<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: firer</title><link>https://news.ycombinator.com/user?id=firer</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 02 May 2026 10:25:14 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=firer" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by firer in "Copy Fail"]]></title><description><![CDATA[
<p>System partitions being non-writable has nothing to do with the vulnerability - it allows modifying the cache of any file that you can open for reading.<p>Not using setuid anywhere means you'd have to build a slightly more clever exploit, but it's still trivial - just modify some binary you know will run as root "soon".<p>But... I didn't check, but IIRC the untrusted_app secontext that apps run in is not allowed to open AF_ALG sockets - so you can't directly trigger the vulnerability as a malicious app. Although it might be possible in some roundabout way (requesting some more privileged crypto service to do so).</p>
]]></description><pubDate>Wed, 29 Apr 2026 19:20:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47953084</link><dc:creator>firer</dc:creator><comments>https://news.ycombinator.com/item?id=47953084</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47953084</guid></item><item><title><![CDATA[New comment by firer in "Has Mythos just broken the deal that kept the internet safe?"]]></title><description><![CDATA[
<p>Yeah, totally agree now that I've looked into it more.<p>> If OSS models are equally up to the task, why not find novel vulnerabilities?<p>To be fair, in the same blog post Anthropic mentioned costs in the tens of thousands of dollars per project looked at it. So it's a big ask to do an experiment that compares. Would love to see it though.</p>
]]></description><pubDate>Sat, 11 Apr 2026 02:32:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47726729</link><dc:creator>firer</dc:creator><comments>https://news.ycombinator.com/item?id=47726729</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47726729</guid></item><item><title><![CDATA[New comment by firer in "Has Mythos just broken the deal that kept the internet safe?"]]></title><description><![CDATA[
<p>> Open source models found the same bugs? Sure, if you tell them "here is a for which may contain a vulnerability, look for a big in how function XYZ handles ABC"<p>In one of Anthropic's blog post, they describe that that's basically what they did too. They run the agent many times, each time specifying a different file to focus on. [1]<p>From my experience as a security researcher, manually finding a fishy file and sicking even sonnet 4.5 yields great results for most memory corruption bugs.<p>No comments otherwise. I don't have a clue as to who that guy is, and I haven't watched the video yet. You might be right overall.<p>[1] <a href="https://red.anthropic.com/2026/mythos-preview/" rel="nofollow">https://red.anthropic.com/2026/mythos-preview/</a><p>Edit: looked at the open source model claims - I agree that they suck. Basically all the details are given away in the prompt - not just the file.</p>
]]></description><pubDate>Sat, 11 Apr 2026 01:40:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47726389</link><dc:creator>firer</dc:creator><comments>https://news.ycombinator.com/item?id=47726389</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47726389</guid></item><item><title><![CDATA[New comment by firer in "Has Mythos just broken the deal that kept the internet safe?"]]></title><description><![CDATA[
<p>Security efforts are not evenly distributed, even within a single project. This includes both the thinking that the developers put in, and the scrutiny given to a piece of code by researchers.<p>The initial batch of publicly disclosed vulnerabilities by Mythos demonstrates that perfectly. None of the bugs themselves are especially interesting or complex, in my opinion. They were found by applying effort to a very large amount of code which included under-scrutinized areas, where bugs hid. Yes, even in projects like Linux and OpenBSD there are many pieces of code that aren't that properly vetted, because of the finite amount of developer/researcher time allotted.<p>The fact that this effort is much cheaper does indeed change things. But really strong sandboxing solutions, such as gvisor or firecracker, do a really good job of having very little attack surface, all of which is heavily scrutinized.<p>Until we see more of the bugs that were found, it remains to be seen whether or not the post's premise about sandboxes is correct.</p>
]]></description><pubDate>Sat, 11 Apr 2026 01:28:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47726293</link><dc:creator>firer</dc:creator><comments>https://news.ycombinator.com/item?id=47726293</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47726293</guid></item><item><title><![CDATA[New comment by firer in "You will own nothing and be (un)happy"]]></title><description><![CDATA[
<p>I agree with the general sentiment, but it seems fair to me that an old "lifetime" license won't have access to new features.</p>
]]></description><pubDate>Wed, 12 Nov 2025 08:12:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45897569</link><dc:creator>firer</dc:creator><comments>https://news.ycombinator.com/item?id=45897569</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45897569</guid></item><item><title><![CDATA[New comment by firer in "SQLite: Outlandish Recursive Query Examples"]]></title><description><![CDATA[
<p>I love this stuff. If anybody wants another outlandish example here is an emulator I built: <a href="https://github.com/DanielFi/sqlite-vm/blob/main/emulator.sql">https://github.com/DanielFi/sqlite-vm/blob/main/emulator.sql</a></p>
]]></description><pubDate>Mon, 25 Nov 2024 06:02:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=42233654</link><dc:creator>firer</dc:creator><comments>https://news.ycombinator.com/item?id=42233654</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42233654</guid></item><item><title><![CDATA[New comment by firer in "Fuzzing the PHP Interpreter via Dataflow Fusion"]]></title><description><![CDATA[
<p>Fuzzing data flow separately from control flow is an interesting idea<p>I can believe that it dramatically speeds up finding certain bugs, but I doubt that it can reach a large class of complex vulnerabilities, which in the case of high value targets is probably all that's left.<p>The PHP interpreter isn't much of an interesting target, since it (usually) doesn't accept user input, even if it does power a significant part of the web.<p>For that reason, it's much less researched and still has low complexity bugs.<p>More robust interpreters such as JavaScript's V8 will probably fare much better against data flow only fuzzing. Bugs in V8 tend to combine both data flow and control flow[1].<p>[1] <a href="https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html?m=1" rel="nofollow">https://googleprojectzero.blogspot.com/2021/01/in-wild-serie...</a></p>
]]></description><pubDate>Sat, 16 Nov 2024 07:50:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=42155125</link><dc:creator>firer</dc:creator><comments>https://news.ycombinator.com/item?id=42155125</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42155125</guid></item></channel></rss>