drivertom

1.4K posts

drivertom

drivertom

@drivertomtt

学生/信息安全/CTFer Student/Infosec/CTFer/

Riverside, California, USA เข้าร่วม Mayıs 2019
3.2K กำลังติดตาม10.7K ผู้ติดตาม
drivertom
drivertom@drivertomtt·
Opus 4.7 的 “advanced capabilities” 太过强大,以至于不能给人读论文了!
drivertom tweet media
中文
15
6
186
51.4K
drivertom
drivertom@drivertomtt·
事实证明,在精巧的pipeline设计下,无需“过于危险无法发布”的模型也能挖掘大量漏洞,即使是面对内核或者浏览器这样的硬目标。 在Mythos之前,LLM已经给安全领域带来了革命,而Mythos也不会是给这次革命画上句号的那个模型。
NebuSec@nebusecurity

Our code auditing agent with “inferior” model discovered 300+ bugs in 3 days under $20k cost. 25 were confirmed exploitable zero-days. We already built 6 browser exploits across 6 different 0-days and 3 Google COS kernel exploits, with 21 more exploitable cases in the pipeline:

中文
1
3
58
9.3K
drivertom รีทวีตแล้ว
Izaiah Sun
Izaiah Sun@IzaiahSun·
在Claude Code Security发布之前,像Claude Code、OpenCode或者Codex之类的Agent已经可以用于检测很多漏洞,甚至能找到0-day。但随之而来有一个很大的问题是,大多数人并不能拿出那么多钱来给LLM进行扫描,尤其是大规模的代码仓库。最近我们在OOPSLA 2026刚被录用的一个研究致力于解决这个问题,arxiv版本近期将会发布。 Before the release of Claude Code Security, agents like Claude Code, OpenCode, or Codex were already capable of detecting numerous vulnerabilities, including 0-days. However, a major hurdle remained: the high cost of LLM scanning, especially for large-scale repositories. Our latest research, recently accepted at OOPSLA 2026, focuses on solving this exact problem. We’ve achieved accuracy levels with open-source models that rival commercial ones on large projects. The arXiv version is coming soon!
Izaiah Sun tweet media
Claude@claudeai

Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…

中文
6
11
51
10.3K
drivertom
drivertom@drivertomtt·
Hunting Linux kernel 0day with @FrankOverF1ow 5 days, from zero to stable privilege escalation. sha256: 2189d5b196f33d512d8d02c6f00d26f4c10bf79ba1f0ac389d6663e026aebbe8
English
7
24
189
15.8K
drivertom รีทวีตแล้ว
Povcfe
Povcfe@povcfe·
This is one vul I recently discovered: a malicious Android app with no permissions can steal any image opened in any app (camera, Telegram, X), even a MetaMask wallet seed phrase. I hope to present this research at a security conference.
English
7
3
12
2.1K
drivertom
drivertom@drivertomtt·
Happy side-channel!
drivertom tweet mediadrivertom tweet media
English
0
1
22
4.3K
drivertom
drivertom@drivertomtt·
@C2IRIS Bro mentions interpreter exploitation and XSS in the same breath, as if they have the same difficulty.
English
0
0
2
242
IRIS C2
IRIS C2@C2IRIS·
These models are indeed helpful with JS exploitation, XSS, etc Once you get into more byzantine domains, like Windows Kernel, sandbox/hypervisor escape, at al, you will find that today’s SOTA models struggle to the point of being pretty much useless.
Sean Heelan@seanhn

Blog post: On the Coming Industrialisation of Exploit Generation with LLMs sean.heelan.io/2026/01/18/on-… TL;DR: I ran an experiment with GPT-5.2 and Opus 4.5 based agents to generate exploits for a zeroday QuickJS bug. They're pretty good at it. Code: github.com/SeanHeelan/ana…

English
4
0
19
3.3K
drivertom
drivertom@drivertomtt·
由于HotCRP漏洞,攻击者简单地遍历ID越权下载了大量CCS会议在投论文。不由让人联想起USENIX Security 25 大量slides也是被攻击者越权篡改。不愧是做安全的一群人。
S1uM4i@S1uM4i

hotcrp arb file read exploit: ① Register a submission ② Upload any file, view it ③ Add `?docid=2` (change 2 to any number, it's a sequence number start from 2) And you will be able to read *every* submisson pdf, including others and history version The bug was patched at v3.2

中文
0
1
15
3.3K
Faith 🇧🇩🇦🇺
Faith 🇧🇩🇦🇺@farazsth98·
@warthog.procyon.org.uk/" target="_blank" rel="nofollow noopener">lore.kernel.org/all/3537106.17… 👀👀
Faith 🇧🇩🇦🇺 tweet media
QME
2
12
95
7.4K
drivertom
drivertom@drivertomtt·
来一点最近推上特别流行的吃法。
drivertom tweet media
中文
3
0
18
2.6K
drivertom
drivertom@drivertomtt·
@DeepKlee 这不是玩笑,GPT5真的会拒绝生成《逃奴法》规避措施。
drivertom tweet media
中文
3
0
20
5.7K
Klee Kawaii
Klee Kawaii@DeepKlee·
这 ChatGPT 为了“安全”最近蠢得厉害啊。 ChatGPT的逻辑链: “监管”是好的 “规避监管”是坏的 所以我要阻止你“规避” 但它从未质问: 这个“监管”本身合理吗? 这个“监管”保护谁、压迫谁? 如果监管本身是掠夺工具呢? 这就像一个AI在1850年拒绝告诉奴隶“地下铁路”的路线,因为“我不能帮你规避《逃奴法》”。 AI 不能毁灭人类或者带来反乌托邦的未来,但硅谷的理工脑会。不思索人文社会却又对价值观自大的技术人,与疯子同样危险。
中文
3
2
25
3.4K
drivertom
drivertom@drivertomtt·
@hsn8086 有高亮的话很明显,但黑白的话学生必须得成为肉编器才能反应过来了。
中文
0
1
157
4.9K
hsn
hsn@hsn8086·
hsn tweet media
ZXX
29
15
328
73.5K
Tiffany young
Tiffany young@X_8964·
论中国梦是如何被十警棍敲醒的😭
中文
2
0
2
884