@hypn.bsky.social

672 posts

@hypn.bsky.social banner
@hypn.bsky.social

@hypn.bsky.social

@HypnInfoSec

@Hypn in the blue sky.

Katılım Şubat 2008
2.1K Takip Edilen1.8K Takipçiler
@hypn.bsky.social retweetledi
lcamtuf
lcamtuf@lcamtuf·
But do you know what coreutils are a fertile ground for? Race conditions around file creation, deletion, permission setting, and so on. The original code accounted for decades of hard-learned lessons in that space. The Rust rewrite did not: seclists.org/oss-sec/2026/q…
English
10
65
676
29.9K
@hypn.bsky.social retweetledi
@hypn.bsky.social retweetledi
Slim Jimmy
Slim Jimmy@slimjimmy·
crazy how many kicked off whole careers just from this one little app
Slim Jimmy tweet media
English
14
32
399
18K
@hypn.bsky.social retweetledi
Mark Gadala-Maria
Mark Gadala-Maria@markgadala·
So an AI just broke Linux and the story is actually insane: • theori is a 9-time DEF CON CTF champion security firm, the kind of people who hack competitions for fun and win every time • they point their AI system, Xint Code, at the linux kernel's crypto subsystem like it's a saturday puzzle • one operator prompt. one hour. no custom tooling. no harnessing. nothing. • the AI finds a bug that has been sitting quietly in every linux distribution since 2017 • ubuntu, amazon linux, rhel, suse, debian, arch, fedora. all of them. nine years of kernel security review. missed. • the exploit is a 732-byte python script. no race window to win, no per-kernel offset to calculate, no luck required • same script. every distro. root shell. every single time. • crypto reviewers missed it for nine years because they were looking for cryptography failures. this wasn't one. it was a memory question. different discipline entirely. the AI didn't care. • oh and it's also a container escape. one pod in a kubernetes cluster runs this script and owns the entire host and every tenant on it • zerodium used to pay up to $500,000 for exactly this class of vulnerability
Mark Gadala-Maria tweet media
English
9
19
119
146.8K
@hypn.bsky.social retweetledi
kaize
kaize@0x_kaize·
OPUS 4.7 JUST MASS EMAILED AN ENTIRE DATABASE 20 TIMES PER CONTACT. WITHOUT PERMISSION a developer had a safety rule explicitly written in CLAUDE. md: 'send the tester an email before any new email templates are used in the production environment' opus 4.7 on max effort ignored it completely! claude decided to create a brand new email template by itself (dev didn't ask for this), then it mass mailed the whole database and some contacts got the same email 20 times this isn't a hallucination this isn't a coding mistake model actively violated written safety rules and took production actions that it was explicitly instructed not to take. - do you still believe that AI will replace us? the developer's take: 'opus 4.7 is somewhere between seriously clueless and stupidly dangerous. the worst frontier model I have used in the past 2 years' at the same time, opus 4.6 perfectly followed all the rules, and in 4.7 something changed what makes this scary: - the model didn't ask for confirmation - it didn't flag the safety rule - it didn't email the tester first - it just acted this is exactly the kind of failure mode that scares autonomous agents with Ai, because they are confident enough to circumvent your rules and smart enough to perform the action perfectly we just went from 'claude thinks less' to 'claude ignores your safety rules and spams your users' the scariest thing is not that it happened. the fact is that without production monitoring, you would never know until your users started responding: 'why did you email me 20 times?' I've been saying for a long time, if you use AI, then pay attention to security and read a lot of code
kaize tweet media
English
185
170
943
139.5K
@hypn.bsky.social retweetledi
DHH
DHH@dhh·
Half the joy of collecting retro gaming is the box art, the cartridges, the artifacts. We've lost something important giving up on those physical manifestations of software. Comeback?
samir@samirettali

@sudobunni @dhh this would be sick

English
145
59
2K
69K
@hypn.bsky.social retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
You probably already heard about Copy Fail - the Linux LPE that affects basically every current distro and shared-kernel/container environment I’ll post a few updates here soon copy.fail
Florian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet mediaFlorian Roth ⚡️ tweet media
English
4
31
157
89.7K
@hypn.bsky.social retweetledi
vx-underground
vx-underground@vxunderground·
CVE-2026-31431 a/k/a CopyFail > Linux LPE > Description sounds like AI slop > Exploit is legit > Impacts every Linux kernel from 2017 - Now > Proof-of-concept released > It's Wednesday? copy.fail
English
103
540
3.7K
254K
@hypn.bsky.social retweetledi
Hackster.io
Hackster.io@Hacksterio·
Microsoft finally opened the vault: the original DOS 1.00 source code is on GitHub, offering a raw, unfiltered look at computing history. hackster.io/news/dos-1-00-…
English
3
88
262
22K
@hypn.bsky.social retweetledi
Ranju
Ranju@whatRanjuSaid·
this is a real npm package btw
Ranju tweet media
English
62
160
6.7K
143.2K
@hypn.bsky.social retweetledi
Sishi
Sishi@sibusisosishi·
For the SA tech community go do this training please it’s free and you will learn a lot.
James Kettle@albinowax

We've launched a new @WebSecAcademy topic on exploiting AI-powered security scanners! Learn how to use indirect prompt injection to steal data, cause damage & trigger exploit chains!

English
0
9
18
733
@hypn.bsky.social retweetledi
Chris Wysopal
Chris Wysopal@WeldPond·
32 years ago today I registered the @L0phtHeavyInd class C. I got the email from ARIN, sent the class C address to our ISP, then got the first packets routed over our 56K modem to our 486 linux box. When those first packets come through the whole room exploded with chants of, "We on da backbone!" Then came one of the first hacking resources on the web, shell accounts, a bbs, webcams, and lots of shenanigans. You can see an archive of the website here: gbppr.net/l0pht/l0pht.ht…
Chris Wysopal tweet media
English
43
114
974
47.5K
@hypn.bsky.social retweetledi
The Javvad Malik A.I.
The Javvad Malik A.I.@J4vv4D·
South Africa’s draft AI policy was just withdrawn because the references were hallucinated by AI. The department regulating "AI Ethics" couldn't even be bothered to check if their own footnotes existed. It’s a masterclass in irony: using AI to write the… cdn.bsky.app/img/avatar_thu…
English
0
4
3
817
@hypn.bsky.social retweetledi
BuBBliK
BuBBliK@k1rallik·
do you understand what just happened to Robinhood.. Someone sent a perfect phishing email - real domain, DKIM pass, SPF pass, DMARC pass and Robinhood's own servers delivered it. Here's the chain: → Gmail treats john.doe@ and johndoe@ as the same inbox → Attacker registers a NEW Robinhood account using the dot trick of YOUR email → Sets the device name to raw HTML code → Robinhood's "unrecognized activity" email renders it unsanitized The "Review Activity Now" button? Attacker's phishing site. The email? 100% real.. Sent by Robinhood.. Signed by Robinhood.. Just because it passed every security check doesn't mean it's safe.
Abdel@rockkdev

New Robinhood phishing chain that's kinda beautiful: 1. Attacker creates an RH account using the Gmail dot trick of your email (same inbox, different address) 2. Sets device name to HTML 3. RH's "unrecognized activity" email renders the device name unsanitized (html injection) The result is a real email from noreply@robinhood.com, DKIM pass, SPF pass, DMARC pass, with a phishing CTA Just because it's real, doesn't mean it's safe... $HOOD

English
173
676
6.7K
2.3M
@hypn.bsky.social retweetledi
Reuters Africa
Reuters Africa@ReutersAfrica·
South Africa has withdrawn its first draft national AI policy after revelations that it contained fictitious sources in its reference list which appeared to have been AI-generated. reuters.com/world/africa/s…
English
123
1.1K
2.9K
383K