<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I’m willing to believe that Anthropic built a better SAST.]]></title><description><![CDATA[<p>I’m willing to believe that Anthropic built a better SAST. But that’s a total market of about $5B tops according to Google (some estimates seem to be just $0.5B) – it’s going to take a while to pay off their $30B Series G if they keep targeting these relatively tiny markets.</p><p>The same as with targeting developer productivity (another famously quite small market), they are focused on these markets because there are existing automated “bullshit-corrector” tools. In the case of software development, type checkers, linters, testing frameworks etc. In the case of memory corruption bugs, apparently they leant heavily on ASan to weed out the false positives.</p><p>Anyone who’s ever used a SAST on a mature code base knows that reducing false positives is the number 1 priority.</p><p>Also, in a parallel to recent articles about coding agents, finding vulnerabilities is not the bottleneck.</p>]]></description><link>https://board.circlewithadot.net/topic/d8bd79a9-96dd-4358-bf60-34969a49844c/i-m-willing-to-believe-that-anthropic-built-a-better-sast.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 14:54:24 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/d8bd79a9-96dd-4358-bf60-34969a49844c.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 08 Apr 2026 14:17:40 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to I’m willing to believe that Anthropic built a better SAST. on Fri, 10 Apr 2026 14:47:26 GMT]]></title><description><![CDATA[<p><span><a href="/user/hacksilon%40infosec.exchange">@<span>hacksilon</span></a></span> I’m also super interested in how well it generalises to non-memory-safety vulns. How load-bearing is ASan as a quality gate here, and what other classes of vulns have similar oracles?</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/neilmadden/statuses/116380955229414784</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/neilmadden/statuses/116380955229414784</guid><dc:creator><![CDATA[neilmadden@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 14:47:26 GMT</pubDate></item><item><title><![CDATA[Reply to I’m willing to believe that Anthropic built a better SAST. on Fri, 10 Apr 2026 05:59:34 GMT]]></title><description><![CDATA[<p><span><a href="/user/neilmadden%40infosec.exchange">@<span>neilmadden</span></a></span> yes. According to them that should be in 60+15 days, iirc. The thing that gives me some hope that this isn’t pure marketing is people like Daniel Stenberg reporting that there was a steep increase in the quality of AI-reported issues (<a href="https://mastodon.social/@bagder/116362046377975050" rel="nofollow noopener"><span>https://</span><span>mastodon.social/@bagder/116362</span><span>046377975050</span></a>), although he also says that no one from Glasswing was in touch, so who knows where those are coming from.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/hacksilon/statuses/116378879552343611</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/hacksilon/statuses/116378879552343611</guid><dc:creator><![CDATA[hacksilon@infosec.exchange]]></dc:creator><pubDate>Fri, 10 Apr 2026 05:59:34 GMT</pubDate></item><item><title><![CDATA[Reply to I’m willing to believe that Anthropic built a better SAST. on Thu, 09 Apr 2026 21:57:58 GMT]]></title><description><![CDATA[<p><span><a href="/user/hacksilon%40infosec.exchange">@<span>hacksilon</span></a></span> yeah, for the OpenBSD bug they mention a “few dozen” other findings. But if they were good findings I think they would have said <em>something</em> about them. The fact they just say it as an aside with no elaboration suggests to me these other findings are probably a bit “meh”, but we’ll wait and see. Hopefully we’ll see the full list eventually, once disclosure has run its course.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/neilmadden/statuses/116376985829724444</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/neilmadden/statuses/116376985829724444</guid><dc:creator><![CDATA[neilmadden@infosec.exchange]]></dc:creator><pubDate>Thu, 09 Apr 2026 21:57:58 GMT</pubDate></item><item><title><![CDATA[Reply to I’m willing to believe that Anthropic built a better SAST. on Wed, 08 Apr 2026 15:16:58 GMT]]></title><description><![CDATA[<p><span><a href="/user/neilmadden%40infosec.exchange">@<span>neilmadden</span></a></span> to be fair to them: an entire campaign cost $20k, but each campaign found more than one bug, so the price per bug is much lower. In a talk, one of their researchers said that he's sitting on 100+ high confidence findings from their Linux kernel runs alone that he hasn't yet had the time to verify and report to the maintainers. Of course, that's still a lot of money per bug, no doubt about it, but not quite the $20k you are quoting.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/hacksilon/statuses/116369746720582797</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/hacksilon/statuses/116369746720582797</guid><dc:creator><![CDATA[hacksilon@infosec.exchange]]></dc:creator><pubDate>Wed, 08 Apr 2026 15:16:58 GMT</pubDate></item><item><title><![CDATA[Reply to I’m willing to believe that Anthropic built a better SAST. on Wed, 08 Apr 2026 15:09:55 GMT]]></title><description><![CDATA[<p>To be honest though, with quoted figures of $10-20,000 to find each of these vulns, I don’t think they’re going after the defender market...</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/neilmadden/statuses/116369719031994447</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/neilmadden/statuses/116369719031994447</guid><dc:creator><![CDATA[neilmadden@infosec.exchange]]></dc:creator><pubDate>Wed, 08 Apr 2026 15:09:55 GMT</pubDate></item></channel></rss>