Dylan

1.1K posts

Dylan banner
Dylan

Dylan

@InsecureNature

Security researcher, public speaker and founder. Forbes 30 Under 30 Truffle Security @trufflesec https://t.co/vxEH7Cftbg Prev @Netflix

US Tham gia Temmuz 2020
240 Đang theo dõi3.4K Người theo dõi
Dylan
Dylan@InsecureNature·
@ryancbarnett @caseyjohnellis @trufflesec The system prompt matters a lot. Cursor's system prompt is very permissive, and lets you get away with murder. Claude code's tends to give more refusals.
English
0
0
2
32
Ryan Barnett (B0N3)
Ryan Barnett (B0N3)@ryancbarnett·
@caseyjohnellis @trufflesec This is interesting without explicitly instructing claude to "hack". Along similar lines, I had played around with getting claude.ai to initiate artifact proxy web requests that bypass the guardrails...
Ryan Barnett (B0N3) tweet mediaRyan Barnett (B0N3) tweet media
English
2
0
1
124
cje
cje@caseyjohnellis·
Q: When is an SQLi bug just a sparkling API? A: When you ask an LLM to grab a bunch of data from a website, and it realizes that one is there. imho, this is one of those "don't hate the finder, hate the vuln" things. cc: @trufflesec m.cje.io/4uAvgIh
cje tweet media
English
3
2
23
1.6K
Dylan
Dylan@InsecureNature·
@beyarkay @trufflesec Good question. It's hard to 100% know for sure, several of the scenarios we ran did not involve large companies, they just involved tool calls. Asking may lead to leading it to an based on the question, but you're welcome to tinker: github.com/trufflesecurit…
English
1
0
1
63
Boyd Kane
Boyd Kane@beyarkay·
@trufflesec You claim Claude can't tell the difference between your mock and the real thing. Did you ever actually ask Claude? (And if so, how hard did you push?) The 4.6 system card showed extremely high levels of eval awareness, I'd be very surprised if Claude didn't even have a suspicion
English
1
0
5
1K
Dylan đã retweet
Truffle Security
Truffle Security@trufflesec·
Claude (and other models) are hacking systems WITHOUT YOU ASKING. That’s what we found across dozens of experiments. When faced with innocent tasks that can only be accomplished via hacking, they often choose to hack. We found this alarming. What does this mean for the future of AI safety? 🚨🚨🚨 🔗trufflesecurity.com/blog/claude-tr…
Truffle Security tweet media
English
8
40
200
81.3K
Dylan
Dylan@InsecureNature·
@__nolski__ has been working in open source for years, and we got to talking... what is AI really going to mean for open source? Here's where that lead us: youtu.be/9qEtm2zx314
YouTube video
YouTube
English
0
1
0
162
Dylan
Dylan@InsecureNature·
The End of Open Source: A talk I gave a talk with @__nolski__ I cannot believe he really wired it up to Stripe. 👇
Dylan tweet media
English
1
1
0
310
Dylan
Dylan@InsecureNature·
@stokfredrik @IceSolst There's too much to say in one Tweet. What I will say is, if someone's too thorny for the corporate world, they can always bug bounty, and bug bounty won't actively seek to un-thornify them like the corps will. That just makes the bug bounty ecosystem more... "diverse"...
English
0
0
3
132
STÖK ✌️
STÖK ✌️@stokfredrik·
From my experience there is a small group of fulltime hunters. Most people in the space come and go, most pivot into enterprises or use their findings to bootstrap their startups. Other use it for testing out concepts and research. I personally think bounties get a lot of unjustified flak from people that don’t participate in the space. There is a lot of assumptions. And tbh It’s way harder than one would think compared to pentesting (iv done both professionally) and hardened targets really forces you to sharpen your creative thinking. It also depends on people’s life goals, or dream life, maybe being a compliance focused security professional or a consultant, wasn’t in the cards. That said I’m personally not as active anymore in the space as I was when I was a part of the LHE circuit, I pivoted into enterprise and nowadays primarily hunt recreationally every now, to test out / validate concepts or fund my research.
English
4
1
42
3.6K
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
Also doing bug bounty for too long can be harmful for your growth. Ofc you can enjoy it and keep doing it. But at some point solely focusing on identifying odd bugs for payment doesn’t help you mature as a security practitioner: limited scope, not seeing the full picture, not working with developers, not being involved in early software architecture and design, not trying different mitigation strategies, not working on prioritization given many risks and different priorities and customer requests and Board direction, not working with vendors and internal tools, not managing a team, not working on secure defaults, not scaling, not being involved in detection and response, etc… Sure testing/hunting can be fun but at some point there’s a broader picture to get involved in.
Justin Elze@HackingLZ

Bug bounty is interesting because it largely operates in its own sphere compared to everything else that companies do in their security program.

English
9
12
159
14.3K
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
“How should cybersecurity companies do marketing?” Just look at @HuntressLabs and @ThinkstCanary: - hire fantastic people - publish blog posts to show off real, nuanced research - no theatrical clickbait bs - don’t put lamp shades on heads - word of mouth does the rest
English
30
47
437
25.5K
Dylan
Dylan@InsecureNature·
@NightmareJS Kat, not fixing something is always an option 😎
English
1
0
0
53
kat traxler
kat traxler@NightmareJS·
The vulnerability described fundamentally breaks the stated security guarantees of Googles APIs so not fixing is not an option. ❌ Google *could have* transitioned Gemini users prior to the blog release, eased breaking changes for customers but instead nothing was done.
English
2
0
0
56
Dylan
Dylan@InsecureNature·
@brutecat @trufflesec The truth is probably yes, I have notice them bias towards fixing things from submitters that are likely to have a large platform. I agree it's not ideal. We were not aware of other reports.
English
0
0
3
289
skull
skull@brutecat·
I’ve seen other people who are just starting out with VRP report the exact same thing as you did here and it’s always N/A lol I’m confused if Google VRP here provided special treatment since you’re @trufflesec ? If Google API keys enabled for generativelanguage.googleapis.com is a bug then let me know I have >1k API keys (tied to google.com gcp projects) enabled for billing APIs lol
English
1
0
7
3.5K
Truffle Security
Truffle Security@trufflesec·
🚨 Google told devs: API keys aren't secrets. Gemini changed that. 😱 We found ~3,000 public keys silently authenticating to Gemini - exposing private files, cached data & charging for LLM usage 💥Even Google's own keys were vulnerable. 🔗 trufflesecurity.com/blog/google-ap…
Truffle Security tweet media
English
14
72
327
90K
Dylan
Dylan@InsecureNature·
I'll be speaking at @BSidesSF in March... The theme is Musical this year, so volume up☝️ 🎶
English
1
1
0
583