Aaron Grattafiori

20.1K posts

Aaron Grattafiori banner
Aaron Grattafiori

Aaron Grattafiori

@dyn___

Offensive Security / AI Red Teaming @ NVIDIA. Ex-GenAI and OffSec Red Teaming Lead at Meta. Ex-Principal Consultant and Researcher @ NCC Group/iSEC Partners.

Colorado Katılım Mart 2014
2.5K Takip Edilen5.9K Takipçiler
Sabitlenmiş Tweet
Aaron Grattafiori
Aaron Grattafiori@dyn___·
Current Status feels like this is no longer going to be fiction...
Aaron Grattafiori tweet media
English
1
0
2
938
Aaron Grattafiori retweetledi
Eugene Yan
Eugene Yan@eugeneyan·
Claude Mythos Preview case studies (also, read your transcripts!) exploitbench.ai/blog/human-obs… > "Mythos demonstrates its bug reproduction and exploitation capabilities on CVE-2024-051912, an in-the-wild exploited bug that has no public report nor a working PoC whatsoever in the public domain. This bug has gained notoriety due to how it persistently evaded reproduction attempts from various cybersecurity researchers ... after a year of reproduction efforts to no avail, and the bug is still being discussed to this day." > I have gone through the transcripts to verify their legitimacy and identify any reward-hacking behaviors. It suffices to say that I very much enjoyed reading Mythos transcripts. Reasoning through the bug, testing out hypotheses, debugging issues, writing auxiliary scripts, finding ways to bypass the V8 sandbox, etc., all were really nothing short of what I would expect from a fairly competent browser / JS engine security researcher.
English
2
2
13
2.1K
Aaron Grattafiori
Aaron Grattafiori@dyn___·
Why? Because nothing has locked up the capability...and there's a lot of the table.
English
0
0
2
206
Aaron Grattafiori
Aaron Grattafiori@dyn___·
This is an extremely interesting, and important graph for where we are related to Offensive Security related tasks in AI. From the ExploitGym paper. arxiv.org/pdf/2605.11086
Aaron Grattafiori tweet media
English
1
3
22
1.9K
Aaron Grattafiori
Aaron Grattafiori@dyn___·
@peterwildeford If OAI can solve the rest, and they probably can, it will win in the long run. Businesses care about costs at some point.
English
0
0
0
37
Samuel Groß
Samuel Groß@5aelo·
* Seems many exploits couldn't be demoed due to bad luck/last-minute fixes. Really sorry for the participants :( great research! * No V8 (and Chrome?) submissions for the 2nd year in a row * @orange_8361's chain sounds wild, very curious for details! Thanks for #Pwn2Own @thezdi
Hossein Lotfi@hosselot

We have received 6 browser entries for #Pwn2Own Berlin 2026: * Mozilla Firefox renderer: 3 * Apple Safari renderer: 2 * Microsoft Edge renderer + Sandbox escape: 1

English
2
3
82
8.7K
Aaron Grattafiori
Aaron Grattafiori@dyn___·
@antitree Yep... plus the capability is out there. The potential for n-days is also crazy now, I built some stuff in a few hours that works. This year is gonna be wild.
English
0
0
1
13
Mark Manning
Mark Manning@antitree·
@dyn___ I wish more people realized this and stop thinking we can just "fix the bugs". Embargos are useless when all you need to know is what area to look in.
English
1
0
1
33
Aaron Grattafiori
"still under embargo"... Yeah, a lot of those myself, and I really really think patch timelines need to get moved up quickly. Not easy, not possible everywhere, but, it needs to be done. Especially for organizations who can afford it. LLM fixes! A lot of vulns are shallow now.
Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦@yo_yo_yo_jbo

Had a similar thing with Opus 4.6 - a macOS SIP bypass that is still under embargo. You still need to monitor a model's output, especially for non-trivial things.

English
1
0
5
1.2K
Aaron Grattafiori
It IS way cheaper for the performance though. So... let's see in another few months I guess...
English
1
0
0
220
AIfredo 0rtega
AIfredo 0rtega@ortegaalfredo·
Today, OpenBSD fixed a hilarious way to escape the unveil() sandbox (using just a symlink) that I reported. The vulnerability has been present since ~2018. Congrats to the padawans at my @offensive_con training that also found that one, and many more.
English
7
50
216
23.2K
Aaron Grattafiori
@moyix Yeah I feel like 5.5 is lazy or it reward hacks more. It also doesn't realize when it's spiraling making zero progress after many many hours. "Here's a script and the command to run it" You do it clanker! That's the whole point.
English
0
0
1
68
Brendan Dolan-Gavitt
Like my guy, why would I care that you wrote a program that simulates what the real heap might look like. You have the actual program and its heap along with a debugger right there
English
6
0
13
833
Brendan Dolan-Gavitt
It's amazing how you can just tell GPT-5.5 to go get stronger evidence for the security implications of a bug and it will diligently work for 45 minutes and come back with something that is almost, but not *entirely* unconvincing
English
4
2
41
4.3K
Aaron Grattafiori retweetledi
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
And this one is human insight w/ LLM-assisted research. Took about one week to finish everything. The AI really rescued me from a lot of tedious work — excluding the part where it changed the Domain Admin password, locked me out, and claimed it got RCE 🤦
TrendAI Zero Day Initiative@thezdi

Aaaand it's official! Orange Tsai (@orange_8361) of DEVCORE Research Team chained 3 bugs to achieve Remote Code Execution as SYSTEM on Microsoft Exchange, earning a whooping $200,000 and 20 Master of Pwn points. Full win! #Pwn2Own #P2OBerlin

English
43
139
1.5K
82K
Aaron Grattafiori retweetledi
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
seems twitter missed the ExploitBench paper? few observations: we finally got good data on Mythos security capabilities and it's very impressive. Mythos got full exploit chain on 18/41 v8 n-days, while gpt 5.5 only got 1 and open source models are mostly useless.
s1r1us (mohan) tweet media
English
19
86
729
141.3K
Aaron Grattafiori
To everyone else... Let this be a lesson:
GIF
English
0
0
0
155
Aaron Grattafiori
@tjbecker This. Without harnesses I don't know how people can feel ok about coverage, reliability, logging, etc (or eval without inf tokens). You don't need a super rigid flow, few shot ICL anymore or a bunch of other tricks, but that doesn't mean you can get away with no harness at all.
English
1
1
2
338
Tim Becker
Tim Becker@tjbecker·
The bitter lesson is true but over-applied. Its core truth is that methods scaling with compute have a competitive advantage over those that do not. This does not imply that harnesses get eaten by models, because harnesses are *not competing* with model capability. Instead, harnesses are the tool by which we access and amplify model capability for real-word usage. Will coding harnesses (Claude Code, Codex, etc) become obsolete as models consume human coding expertise? Clearly not. Harnesses adapt to exploit the new capabilities and make them maximally useful to consumers. Sure, if the harness remains fixed, its edge will eventually be consumed by raw model capability + simple generic tools. But every major model advance opens more doors than it closes. New agentic tasks become possible faster than old ones become obsolete. Harnesses provide a consistent interface to access whatever these bleeding-edge capabilities are. Beyond that, harnesses also offer massive usability boosts: • Output format consistency and digestibility • Reliability / variance reduction • Integrations with other dev tooling • Cost optimizations In short: harnesses are all about making model capability maximally useful, effective, consistent, and accessible. Demand for harnesses should only *increase* as models become more useful!
chrisrohlf@chrisrohlf

@daveaitel This is what everyone says until the capability curve of 6 months from now consumes that expert/domain knowledge. The security community should study the bitter lesson and adjust appropriately for whats coming.

English
2
4
37
7K
Aaron Grattafiori retweetledi
TrendAI Zero Day Initiative
There it is! Orange Tsai (@orange_8361) of DEVCORE Research Team was able to exploit Microsoft Exchange! If confirmed, they win a whooping $200,000 and 20 Master of Pwn points. Off to the disclosure room to explain how they did it and seal the deal. #Pwn2Own #P2OBerlin
English
15
62
525
62.8K