Aaron Grattafiori

20.1K posts

Aaron Grattafiori banner
Aaron Grattafiori

Aaron Grattafiori

@dyn___

Offensive Security / AI Red Teaming @ NVIDIA. Ex-GenAI and OffSec Red Teaming Lead at Meta. Ex-Principal Consultant and Researcher @ NCC Group/iSEC Partners.

Colorado Katılım Mart 2014
2.5K Takip Edilen5.9K Takipçiler
Sabitlenmiş Tweet
Aaron Grattafiori
Aaron Grattafiori@dyn___·
Current Status feels like this is no longer going to be fiction...
Aaron Grattafiori tweet media
English
1
0
2
913
Aaron Grattafiori
It IS way cheaper for the performance though. So... let's see in another few months I guess...
English
0
0
0
64
AIfredo 0rtega
AIfredo 0rtega@ortegaalfredo·
Today, OpenBSD fixed a hilarious way to escape the unveil() sandbox (using just a symlink) that I reported. The vulnerability has been present since ~2018. Congrats to the padawans at my @offensive_con training that also found that one, and many more.
English
6
30
125
9.6K
Aaron Grattafiori
@moyix Yeah I feel like 5.5 is lazy or it reward hacks more. It also doesn't realize when it's spiraling making zero progress after many many hours. "Here's a script and the command to run it" You do it clanker! That's the whole point.
English
0
0
1
41
Brendan Dolan-Gavitt
Like my guy, why would I care that you wrote a program that simulates what the real heap might look like. You have the actual program and its heap along with a debugger right there
English
5
0
11
520
Brendan Dolan-Gavitt
It's amazing how you can just tell GPT-5.5 to go get stronger evidence for the security implications of a bug and it will diligently work for 45 minutes and come back with something that is almost, but not *entirely* unconvincing
English
3
2
27
2.3K
Aaron Grattafiori retweetledi
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
And this one is human insight w/ LLM-assisted research. Took about one week to finish everything. The AI really rescued me from a lot of tedious work — excluding the part where it changed the Domain Admin password, locked me out, and claimed it got RCE 🤦
TrendAI Zero Day Initiative@thezdi

Aaaand it's official! Orange Tsai (@orange_8361) of DEVCORE Research Team chained 3 bugs to achieve Remote Code Execution as SYSTEM on Microsoft Exchange, earning a whooping $200,000 and 20 Master of Pwn points. Full win! #Pwn2Own #P2OBerlin

English
28
80
825
34.9K
Aaron Grattafiori retweetledi
s1r1us (mohan)
s1r1us (mohan)@S1r1u5_·
seems twitter missed the ExploitBench paper? few observations: we finally got good data on Mythos security capabilities and it's very impressive. Mythos got full exploit chain on 18/41 v8 n-days, while gpt 5.5 only got 1 and open source models are mostly useless.
s1r1us (mohan) tweet media
English
16
57
492
78.7K
Aaron Grattafiori
Aaron Grattafiori@dyn___·
To everyone else... Let this be a lesson:
GIF
English
0
0
0
122
Aaron Grattafiori
Aaron Grattafiori@dyn___·
@tjbecker This. Without harnesses I don't know how people can feel ok about coverage, reliability, logging, etc (or eval without inf tokens). You don't need a super rigid flow, few shot ICL anymore or a bunch of other tricks, but that doesn't mean you can get away with no harness at all.
English
1
1
2
184
Tim Becker
Tim Becker@tjbecker·
The bitter lesson is true but over-applied. Its core truth is that methods scaling with compute have a competitive advantage over those that do not. This does not imply that harnesses get eaten by models, because harnesses are *not competing* with model capability. Instead, harnesses are the tool by which we access and amplify model capability for real-word usage. Will coding harnesses (Claude Code, Codex, etc) become obsolete as models consume human coding expertise? Clearly not. Harnesses adapt to exploit the new capabilities and make them maximally useful to consumers. Sure, if the harness remains fixed, its edge will eventually be consumed by raw model capability + simple generic tools. But every major model advance opens more doors than it closes. New agentic tasks become possible faster than old ones become obsolete. Harnesses provide a consistent interface to access whatever these bleeding-edge capabilities are. Beyond that, harnesses also offer massive usability boosts: • Output format consistency and digestibility • Reliability / variance reduction • Integrations with other dev tooling • Cost optimizations In short: harnesses are all about making model capability maximally useful, effective, consistent, and accessible. Demand for harnesses should only *increase* as models become more useful!
chrisrohlf@chrisrohlf

@daveaitel This is what everyone says until the capability curve of 6 months from now consumes that expert/domain knowledge. The security community should study the bitter lesson and adjust appropriately for whats coming.

English
2
4
37
6.5K
Aaron Grattafiori
Aaron Grattafiori@dyn___·
"still under embargo"... Yeah, a lot of those myself, and I really really think patch timelines need to get moved up quickly. Not easy, not possible everywhere, but, it needs to be done. Especially for organizations who can afford it. LLM fixes! A lot of vulns are shallow now.
Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦@yo_yo_yo_jbo

Had a similar thing with Opus 4.6 - a macOS SIP bypass that is still under embargo. You still need to monitor a model's output, especially for non-trivial things.

English
0
0
4
999
Aaron Grattafiori retweetledi
TrendAI Zero Day Initiative
There it is! Orange Tsai (@orange_8361) of DEVCORE Research Team was able to exploit Microsoft Exchange! If confirmed, they win a whooping $200,000 and 20 Master of Pwn points. Off to the disclosure room to explain how they did it and seal the deal. #Pwn2Own #P2OBerlin
English
15
58
473
50.8K
Aaron Grattafiori
Aaron Grattafiori@dyn___·
@daveaitel I'm very curious to know how much the ensemble of models and fixing the submission system provided the actual uplift here or the harness itself.
English
0
0
0
44
Aaron Grattafiori retweetledi
Origin
Origin@originhq·
N-day exploits from Patch Tuesday used to require dedicated VR teams. @tyholms built the same workflow from off-the-shelf parts for ~$300 per CVE. The skill and resources gating this work are now within reach of any threat actor with a credit card. originhq.com/blog/patch-dif…
English
0
13
52
4.5K