GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    daniel:// stenberg:// (bagder@mastodon.social)'s status on Monday, 09-Dec-2024 03:35:46 JST daniel:// stenberg:// daniel:// stenberg://

    As a service to security researchers, I added this section to #curl's hackerone page:

    AI

    If you have used AI in the creation of the vulnerability report, you must disclose this fact in the report and you should do so clearly. We will of course doubt all "facts" and claims in reports where an AI has been involved. You should check and double-check all facts and claims any AI told you before you pass on such reports to us. You are normally much better off avoiding AI.

    https://hackerone.com/curl

    In conversation about a year ago from mastodon.social permalink
    • Embed this notice
      Beggar Midas (beggarmidas@mastodon.social)'s status on Monday, 09-Dec-2024 03:35:43 JST Beggar Midas Beggar Midas
      in reply to
      • scy

      @bagder @scy Even back before I retired over a decade ago fellas like y'all that'd come in redteaming our setups were semi-joking that you were busy automating yourselves out of a job. Many of you even set starting around now as a prospective timeline. From an outsiders viewpoint it just looks like y'all are going strangely luddite as your prophecy starts to come true.

      In conversation about a year ago permalink
    • Embed this notice
      silverwizard (silverwizard@convenient.email)'s status on Monday, 09-Dec-2024 03:35:43 JST silverwizard silverwizard
      in reply to
      • scy
      • Beggar Midas
      @Beggarmidas @scy @bagder No we're AIing ourselves out of useful automation. By adding LLMs to our scanners we can no longer get useful scanner output.
      In conversation about a year ago permalink
    • Embed this notice
      Beggar Midas (beggarmidas@mastodon.social)'s status on Monday, 09-Dec-2024 03:35:44 JST Beggar Midas Beggar Midas
      in reply to
      • scy

      @scy @bagder They are capable of generating false leads, too. That's a matter of correction through iteration, not a distinction in kind. To my admittedly outside view it just appears y'all are flipping out over something that at the end of the day is just a tool using other tools using other tools. I've used some of the hacker AI's. They still require extensive guidance just like the other tools. It just takes it up a notch. It seems a silly point of genuine nondistinction.

      In conversation about a year ago permalink
    • Embed this notice
      daniel:// stenberg:// (bagder@mastodon.social)'s status on Monday, 09-Dec-2024 03:35:44 JST daniel:// stenberg:// daniel:// stenberg://
      in reply to
      • scy
      • Beggar Midas

      @Beggarmidas @scy I know of no other tools than AI based ones that blatantly lie and mislead about their findings

      In conversation about a year ago permalink
    • Embed this notice
      scy (scy@chaos.social)'s status on Monday, 09-Dec-2024 03:35:45 JST scy scy
      in reply to
      • Beggar Midas

      @Beggarmidas @bagder Other scanners are based on facts. They actually run curl's code and observe its behavior, or statically analyze the code, i.e. read it and report patterns that are known to be potential sources of problems.

      With "AI" on the other hand, everything is fuzzy, everything is statistical probability. It can't reason, it can't observe, it can't really analyze things because it doesn't know what it's doing. It can only output stuff that sounds plausible, whether it's right or not.

      In conversation about a year ago permalink
    • Embed this notice
      Beggar Midas (beggarmidas@mastodon.social)'s status on Monday, 09-Dec-2024 03:35:46 JST Beggar Midas Beggar Midas
      in reply to

      @bagder Just curious how it's that much different than, say, using any other autonomous mass scanner. What makes it any better or worse, than, say metasploit or any other dozens of autonomous tool suites routinely used in pentesting? Seems a little hypocritical to selectively single out something that's only SLIGHTLY more automated. It completely ignores the fully autonomous software that protects the internet every day, too. Explain that to this non hacker, could ya? What's the difference?

      In conversation about a year ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.