<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[The claim that Mythos found its &quot;flagship&quot; BSD bug because the upstream Kerberos bug&#x2F;patch from 2007 is in the training set is very interesting.]]></title><description><![CDATA[<p>The claim that Mythos found its "flagship" BSD bug because the upstream Kerberos bug/patch from 2007 is in the training set is <em>very</em> interesting. It significantly weakens the novel discovery claim, but makes me wonder about the implications for how transformers evaluate input weights and whether this could be extracted and leveraged as a variant hunting technique.</p><p>Or maybe you could just straight grep for the vulnerable code block from every patch ever and see what falls out. That may also be embarrassingly effective.</p>]]></description><link>https://board.circlewithadot.net/topic/a190d6df-6d41-41b7-af60-a5b4e3663aef/the-claim-that-mythos-found-its-flagship-bsd-bug-because-the-upstream-kerberos-bug-patch-from-2007-is-in-the-training-set-is-very-interesting.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 04:10:33 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a190d6df-6d41-41b7-af60-a5b4e3663aef.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 08 May 2026 16:56:27 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to The claim that Mythos found its &quot;flagship&quot; BSD bug because the upstream Kerberos bug&#x2F;patch from 2007 is in the training set is very interesting. on Fri, 08 May 2026 18:51:05 GMT]]></title><description><![CDATA[<p><span><a href="/user/acdha%40code4lib.social" rel="nofollow noopener">@<span>acdha</span></a></span> <span><a href="/user/cigitalgem%40sigmoid.social" rel="nofollow noopener">@<span>cigitalgem</span></a></span> variant hunting is a time honored security research tradition and tools for doing it at scale have never been better (and will continue to improve)</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/lapt0r/statuses/116540457990304411</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/lapt0r/statuses/116540457990304411</guid><dc:creator><![CDATA[lapt0r@infosec.exchange]]></dc:creator><pubDate>Fri, 08 May 2026 18:51:05 GMT</pubDate></item><item><title><![CDATA[Reply to The claim that Mythos found its &quot;flagship&quot; BSD bug because the upstream Kerberos bug&#x2F;patch from 2007 is in the training set is very interesting. on Fri, 08 May 2026 18:50:03 GMT]]></title><description><![CDATA[<p><span><a href="/user/cigitalgem%40sigmoid.social">@<span>cigitalgem</span></a></span>  <span><a href="/user/lapt0r%40infosec.exchange">@<span>lapt0r</span></a></span> the back to back Linux LPEs might be coloring my view but I think there’s a lot of potential in that idea of looking for the same pattern elsewhere, especially for the major projects which people often copy-paste from or where package management was historically hard enough to encourage copying code you weren’t going to carefully track upstream (C, PHP, etc.)</p>]]></description><link>https://board.circlewithadot.net/post/https://code4lib.social/users/acdha/statuses/116540453895760688</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://code4lib.social/users/acdha/statuses/116540453895760688</guid><dc:creator><![CDATA[acdha@code4lib.social]]></dc:creator><pubDate>Fri, 08 May 2026 18:50:03 GMT</pubDate></item><item><title><![CDATA[Reply to The claim that Mythos found its &quot;flagship&quot; BSD bug because the upstream Kerberos bug&#x2F;patch from 2007 is in the training set is very interesting. on Fri, 08 May 2026 18:12:52 GMT]]></title><description><![CDATA[<span><a href="/user/lapt0r%40infosec.exchange" rel="ugc">@<span>lapt0r</span></a></span> LLMs are great librarians but the mythos thing is a larp by amodei. still LLMs are gigantic security threat only because of slopware.]]></description><link>https://board.circlewithadot.net/post/https://comp.lain.la/objects/839e37f1-b4b8-47de-af51-ba7e850fef0e</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://comp.lain.la/objects/839e37f1-b4b8-47de-af51-ba7e850fef0e</guid><dc:creator><![CDATA[demha@comp.lain.la]]></dc:creator><pubDate>Fri, 08 May 2026 18:12:52 GMT</pubDate></item></channel></rss>