Brian Pak
603 posts

Brian Pak
@brian_pak
ai + security + alpha CEO @theori_io / @xint_official → building the world's best AI hacker 9x DEF CON CTF winner CMU CS '11 | founded PPP & MMM

Time to talk about this one. CopyFail (CVE-2026-31431) — a 732-byte Python script that roots every Linux distro shipped since 2017. 🧵

Time to talk about this one. CopyFail (CVE-2026-31431) — a 732-byte Python script that roots every Linux distro shipped since 2017. 🧵


a567d09b15f6e4440e70c9f2aa8edec8ed59f53301952df05c719aa3911687f9 👀


Patch your Linux boxes! Copy.Fail is a trivially exploitable logic bug in Linux, reachable on all major distros released in the last 9 years. A small, portable python script gets root on all platforms. Found by the teams at @theori_io and @xint_official More details below xint.io/blog/copy-fail…




New post: We tested the Mythos showcase vulnerabilities with open models. They recovered similar scoped analysis! 8/8 models found the flagship FreeBSD zero-day, including a 3B model. Rankings reshuffle completely across tasks => the AI cybersecurity frontier is super jagged!

yeah, this is what I've been wondering too. It seems to me that the future of "AI bug finding" is everyone use/rent a cloud-based model from one or several leading AI model providers. Besides privacy issues, there're some big issues in this way. 1. So what's the difference/advantage you as a vulnerability researcher comparing to other peers using the same model? "better prompting"? For fuzzing, we design our own fuzzer in house which may or may not fuzz the attack vector that others didn't fuzz or increase the code coverage (customized fuzzer), this is the difference. 2. Imagine the model provider company using their new model to scan all the open-source projects prior to their model release, does it mean all the bugs will be found by them only? 3. And, how we measure when to stop finding or when "the code is robust enough". In fuzzing, we do this by measuring the code coverage. x.com/5zty8txry6/sta…


Claude code source code has been leaked via a map file in their npm registry! Code: …a8527898604c1bbb12468b1581d95e.r2.dev/src.zip

