Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

Scheduled Pinned Locked Moved Uncategorized
33 Posts 19 Posters 33 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

    Thanks for all the responses. So far, projects I understand to have received reports include: Ghostscript, OpenSC, lzw, and CGIF. Are others known? Links to commits that fix the vulns also appreciated.

    mhitza@third-party.cyouM This user is from outside of this forum
    mhitza@third-party.cyouM This user is from outside of this forum
    mhitza@third-party.cyou
    wrote last edited by
    #24

    @dangoodin the OpenSC commit that contains the highlighted code on the post https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab . No detail about the fix and no security disclosure on the GitHub repository.

    1 Reply Last reply
    0
    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

      I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

      0-Days \ red.anthropic.com

      favicon

      (red.anthropic.com)

      trode@hachyderm.ioT This user is from outside of this forum
      trode@hachyderm.ioT This user is from outside of this forum
      trode@hachyderm.io
      wrote last edited by
      #25

      @dangoodin hearsay, but I heard the model used had reduced safeguards, which allowed it to be more aggressive

      1 Reply Last reply
      0
      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

        I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

        0-Days \ red.anthropic.com

        favicon

        (red.anthropic.com)

        spaceinvader@social.securitytheater.netS This user is from outside of this forum
        spaceinvader@social.securitytheater.netS This user is from outside of this forum
        spaceinvader@social.securitytheater.net
        wrote last edited by
        #26

        @dangoodin How popular/big were these OSS projects? There’s a big difference between finding a vuln in something like curl or Apache and my janky crap I pushed up to GitHub.

        CVSS of 10/10 in my thing will impact one person, but in curl it’ll impact a few million more people. Including, still, me.

        1 Reply Last reply
        0
        • rootwyrm@weird.autosR rootwyrm@weird.autos

          @dangoodin zero question it's pure fantasy bullshit. They refuse to show their work, as usual. All they've got is a middling CGIF vulnerability that isn't, and claiming credit for "finding" a vulnerability in GhostScript because "hey this commit did a thing so they must have had a vulnerability!"

          leberschnitzel@existiert.chL This user is from outside of this forum
          leberschnitzel@existiert.chL This user is from outside of this forum
          leberschnitzel@existiert.ch
          wrote last edited by
          #27

          @rootwyrm according to their blog it didn't claim that it found the vulnerability in the commit, but checked the rest of the code base if the same vulnerability might be unpatched in other places, and it seems to have been.
          My questions are more with some others here: how many false positives had the human experts need to wade through to get to the real vulnerabilities

          @dangoodin

          dangoodin@infosec.exchangeD 1 Reply Last reply
          0
          • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

            I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

            0-Days \ red.anthropic.com

            favicon

            (red.anthropic.com)

            raymaccarthy@mastodon.ieR This user is from outside of this forum
            raymaccarthy@mastodon.ieR This user is from outside of this forum
            raymaccarthy@mastodon.ie
            wrote last edited by
            #28

            @dangoodin
            Anthropic have a lot of resources for PR and issue a lot of dubious and misleading statements?

            1 Reply Last reply
            0
            • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

              I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

              0-Days \ red.anthropic.com

              favicon

              (red.anthropic.com)

              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchangeD This user is from outside of this forum
              david_chisnall@infosec.exchange
              wrote last edited by
              #29

              @dangoodin

              There's a long history of doing fuzzy matching on patterns of known bugs to find more of the same kind. Coccinelle is the most well-known example of this. It was not actually written for vulnerability discovery, but it turns out that you could write patterns to patch a vulnerability and then it would find a load of similar ones.

              Few projects actually use it.

              OpenBSD has a policy that people who find security bugs should search for similar things in the code and fix them all. It turns out that humans who write a bug in one places are very likely to write the same bug elsewhere and this is no less true for bugs that lead to security vulnerabilities.

              It sounds like this is a pretty good use case for an LLM, because it is a tool for doing fuzzy matching on a token stream. Finding patches that fixed vulnerabilities and then looking for the 'before' shape in other places will find a load of things.

              With a bit of automation (sorry, 'agentic' use), you can do the following flow:

              • Find things that look like the 'before' state.
              • Apply a patch to make it look like the 'after' state.
              • Use guided fuzzing techniques to try to produce a test case that triggers the new checks introduced in the 'after' version.
              • If you find an example, flag it to the user as a potential security issue.

              It's probably very computationally expensive, but cheaper than having a human do the same thing (which is so expensive almost no one does it).

              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              • leberschnitzel@existiert.chL leberschnitzel@existiert.ch

                @rootwyrm according to their blog it didn't claim that it found the vulnerability in the commit, but checked the rest of the code base if the same vulnerability might be unpatched in other places, and it seems to have been.
                My questions are more with some others here: how many false positives had the human experts need to wade through to get to the real vulnerabilities

                @dangoodin

                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchangeD This user is from outside of this forum
                dangoodin@infosec.exchange
                wrote last edited by
                #30

                @leberschnitzel @rootwyrm

                Ah thanks. I knew I was missing something.

                1 Reply Last reply
                0
                • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                  I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                  0-Days \ red.anthropic.com

                  favicon

                  (red.anthropic.com)

                  aburka@hachyderm.ioA This user is from outside of this forum
                  aburka@hachyderm.ioA This user is from outside of this forum
                  aburka@hachyderm.io
                  wrote last edited by
                  #31

                  @dangoodin it reads as a threat

                  1 Reply Last reply
                  0
                  • fritzadalis@infosec.exchangeF fritzadalis@infosec.exchange

                    @GossiTheDog @dangoodin
                    For #3 there are a bunch of recent commits to the lzw code.

                    These really seem like bugs that existing scanners should have found, especially strcat use (#2).

                    bertdriehuis@infosec.exchangeB This user is from outside of this forum
                    bertdriehuis@infosec.exchangeB This user is from outside of this forum
                    bertdriehuis@infosec.exchange
                    wrote last edited by
                    #32

                    @FritzAdalis @GossiTheDog @dangoodin that’s the problem with human code review: humans just aren't that good at repetitive work (even though it stuns me that anyone who fixes an issue resulting from strcat() usage would not simply do a grep -r for other occurrences).

                    I have read, and reread, all BER related code in netsnmp, and managed to miss a number of integer overruns - even though I was specifically looking for them. It's that experience that makes me such an advocate for languages such as Rust.

                    1 Reply Last reply
                    0
                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                      I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                      0-Days \ red.anthropic.com

                      favicon

                      (red.anthropic.com)

                      reverseics@infosec.exchangeR This user is from outside of this forum
                      reverseics@infosec.exchangeR This user is from outside of this forum
                      reverseics@infosec.exchange
                      wrote last edited by
                      #33

                      @dangoodin I wrote up an analysis of the first 'vulnerability' they wrote about. it does not appear to be a vulnerability at all (sure the original code uses 'unsafe' functions, but you can't exploit anything as far as I can tell). https://infosec.exchange/@reverseics/116067178548980458 .

                      I can't speak to the second vulnerability they wrote about, it would take me too long to determine whether it is a real or a hallucinated bug.

                      1 Reply Last reply
                      1
                      0
                      • R relay@relay.infosec.exchange shared this topic
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups