Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. "Assume OSS is compromised" - that is a very very deep hole indeed

"Assume OSS is compromised" - that is a very very deep hole indeed

Scheduled Pinned Locked Moved Uncategorized
17 Posts 13 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jerry@infosec.exchangeJ This user is from outside of this forum
    jerry@infosec.exchangeJ This user is from outside of this forum
    jerry@infosec.exchange
    wrote last edited by
    #1

    "Assume OSS is compromised" - that is a very very deep hole indeed

    https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

    krypt3ia@infosec.exchangeK exception@mastodon.savvy.chE epic_null@infosec.exchangeE fencepost@infosec.exchangeF sempf@infosec.exchangeS 8 Replies Last reply
    0
    • jerry@infosec.exchangeJ jerry@infosec.exchange

      "Assume OSS is compromised" - that is a very very deep hole indeed

      https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

      krypt3ia@infosec.exchangeK This user is from outside of this forum
      krypt3ia@infosec.exchangeK This user is from outside of this forum
      krypt3ia@infosec.exchange
      wrote last edited by
      #2

      @jerry NOT THE OFFICE OF STRATEGIC SERVICES!

      jerry@infosec.exchangeJ 1 Reply Last reply
      0
      • krypt3ia@infosec.exchangeK krypt3ia@infosec.exchange

        @jerry NOT THE OFFICE OF STRATEGIC SERVICES!

        jerry@infosec.exchangeJ This user is from outside of this forum
        jerry@infosec.exchangeJ This user is from outside of this forum
        jerry@infosec.exchange
        wrote last edited by
        #3

        @krypt3ia I guess we knew about them already

        1 Reply Last reply
        0
        • jerry@infosec.exchangeJ jerry@infosec.exchange

          "Assume OSS is compromised" - that is a very very deep hole indeed

          https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

          exception@mastodon.savvy.chE This user is from outside of this forum
          exception@mastodon.savvy.chE This user is from outside of this forum
          exception@mastodon.savvy.ch
          wrote last edited by
          #4

          @jerry Assume you will never now just how deeply all closed source software is compromised.

          varx@defcon.socialV 1 Reply Last reply
          0
          • jerry@infosec.exchangeJ jerry@infosec.exchange

            "Assume OSS is compromised" - that is a very very deep hole indeed

            https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

            epic_null@infosec.exchangeE This user is from outside of this forum
            epic_null@infosec.exchangeE This user is from outside of this forum
            epic_null@infosec.exchange
            wrote last edited by
            #5

            @jerry OSS can be audited. I think that scares these companies most of all.

            1 Reply Last reply
            0
            • jerry@infosec.exchangeJ jerry@infosec.exchange

              "Assume OSS is compromised" - that is a very very deep hole indeed

              https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

              fencepost@infosec.exchangeF This user is from outside of this forum
              fencepost@infosec.exchangeF This user is from outside of this forum
              fencepost@infosec.exchange
              wrote last edited by
              #6

              @jerry it's not entirely out of line to simply "assume compromise" for any software (or the hardware it controls, Palo Alto) but it is indeed a deep hole. AI tools may actually make problems in open source "shallow" in ways not visible or verifiable in closed systems - and while the open source projects may not be able to buy expensive tooling people looking for things to brag about may spend their own money on those tools anyway.

              1 Reply Last reply
              0
              • exception@mastodon.savvy.chE exception@mastodon.savvy.ch

                @jerry Assume you will never now just how deeply all closed source software is compromised.

                varx@defcon.socialV This user is from outside of this forum
                varx@defcon.socialV This user is from outside of this forum
                varx@defcon.social
                wrote last edited by
                #7

                @exception @jerry only way to be secure is to code it yourself using punch cards. Make sure to punch the holes yourself using a lot of force. Don't want a hanging chad to introduce a hidden vulnerability!

                1 Reply Last reply
                0
                • jerry@infosec.exchangeJ jerry@infosec.exchange

                  "Assume OSS is compromised" - that is a very very deep hole indeed

                  https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

                  sempf@infosec.exchangeS This user is from outside of this forum
                  sempf@infosec.exchangeS This user is from outside of this forum
                  sempf@infosec.exchange
                  wrote last edited by
                  #8

                  @jerry Whelp. Everyone convert those Linux AWS containers to Windows.

                  jerry@infosec.exchangeJ 1 Reply Last reply
                  0
                  • sempf@infosec.exchangeS sempf@infosec.exchange

                    @jerry Whelp. Everyone convert those Linux AWS containers to Windows.

                    jerry@infosec.exchangeJ This user is from outside of this forum
                    jerry@infosec.exchangeJ This user is from outside of this forum
                    jerry@infosec.exchange
                    wrote last edited by
                    #9

                    @Sempf it's the only choice

                    fennix@infosec.spaceF darkuncle@infosec.exchangeD 2 Replies Last reply
                    0
                    • jerry@infosec.exchangeJ jerry@infosec.exchange

                      @Sempf it's the only choice

                      fennix@infosec.spaceF This user is from outside of this forum
                      fennix@infosec.spaceF This user is from outside of this forum
                      fennix@infosec.space
                      wrote last edited by
                      #10

                      @jerry @Sempf

                      I'm going to be moving forward with my very own bespoke vibecoded OS. No way the hackers can plant anything in it if even I have no clue what's in there!

                      1 Reply Last reply
                      0
                      • jerry@infosec.exchangeJ jerry@infosec.exchange

                        "Assume OSS is compromised" - that is a very very deep hole indeed

                        https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

                        hamishthepiper@ioc.exchangeH This user is from outside of this forum
                        hamishthepiper@ioc.exchangeH This user is from outside of this forum
                        hamishthepiper@ioc.exchange
                        wrote last edited by
                        #11

                        @jerry Let’s see how long anything lasts after ripping out curl, ffmpeg, etc b/c it _might_ be an attack surface.

                        1 Reply Last reply
                        0
                        • jerry@infosec.exchangeJ jerry@infosec.exchange

                          "Assume OSS is compromised" - that is a very very deep hole indeed

                          https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

                          sundew@beige.partyS This user is from outside of this forum
                          sundew@beige.partyS This user is from outside of this forum
                          sundew@beige.party
                          wrote last edited by
                          #12

                          @jerry "See, if you can read the source code, you should just assume it's compromised, but if you _can't_ read the source code, that's how you know it's good." 🤪🤡

                          1 Reply Last reply
                          0
                          • jerry@infosec.exchangeJ jerry@infosec.exchange

                            @Sempf it's the only choice

                            darkuncle@infosec.exchangeD This user is from outside of this forum
                            darkuncle@infosec.exchangeD This user is from outside of this forum
                            darkuncle@infosec.exchange
                            wrote last edited by
                            #13

                            @jerry @Sempf given how much commercial software (from Palo Alto and Microsoft, among others) depends on OSS somewhere in the dev toolchain, assume *all software* is compromised

                            it's the only way to be sure.

                            paul_ipv6@infosec.exchangeP 1 Reply Last reply
                            0
                            • jerry@infosec.exchangeJ jerry@infosec.exchange

                              "Assume OSS is compromised" - that is a very very deep hole indeed

                              https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/datasheets/defenders-guide-to-frontier-ai-checklist-for-cisos

                              lee_holmes@infosec.exchangeL This user is from outside of this forum
                              lee_holmes@infosec.exchangeL This user is from outside of this forum
                              lee_holmes@infosec.exchange
                              wrote last edited by
                              #14

                              @jerry I should be in marketing. "In this new world of frontier AI, <copy and paste the same generic security advice that's been given for decades like zero-trust and inventory your assets>"

                              1 Reply Last reply
                              0
                              • darkuncle@infosec.exchangeD darkuncle@infosec.exchange

                                @jerry @Sempf given how much commercial software (from Palo Alto and Microsoft, among others) depends on OSS somewhere in the dev toolchain, assume *all software* is compromised

                                it's the only way to be sure.

                                paul_ipv6@infosec.exchangeP This user is from outside of this forum
                                paul_ipv6@infosec.exchangeP This user is from outside of this forum
                                paul_ipv6@infosec.exchange
                                wrote last edited by
                                #15

                                @darkuncle @jerry @Sempf

                                "I say we take off and nuke the entire site from orbit. It's the only way to be sure."

                                darkuncle@infosec.exchangeD 1 Reply Last reply
                                0
                                • paul_ipv6@infosec.exchangeP paul_ipv6@infosec.exchange

                                  @darkuncle @jerry @Sempf

                                  "I say we take off and nuke the entire site from orbit. It's the only way to be sure."

                                  darkuncle@infosec.exchangeD This user is from outside of this forum
                                  darkuncle@infosec.exchangeD This user is from outside of this forum
                                  darkuncle@infosec.exchange
                                  wrote last edited by
                                  #16

                                  @paul_ipv6 @jerry @Sempf precisely

                                  sempf@infosec.exchangeS 1 Reply Last reply
                                  0
                                  • darkuncle@infosec.exchangeD darkuncle@infosec.exchange

                                    @paul_ipv6 @jerry @Sempf precisely

                                    sempf@infosec.exchangeS This user is from outside of this forum
                                    sempf@infosec.exchangeS This user is from outside of this forum
                                    sempf@infosec.exchange
                                    wrote last edited by
                                    #17

                                    @darkuncle @paul_ipv6 @jerry I'm pretty sure that's what the rocketbois have in mind.

                                    1 Reply Last reply
                                    1
                                    0
                                    • R relay@relay.infosec.exchange shared this topic
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • World
                                    • Users
                                    • Groups