vulns turn out to be important. So far:

                      mikesiegel@infosec.exchangeM This user is from outside of this forum
                      mikesiegel@infosec.exchangeM This user is from outside of this forum
                      mikesiegel@infosec.exchange
                      wrote last edited by
                      #19

                      @GossiTheDog he makes a good point about the subsidized cost. It's like in the early days when Uber was cheap AF to put the taxis out of business. Once they had market share, they cost as much as taxis.

                      1 Reply Last reply
                      0
                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                        Anthropic set the project across open source projects and provided access and reported the vulns. Typically, you'd expect to see NCSCs spinning up advisories to patch high impact vulns, CISA telling orgs to patch etc etc etc.

                        What's actually happening is... uhm... a whole heap of nothing but people copy and pasting marketing about how cybersecurity is over.

                        It's not though, is it?

                        T This user is from outside of this forum
                        T This user is from outside of this forum
                        trademark@fosstodon.org
                        wrote last edited by
                        #20

                        @GossiTheDog They aren't claiming it's over, that's a strawman. But interestingly they are providing commit hashes of things they've found. Some of these are seriously scary. I've saved a copy of the webpage and will be waiting to see if the promised commits turn up. If they do check out my opinion of Anthropic will rise. If not...

                        dalias@hachyderm.ioD 1 Reply Last reply
                        0
                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                          I don't think anybody actually watches videos any more, so here's MWT's core point -

                          The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                          So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                          The proof is going to be if any of the open source vulns turn out to be important. So far:

                          simonzerafa@infosec.exchangeS This user is from outside of this forum
                          simonzerafa@infosec.exchangeS This user is from outside of this forum
                          simonzerafa@infosec.exchange
                          wrote last edited by
                          #21

                          @GossiTheDog

                          Yes, we do watch videos! 🤔

                          1 Reply Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            I don't think anybody actually watches videos any more, so here's MWT's core point -

                            The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                            So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                            The proof is going to be if any of the open source vulns turn out to be important. So far:

                            david_chisnall@infosec.exchangeD This user is from outside of this forum
                            david_chisnall@infosec.exchangeD This user is from outside of this forum
                            david_chisnall@infosec.exchange
                            wrote last edited by
                            #22

                            @GossiTheDog

                            I asked the FreeBSD security officer to compare the (not yet public) one to Coverity reports. Apparently it found something that Coverity didn't, which means at least it isn't just regurgitating static analyser reports.

                            That said, last time I read the Coverity reports, they found tens of thousands of possible issues (over 90% of the ones I triaged were false positives). You could probably get a higher RoI from paying someone $20K to triage Coverity scan reports.

                            1 Reply Last reply
                            0
                            • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                              I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                              Link Preview Image
                              codinghorror@infosec.exchangeC This user is from outside of this forum
                              codinghorror@infosec.exchangeC This user is from outside of this forum
                              codinghorror@infosec.exchange
                              wrote last edited by
                              #23

                              @GossiTheDog @malwaretech Agree, and I will only add one thing: Misanthropic is an amoral cult.

                              1 Reply Last reply
                              0
                              • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                                Link Preview Image
                                cresssalad@mastodon.socialC This user is from outside of this forum
                                cresssalad@mastodon.socialC This user is from outside of this forum
                                cresssalad@mastodon.social
                                wrote last edited by
                                #24

                                @GossiTheDog @malwaretech

                                Yeah and solutions like this dont put servers in datacenters or work with threat analysis on transit traffic.

                                If all its doing is improving point software solutions, then thats a good thing. Its not going to finish off SAAS solutions - its going to improve them.

                                1 Reply Last reply
                                0
                                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                  I don't think anybody actually watches videos any more, so here's MWT's core point -

                                  The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                                  So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                                  The proof is going to be if any of the open source vulns turn out to be important. So far:

                                  sikorsky78@infosec.exchangeS This user is from outside of this forum
                                  sikorsky78@infosec.exchangeS This user is from outside of this forum
                                  sikorsky78@infosec.exchange
                                  wrote last edited by
                                  #25

                                  @GossiTheDog Thanks for the summary, ain't got time for viewing videos.

                                  1 Reply Last reply
                                  0
                                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                    I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                                    Link Preview Image
                                    evoscale@c.imE This user is from outside of this forum
                                    evoscale@c.imE This user is from outside of this forum
                                    evoscale@c.im
                                    wrote last edited by
                                    #26

                                    @GossiTheDog @malwaretech Be wary of projecting special interests, couched in pure Capitalist profiting, too far among a valuable sector like CyberSec. It's a common pattern for a narrowing margin of the masses, to control more vital infrastructure, and heap residual abuses (thanks Capitalism) upon the far more innocent.

                                    1 Reply Last reply
                                    0
                                    • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                      I don't think anybody actually watches videos any more, so here's MWT's core point -

                                      The flagship and lead vuln in the research is a BSD vuln, it cost $20k to discover with Mythos. Anthropic only reached a crash, and the vuln class in 99%+ cases never reaches RCE, just crashes.

                                      So.. cool.. you spent $20k of VC money to find a crash as the flagship vuln. But... uhm... that isn't the end of the world.

                                      The proof is going to be if any of the open source vulns turn out to be important. So far:

                                      coffe@social.piewpiew.seC This user is from outside of this forum
                                      coffe@social.piewpiew.seC This user is from outside of this forum
                                      coffe@social.piewpiew.se
                                      wrote last edited by
                                      #27

                                      @GossiTheDog I still do XD

                                      1 Reply Last reply
                                      0
                                      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                        I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                                        Link Preview Image
                                        doragasu@mastodon.sdf.orgD This user is from outside of this forum
                                        doragasu@mastodon.sdf.orgD This user is from outside of this forum
                                        doragasu@mastodon.sdf.org
                                        wrote last edited by
                                        #28

                                        @GossiTheDog @malwaretech Other researchers have replicated their try at finding security bugs with publicly available models and got same results. Is it better than earlier models? I suppose it is, it would be a big failure if a new bigger model wasn't. Is it the big leap they state. Doubtful.

                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          I’ve had a bunch of people ask my thoughts on Anthropic’s Mythos. I’ve read the research paper they released and the numbers, and basically I agree with @malwaretech’s take. It’s marketing. The cybersecurity industry is historically very good at marketing cyber pearl harbour and the need to buy magic boxes.

                                          Link Preview Image
                                          aristot73@infosec.exchangeA This user is from outside of this forum
                                          aristot73@infosec.exchangeA This user is from outside of this forum
                                          aristot73@infosec.exchange
                                          wrote last edited by
                                          #29

                                          @GossiTheDog @malwaretech i found this post very relevant
                                          https://mastodon.social/@CuratedHackerNews/116387186190988598

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups