Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. #Mythos finds a #curl vulnerability

#Mythos finds a #curl vulnerability

Scheduled Pinned Locked Moved Uncategorized
mythoscurl
60 Posts 41 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • bagder@mastodon.socialB bagder@mastodon.social

    #Mythos finds a #curl vulnerability

    yes, as in singular one.

    Link Preview Image
    Mythos finds a curl vulnerability

    yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

    favicon

    daniel.haxx.se (daniel.haxx.se)

    david_chisnall@infosec.exchangeD This user is from outside of this forum
    david_chisnall@infosec.exchangeD This user is from outside of this forum
    david_chisnall@infosec.exchange
    wrote last edited by
    #21

    @bagder

    AI powered code analyzers are significantly better at finding security flaws and mistakes in source code than any traditional code analyzers did in the past

    I’m not sure this follows from what you’ve said in the rest of the post. Static analysers and fuzzers also made it very easy for people to find vulnerabilities and typically found a lot when they were deployed for the first time. And both were a lot cheaper to run than something like Mythos.

    They aren’t finding as many vulnerabilities now because projects that are critical for security are integrating them into their CI flows.

    And this is what always happens with some new technique: valgrind, Coverity, sanitisers, fuzzers, and so on: they’re released, they find a load of bugs that existing techniques failed to find, people fix them, they get integrated into regular CI runs, and the kinds of bugs that those tools find never make it into the tree.

    Syskaller, for example, has found a lot more bugs in the Linux kernel than any Anthropic tools. And that’s just one fuzzing tool.

    bagder@mastodon.socialB 1 Reply Last reply
    0
    • david_chisnall@infosec.exchangeD david_chisnall@infosec.exchange

      @bagder

      AI powered code analyzers are significantly better at finding security flaws and mistakes in source code than any traditional code analyzers did in the past

      I’m not sure this follows from what you’ve said in the rest of the post. Static analysers and fuzzers also made it very easy for people to find vulnerabilities and typically found a lot when they were deployed for the first time. And both were a lot cheaper to run than something like Mythos.

      They aren’t finding as many vulnerabilities now because projects that are critical for security are integrating them into their CI flows.

      And this is what always happens with some new technique: valgrind, Coverity, sanitisers, fuzzers, and so on: they’re released, they find a load of bugs that existing techniques failed to find, people fix them, they get integrated into regular CI runs, and the kinds of bugs that those tools find never make it into the tree.

      Syskaller, for example, has found a lot more bugs in the Linux kernel than any Anthropic tools. And that’s just one fuzzing tool.

      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.socialB This user is from outside of this forum
      bagder@mastodon.social
      wrote last edited by
      #22

      @david_chisnall i think it makes sense for everyone to run the "easy" and cheap tools first, and once they all find no more problems, then you bring out the bigger canons like AI analyzers. So yeah, which is "best" ? It probably depends.

      http_error_418@hachyderm.ioH 1 Reply Last reply
      0
      • bagder@mastodon.socialB bagder@mastodon.social

        @david_chisnall i think it makes sense for everyone to run the "easy" and cheap tools first, and once they all find no more problems, then you bring out the bigger canons like AI analyzers. So yeah, which is "best" ? It probably depends.

        http_error_418@hachyderm.ioH This user is from outside of this forum
        http_error_418@hachyderm.ioH This user is from outside of this forum
        http_error_418@hachyderm.io
        wrote last edited by
        #23

        @bagder @david_chisnall I'm not going to advocate actually doing this because it's expensive and I'm not a fan of the environmental impacts, but I am curious what it would find if you pointed it at the codebase from a time before the other precursor tools like fuzzers were in use. How many bugs can it find that you know with hindsight are there to be found?

        pozorvlak@mathstodon.xyzP david_chisnall@infosec.exchangeD 2 Replies Last reply
        0
        • http_error_418@hachyderm.ioH http_error_418@hachyderm.io

          @bagder @david_chisnall I'm not going to advocate actually doing this because it's expensive and I'm not a fan of the environmental impacts, but I am curious what it would find if you pointed it at the codebase from a time before the other precursor tools like fuzzers were in use. How many bugs can it find that you know with hindsight are there to be found?

          pozorvlak@mathstodon.xyzP This user is from outside of this forum
          pozorvlak@mathstodon.xyzP This user is from outside of this forum
          pozorvlak@mathstodon.xyz
          wrote last edited by
          #24

          @http_error_418 I agree, this would be a very interesting experiment - and potentially informative for other teams deciding where to spend limited developer time. @bagder @david_chisnall

          1 Reply Last reply
          0
          • bagder@mastodon.socialB bagder@mastodon.social

            My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.

            oots@infosec.exchangeO This user is from outside of this forum
            oots@infosec.exchangeO This user is from outside of this forum
            oots@infosec.exchange
            wrote last edited by
            #25

            @bagder
            In terms of evidence to the contrary:
            Check out
            https://social.security.plumbing/@freddy/116549451049357174 / the blog post:
            https://hacks.mozilla.org/2026/05/behind-the-scenes-hardening-firefox/

            >270 vulnerabilities found by Mythos fixed in a single Firefox release.

            That's just one data point, but interestingly far off from yours.

            1 Reply Last reply
            0
            • bagder@mastodon.socialB bagder@mastodon.social

              #Mythos finds a #curl vulnerability

              yes, as in singular one.

              Link Preview Image
              Mythos finds a curl vulnerability

              yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

              favicon

              daniel.haxx.se (daniel.haxx.se)

              lascapi@social.tchncs.deL This user is from outside of this forum
              lascapi@social.tchncs.deL This user is from outside of this forum
              lascapi@social.tchncs.de
              wrote last edited by
              #26

              I love it :

              "The AI reviews are used in addition to the human reviews. They help us, they don’t replace us."

              @bagder

              1 Reply Last reply
              0
              • bagder@mastodon.socialB bagder@mastodon.social

                My personal conclusion can however not end up with anything else than that the big hype around this model so far was primarily marketing. I see no evidence that this setup finds issues to any particular higher or more advanced degree than the other tools have done before Mythos. Maybe this model is a little bit better, but even if it is, it is not better to a degree that seems to make a significant dent in code analyzing.

                gnirre@mastodon.socialG This user is from outside of this forum
                gnirre@mastodon.socialG This user is from outside of this forum
                gnirre@mastodon.social
                wrote last edited by
                #27

                @bagder How do you explain that Mythos found 271 bugs in Firefox, and counting, and only 1 in cURL. Is the Firefox code base 271 times larger?

                bagder@mastodon.socialB 4censord@unfug.social4 2 Replies Last reply
                0
                • bagder@mastodon.socialB bagder@mastodon.social

                  "Zero memory-safety vulnerabilities found." 💚

                  synlogic4242@social.vivaldi.netS This user is from outside of this forum
                  synlogic4242@social.vivaldi.netS This user is from outside of this forum
                  synlogic4242@social.vivaldi.net
                  wrote last edited by
                  #28

                  @bagder b-b-b-but curl is not in Rust!

                  frankgevaerts@mastodon.socialF 1 Reply Last reply
                  0
                  • gnirre@mastodon.socialG gnirre@mastodon.social

                    @bagder How do you explain that Mythos found 271 bugs in Firefox, and counting, and only 1 in cURL. Is the Firefox code base 271 times larger?

                    bagder@mastodon.socialB This user is from outside of this forum
                    bagder@mastodon.socialB This user is from outside of this forum
                    bagder@mastodon.social
                    wrote last edited by
                    #29

                    @gnirre I do not explain that at all because I don't have enough knowledge to do so.

                    gnirre@mastodon.socialG 1 Reply Last reply
                    0
                    • http_error_418@hachyderm.ioH http_error_418@hachyderm.io

                      @bagder @david_chisnall I'm not going to advocate actually doing this because it's expensive and I'm not a fan of the environmental impacts, but I am curious what it would find if you pointed it at the codebase from a time before the other precursor tools like fuzzers were in use. How many bugs can it find that you know with hindsight are there to be found?

                      david_chisnall@infosec.exchangeD This user is from outside of this forum
                      david_chisnall@infosec.exchangeD This user is from outside of this forum
                      david_chisnall@infosec.exchange
                      wrote last edited by
                      #30

                      @http_error_418 @bagder

                      The original Coverity paper claimed, as I recall, 300 CVEs. I'm not sure what the severity distribution was, but that seems a lot more than Mythos, and they probably used less compute than a single Mythos query.

                      The problem with any static analyser, whether it's based on formal reasoning or pattern recognition, is that it will be unsound (i.e. it will have false positives, in contrast with dynamic analyses that are incomplete and have false negatives). The LLM-based tools are no different in this respect. From a Claude 'comprehensive code review' of one of my projects, the only serious bug in the top ten that it found was one that already had an open PR to fix, and two were not only not bugs, they were intentional design choices and doing it the other way would have caused serious performance regressions (and not fixed bugs).

                      The thing that does make Mythos different is that it tries to build a PoC exploit. This will reduce the false positive rate, at the expense of creating false negatives (if it can't produce a PoC, you ignore it).

                      When I've used Coverity on a large project, it's found tens of thousands of bugs, and most of them are false positives, so it requires a lot of effort to find the ones that are actually important bugs. Something that produces PoCs automatically would help this a lot.

                      The baseline data point I'd really like to see is something that integrates the clang analyser with libFuzzer. For each report the analyser finds, insert profiling points at the branches on the control flow chain that it recommends, then automatically drive the fuzzer to try to trigger the code paths that the analyser reported as potential issues.

                      The default settings for the clang analyser are compilation-unit-at-a-time and with reduced bounds on loop iteration counts to avoid using enormous amounts of memory. If you're willing to spend as much money as it costs to operate the LLM-based tools, you can use the cross-compilation-unit approaches and bump the state up a lot. Running it configured to use a comparable amount of RAM to the GPUs that the Anthropic models run on would let you do a lot of symbolic execution.

                      1 Reply Last reply
                      0
                      • bagder@mastodon.socialB bagder@mastodon.social

                        #Mythos finds a #curl vulnerability

                        yes, as in singular one.

                        Link Preview Image
                        Mythos finds a curl vulnerability

                        yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

                        favicon

                        daniel.haxx.se (daniel.haxx.se)

                        doragasu@mastodon.sdf.orgD This user is from outside of this forum
                        doragasu@mastodon.sdf.orgD This user is from outside of this forum
                        doragasu@mastodon.sdf.org
                        wrote last edited by
                        #31

                        @bagder In line with what this blog post stated shortly after it was announced: the model is nothing special and much cheaper models can find the same bugs. Marketing BS turned to 11. https://www.flyingpenguin.com/the-boy-that-cried-mythos-verification-is-collapsing-trust-in-anthropic/

                        1 Reply Last reply
                        0
                        • bagder@mastodon.socialB bagder@mastodon.social

                          @gnirre I do not explain that at all because I don't have enough knowledge to do so.

                          gnirre@mastodon.socialG This user is from outside of this forum
                          gnirre@mastodon.socialG This user is from outside of this forum
                          gnirre@mastodon.social
                          wrote last edited by
                          #32

                          @bagder Did Anthropic know that you finally had gotten access to Mythos?

                          bagder@mastodon.socialB 1 Reply Last reply
                          0
                          • gnirre@mastodon.socialG gnirre@mastodon.social

                            @bagder Did Anthropic know that you finally had gotten access to Mythos?

                            bagder@mastodon.socialB This user is from outside of this forum
                            bagder@mastodon.socialB This user is from outside of this forum
                            bagder@mastodon.social
                            wrote last edited by
                            #33

                            @gnirre no idea, probably not

                            gnirre@mastodon.socialG 1 Reply Last reply
                            0
                            • bagder@mastodon.socialB bagder@mastodon.social

                              #Mythos finds a #curl vulnerability

                              yes, as in singular one.

                              Link Preview Image
                              Mythos finds a curl vulnerability

                              yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

                              favicon

                              daniel.haxx.se (daniel.haxx.se)

                              spitfire@mastodon.deS This user is from outside of this forum
                              spitfire@mastodon.deS This user is from outside of this forum
                              spitfire@mastodon.de
                              wrote last edited by
                              #34

                              @bagder one? wow, that really was worth burning the planet's resources. 😆

                              1 Reply Last reply
                              0
                              • quinn@social.circl.luQ quinn@social.circl.lu

                                @bagder I suspect the question is, will it still be a worthwhile tool when the actual price to use the tool, not subsidized by anyone's war chest or VC, is revealed?

                                kleisli@mastodon.socialK This user is from outside of this forum
                                kleisli@mastodon.socialK This user is from outside of this forum
                                kleisli@mastodon.social
                                wrote last edited by
                                #35

                                @quinn my current opinion: for security scans and reviews, AI tools are and will be useful, but not to generate code. @bagder

                                quinn@social.circl.luQ 1 Reply Last reply
                                0
                                • bagder@mastodon.socialB bagder@mastodon.social

                                  @gnirre no idea, probably not

                                  gnirre@mastodon.socialG This user is from outside of this forum
                                  gnirre@mastodon.socialG This user is from outside of this forum
                                  gnirre@mastodon.social
                                  wrote last edited by
                                  #36

                                  @bagder Maybe my question should have been if Alpha Omega knew? Your access was "inofficial"?

                                  bagder@mastodon.socialB 1 Reply Last reply
                                  0
                                  • gnirre@mastodon.socialG gnirre@mastodon.social

                                    @bagder Maybe my question should have been if Alpha Omega knew? Your access was "inofficial"?

                                    bagder@mastodon.socialB This user is from outside of this forum
                                    bagder@mastodon.socialB This user is from outside of this forum
                                    bagder@mastodon.social
                                    wrote last edited by
                                    #37

                                    @gnirre I don't know how much they asked or told A about when this was done. It's not "my" access, someone else has the access and ran the analysis

                                    1 Reply Last reply
                                    0
                                    • kleisli@mastodon.socialK kleisli@mastodon.social

                                      @quinn my current opinion: for security scans and reviews, AI tools are and will be useful, but not to generate code. @bagder

                                      quinn@social.circl.luQ This user is from outside of this forum
                                      quinn@social.circl.luQ This user is from outside of this forum
                                      quinn@social.circl.lu
                                      wrote last edited by
                                      #38

                                      @kleisli @bagder
                                      if it's something like 10,000 euros a pop, it might not be worth security scans and reviews, except for governmental clients.

                                      0x0@hachyderm.io0 1 Reply Last reply
                                      0
                                      • synlogic4242@social.vivaldi.netS synlogic4242@social.vivaldi.net

                                        @bagder b-b-b-but curl is not in Rust!

                                        frankgevaerts@mastodon.socialF This user is from outside of this forum
                                        frankgevaerts@mastodon.socialF This user is from outside of this forum
                                        frankgevaerts@mastodon.social
                                        wrote last edited by
                                        #39

                                        @synlogic4242 @bagder Yes, someone really needs to get on to that rewriting thing. Just a pity there hasn't been a weekend in *years* so nobody had the chance!

                                        1 Reply Last reply
                                        0
                                        • quinn@social.circl.luQ quinn@social.circl.lu

                                          @kleisli @bagder
                                          if it's something like 10,000 euros a pop, it might not be worth security scans and reviews, except for governmental clients.

                                          0x0@hachyderm.io0 This user is from outside of this forum
                                          0x0@hachyderm.io0 This user is from outside of this forum
                                          0x0@hachyderm.io
                                          wrote last edited by
                                          #40

                                          @quinn

                                          Especially if it's subscription-based, as these models seem to be good at finding only specific sets of problems and then dry out, but even 10k per use is really gov or big corpo territory.

                                          @kleisli @bagder

                                          quinn@social.circl.luQ 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups