Lucas Leong

1.4K posts

Lucas Leong banner
Lucas Leong

Lucas Leong

@_wmliang_

Play hard, Exploit hard @[email protected]

Taipei Katılım Kasım 2013
564 Takip Edilen2.4K Takipçiler
Lucas Leong retweetledi
Christos Tzamos
Christos Tzamos@ChristosTzamos·
1/4 LLMs solve research grade math problems but struggle with basic calculations. We bridge this gap by turning them to computers. We built a computer INSIDE a transformer that can run programs for millions of steps in seconds solving even the hardest Sudokus with 100% accuracy
English
251
809
6.1K
1.7M
Lucas Leong retweetledi
Seth Jenkins
Seth Jenkins@__sethJenkins·
Just derestricted a now-fixed kernel bug in Pixel 10. I think this ranks as the most easily exploited kernel bug of all time😬 Thanks to @tehjh for collab'ing on this driver and full credits for noticing this bug in the first 5 minutes of auditing😂 project-zero.issues.chromium.org/issues/4634382…
English
5
43
187
15.9K
Lucas Leong retweetledi
Mandiant (part of Google Cloud)
Coruna exploit kit is targeting iOS. Coruna leverages 23 exploits against Apple devices running iOS 13-17.2.1. It is being used for espionage, and by financially motivated actors to steal crypto. Update your iOS devices, and learn more about this threat: bit.ly/4rbeltc
Mandiant (part of Google Cloud) tweet media
English
7
119
359
117.2K
Lucas Leong retweetledi
Calif
Calif@calif_io·
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets. A step-by-step guide to exploiting a 20-year-old bug in the Linux kernel to achieve full privilege escalation and container escape, plus a cool bug-hunting heuristic. open.substack.com/pub/calif/p/a-…
English
3
59
200
21.5K
Lucas Leong retweetledi
siunam
siunam@siunam321·
I started playing CTFs in 2022, and LLMs definitely changed the **competitive** CTF scene a lot, especially since mid-2025. I also started using LLMs in late 2025. Yes, those models did one-shot many challenges, but what's the fun of slopping them? I learned absolutely nothing 🥲
siunam tweet mediasiunam tweet media
English
21
97
623
102K
Lucas Leong retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
In the final part of his blog series, @tiraniddo tells the story of how a bug was introduced into a Windows API. Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process. projectzero.google/2026/02/gphfh-…
English
0
54
191
20.4K
Lucas Leong retweetledi
Anthropic
Anthropic@AnthropicAI·
New Engineering blog: We tasked Opus 4.6 using agent teams to build a C compiler. Then we (mostly) walked away. Two weeks later, it worked on the Linux kernel. Here's what it taught us about the future of autonomous software development. Read more: anthropic.com/engineering/bu…
English
876
2.5K
21.5K
8.5M
Lucas Leong retweetledi
Dillon Franke
Dillon Franke@dillon_franke·
It's been just over a year since CVE-2024-54529 was patched. To celebrate, I'm open-sourcing my full PoC exploit for this CoreAudio type confusion vulnerability 🔊 The code is right here! Enjoy: github.com/googleprojectz…
English
5
80
363
38.3K
Lucas Leong retweetledi
sysxplore
sysxplore@sysxplore·
Linux running in a PDF file via a RISC-V emulator compiled to JS
sysxplore tweet media
English
70
398
3.1K
137.7K
Lucas Leong retweetledi
Boris Cherny
Boris Cherny@bcherny·
I'm Boris and I created Claude Code. Lots of people have asked how I use Claude Code, so I wanted to show off my setup a bit. My setup might be surprisingly vanilla! Claude Code works great out of the box, so I personally don't customize it much. There is no one correct way to use Claude Code: we intentionally build it in a way that you can use it, customize it, and hack it however you like. Each person on the Claude Code team uses it very differently. So, here goes.
English
1.3K
7K
54.3K
8M
Lucas Leong retweetledi
Linux Kernel Security
Linux Kernel Security@linkersec·
CVE-2025-68260: rust_binder: fix race condition on death_list First CVE was registered for the new Binder kernel driver written in Rust. The vulnerability is a race condition caused by a list operation in an unsafe code block. @gregkh/T/#u" target="_blank" rel="nofollow noopener">lore.kernel.org/linux-cve-anno…
Linux Kernel Security tweet media
English
0
8
51
5K
Lucas Leong retweetledi
lukas seidel
lukas seidel@pr0me·
really cool to see some well-conducted academic research on this topic, I think reachability is super important for triaging. @binarly_io also implements reachability analysis at scale to reduce false positive findings: binarly.io/blog/binarly-t…
lukas seidel tweet media
English
1
11
20
2.9K
Lucas Leong retweetledi
Francisco Falcon
Francisco Falcon@fdfalcon·
Wow, remote OS command injection (from the same network segment) in FreeBSD IPv6 stack via router advertisement packets: freebsd.org/security/advis… rtsold passes the unescaped domain search list option from the RA packet to the resolvconf shell script.
English
3
68
186
33.2K
Lucas Leong retweetledi
Samuel Groß
Samuel Groß@5aelo·
V8 now has a JS bytecode verifier! IMO a good example for the benefits of a sandbox architecture: - Hard: verify that bytecode is correct (no memory corruption) - Easier: verify that it's secure (no out-of-sandbox memory corruption) Basically separates correctness from security
English
4
28
119
24.9K
Lucas Leong retweetledi
Longhorn
Longhorn@never_released·
XNU as shipped to the outside world is built with some flags not available in the compilers apple ships in Xcode: -mapple-speculative-hardening -mllvm -apple-speculative-hardening-mode=always-poison
English
1
5
66
13.4K
Lucas Leong retweetledi
Anthropic
Anthropic@AnthropicAI·
New on our Frontier Red Team blog: We tested whether AIs can exploit blockchain smart contracts. In simulated testing, AI agents found $4.6M in exploits. The research (with @MATSprogram and the Anthropic Fellows program) also developed a new benchmark: red.anthropic.com/2025/smart-con…
English
354
702
4.8K
2.1M