Brian Pak

614 posts

Brian Pak banner
Brian Pak

Brian Pak

@brian_pak

ai + security + alpha CEO @theori_io / @xint_official → building the world's best AI hacker 9x DEF CON CTF winner CMU CS '11 | founded PPP & MMM

Seoul / SF انضم Nisan 2010
201 يتبع3.1K المتابعون
Brian Pak
Brian Pak@brian_pak·
We’re grateful to the kernel security team and everyone working hard on patches. Looking ahead, we’re sure Xint and our researchers will uncover many more critical vulnerabilities. We’ll try our best next time to create less chaos for folks. Happy to discuss improvements openly. Thanks for reading. Let’s keep making Linux stronger together. 🙏
English
0
0
3
72
Brian Pak
Brian Pak@brian_pak·
Some have also raised concerns about us releasing the exploit publicly. We have experience writing N-day exploits and know that monitoring git commits for fixes is common practice in offensive security. Attackers were likely already aware and exploiting this within the a few days after the kernel fix landed. With AI coding tools today, turning a CVE plus commit into a working exploit happens in hours anyway.
English
1
1
2
98
Brian Pak
Brian Pak@brian_pak·
Hey everyone. We’ve seen the discussions around Copy Fail (CVE-2026-31431) and the disclosure process. We appreciate the passion from distro maintainers, defenders, and the broader Linux community. This is a serious issue, and we want to share some context on our side in good faith. 🧵
English
1
2
7
231
Brian Pak
Brian Pak@brian_pak·
interestingly, not fuzzing. xint code reviews the code, reasons about potential vulnerabilities, and validates the theory, all in static analysis fashion. it is possible to hook up with the dynamic testing to be even more certain about the validation; but it already does pretty good job of weeding out false positives.
English
1
0
2
430
Brian Pak
Brian Pak@brian_pak·
I promise the bug is real, tho
English
0
0
6
1.3K
Brian Pak
Brian Pak@brian_pak·
and yes, RHEL 14.3 doesn't exist 😅 We meant to say RHEL 10.1. Sorry for the confusion! And also yes, the static webpage copy.fail -- even the logo -- is vibe-coded. Too busy triaging shit ton of other bugs to build a legit website ground up.. and i think it's a perfect use case of vibecoding tbh 😆
English
3
4
48
5.1K
Brian Pak
Brian Pak@brian_pak·
@msolnik oops. should be public now! sorry about that.
English
1
0
20
22.1K
Brian Pak
Brian Pak@brian_pak·
Surfaced by Xint Code — our AI vuln research platform — pointed at the kernel's crypto/ for about an hour, on a starting hunch from @5unKn0wn. Came back with CopyFail (plus others, still in coordinated disclosure). Write-up + PoC (exploit): copy.fail Xint Code: code.xint.io
English
4
32
285
54.2K