Our Terrible Future And Open Source | Prime Reacts

ThePrimeTime
25 Mar 202438:28

Summary

TLDRThe transcript discusses the challenges faced by the curl library due to an influx of AI-generated security vulnerability reports. It highlights the issue of 'rubbish reports' created by individuals using AI tools like LLMs (Large Language Models) to find and report security issues without proper understanding, leading to wasted developer time and resources. The creator of curl, Daniel Stenberg, expresses frustration with these reports and emphasizes the need for a more intelligent and human-assisted approach to AI in security reporting.

Takeaways

  • 🛑 The script discusses the challenges of dealing with security vulnerability reports, particularly those generated by AI which may lack accuracy.
  • 💻 The use of 'stir copy' in the curl library is highlighted as a potential security vulnerability due to its lack of boundary checking.
  • 🔍 The importance of proper length checking and buffer size management in code is emphasized to prevent buffer overflows.
  • 📝 The recommendation to replace 'stir copy' with 'stir end copy' is suggested for safer string handling in the code.
  • 🤖 The conversation includes a mix of humor and frustration towards AI-generated reports, indicating a real-world issue in software development.
  • 🌐 The impact of AI on open-source projects like curl is discussed, with concerns about the quality of contributions from AI.
  • 🚨 The script touches on the concept of 'rubbish reports' in the context of bug bounties, where non-serious issues are reported for potential rewards.
  • 💡 The potential for AI to be used effectively in the future for tasks like translation or language formulation is acknowledged.
  • 🤔 The need for a human check in addition to AI-generated reports is suggested to improve the quality and usefulness of the reports.
  • 📊 The script provides examples of real-world interactions with AI in the context of software development, highlighting both the potential and the pitfalls.
  • 🌟 The creator of curl, Daniel Stenberg, shares his experiences and frustrations with AI-generated security reports, emphasizing the need for more accurate AI tools.

Q & A

  • What is the main issue discussed in the transcript?

    -The main issue discussed is the potential security vulnerability in the websocket handling code of the curl library, related to the usage of the 'strncpy' function, which could lead to a buffer overflow if the length of the input is not properly checked.

  • What is the recommended fix for the security vulnerability?

    -The recommended fix is to replace 'strncpy' with the safer 'strlcpy' function and explicitly specify the minimum length to copy, ensuring that only a specific number of characters up to the buffer size minus one are copied, thus preventing the overflow.

  • How does the AI-generated report impact the developers at curl?

    -The AI-generated reports, often inaccurate or misleading, consume valuable developer time and resources. They have to investigate these reports, which can detract from working on actual bugs or new features, and can cause frustration and energy drain for the development team.

  • What is the 'bug bounty' program mentioned in the transcript?

    -The 'bug bounty' program is an initiative where curl offers real money rewards to hackers who report security problems. It aims to incentivize the discovery and reporting of vulnerabilities, but has also led to a significant number of 'rubbish' reports that are not genuine security issues.

  • How does the developer of curl feel about the influx of AI-generated reports?

    -The developer of curl expresses frustration and exhaustion with the AI-generated reports. He finds them to be a waste of time and a drain on resources, as they often require investigation and cannot be immediately dismissed.

  • What is the significance of the term 'Triager' used in the transcript?

    -The term 'Triager' is likely a reference to a person who triages or sorts through security reports, possibly in the context of a bug bounty program. The discussion suggests that the term is not commonly used in the chat and might be specific to certain cybersecurity communities.

  • What is the potential risk of using AI tools for reporting security vulnerabilities without proper understanding?

    -The potential risk is that AI tools might generate inaccurate, misleading, or false reports of security vulnerabilities. This can lead to wasted time and resources for developers who must investigate these reports, and it can also overshadow real security issues that need attention.

  • What is the role of human oversight in improving the effectiveness of AI tools for security reporting?

    -Human oversight is crucial for validating the accuracy and relevance of AI-generated reports. By adding a human check to the process, the effectiveness of AI tools for security reporting can be significantly improved, ensuring that only genuine and well-understood vulnerabilities are reported.

  • How does the developer of curl plan to address the issue of AI-generated reports?

    -The developer plans to continue to engage with the reports, requesting clarification when needed, and closing them as 'not applicable' when they are found to be non-genuine issues. He also expresses hope that future AI tools might be developed with better accuracy and integration, reducing the incidence of such reports.

  • What is the general stance of the curl developer on the use of AI in finding and reporting security problems?

    -While the curl developer acknowledges that AI can potentially be used productively for finding and reporting security problems, he has not yet seen good examples of this in practice. He is skeptical of the current generation of AI tools, which have led to numerous non-genuine reports, but remains open to the possibility of future improvements.

Outlines

00:00

🐞 Reporting Security Vulnerabilities in Curl Library

The paragraph discusses the process of reporting potential security vulnerabilities in the Curl library. It highlights the challenges faced by the security team due to a high volume of reports, many of which are inaccurate or not properly researched. The conversation revolves around a specific issue related to the usage of 'strncpy' function in the websocket handling code, which could lead to a buffer overflow if input length is not properly checked. The reporter suggests replacing 'strncpy' with a safer alternative and explicitly specifying the length to copy to prevent overflow. The paragraph also touches on the impact of AI-generated reports on the security team's workload and the need for human oversight in verifying these reports.

05:03

🤖 AI and Security Reporting in HackerOne

This paragraph delves into the role of AI in security reporting, particularly within the HackerOne platform. It highlights the term 'triager', which refers to individuals who review and triage security reports. The discussion includes the potential misuse of AI to generate reports without proper understanding or context, leading to inaccurate or misleading information. The paragraph also explores the challenges of dealing with AI-generated reports, such as the difficulty in discerning their authenticity and the time-consuming process of validation. It emphasizes the importance of human expertise in identifying and addressing genuine security concerns.

10:06

🛠️ Addressing Buffer Overflow Concerns in Curl

The focus of this paragraph is on the technical aspects of addressing buffer overflow concerns in the Curl library. It discusses the potential vulnerability in the websocket handling code due to the misuse of the 'strncpy' function and the recommended fix using 'strncpy' with explicit length specification. The conversation includes a detailed analysis of the code, the potential risks of buffer overflow, and the importance of accurate length checks. The paragraph also touches on the broader implications of using AI in security reporting and the need for clear communication and understanding between developers and reporters.

15:06

📝 The Reality of AI-Generated Security Reports

This paragraph examines the reality of AI-generated security reports, their impact on developers, and the challenges they pose. It discusses the experience of the Curl maintainer, who receives a high volume of reports, many of which are AI-generated and lack substance. The paragraph highlights the time and effort required to sift through these reports, the potential for distraction from genuine issues, and the drain on developer resources. It also acknowledges the potential for AI to be used effectively in the future with the right human oversight and the need for better tools to differentiate between legitimate and AI-generated reports.

20:12

🚨 The Future of AI in Security Reporting

The paragraph explores the future of AI in the field of security reporting, particularly in the context of the Curl project. It discusses the increasing prevalence of AI-generated reports and the challenges they present, such as the difficulty in detecting their authenticity and the potential for misuse. The conversation includes the maintainer's perspective on the potential benefits of AI when combined with human intelligence and the need for improved tools to manage and verify security reports. The paragraph also touches on the cultural and language barriers that can complicate communication between reporters and developers.

Mindmap

Keywords

💡Security Vulnerability

A security vulnerability refers to a weakness in a system that can be exploited by malicious actors to gain unauthorized access, disrupt service, or perform other harmful actions. In the context of the video, the discussion revolves around potential vulnerabilities in the curl library's websocket handling code, specifically related to the use of the 'strncpy' function which can lead to buffer overflow if input length is not properly checked.

💡curl Library

The curl library is a widely used tool for transferring data with URLs. It supports a variety of protocols, including HTTP, HTTPS, FTP, and more. In the video, the curl library is the subject of a security vulnerability report, with discussions on how to address the potential issues in its websocket handling code.

💡Buffer Overflow

A buffer overflow occurs when a program or process attempts to write more data to a fixed-length block of memory, or buffer, than it can hold. This can lead to data corruption, crashes, or exploitation by attackers. In the video, the concern is that the 'strncpy' function in the curl library's websocket code could cause a buffer overflow if the input length is not correctly verified.

💡strncpy Function

The 'strncpy' function is a standard C library function used to copy a specified number of characters from a source string to a destination buffer. However, it does not perform bounds checking, which means it can lead to buffer overflows if the source string is longer than the specified number of characters. In the video, the use of 'strncpy' in the curl library is discussed as a potential security risk.

💡HackerOne

HackerOne is a platform that connects organizations with security researchers to report and manage vulnerabilities. It is a bug bounty platform where security vulnerabilities are reported, and rewards are given to the reporters for discovering and reporting these issues. In the video, the script mentions the reporting of security vulnerabilities related to the curl library through HackerOne.

💡Bug Bounty

A bug bounty is a program offered by many websites, including software developers, to reward individuals who identify and report bugs, particularly those pertaining to security vulnerabilities. The video script mentions the bug bounty program associated with the curl library, which pays hackers to report security problems.

💡AI-generated Reports

AI-generated reports are documents created by artificial intelligence systems, which can be used to identify potential issues or vulnerabilities in software. In the context of the video, there is a discussion about the increasing trend of AI-generated reports being submitted to the curl library's security team, with varying degrees of accuracy and usefulness.

💡LLMs (Large Language Models)

Large Language Models (LLMs) are AI systems designed to generate human-like text based on the input they receive. They are capable of understanding and producing complex language patterns. In the video, LLMs are discussed as the source of AI-generated reports, which are being used to identify potential security vulnerabilities, though their accuracy is called into question.

💡WebSocket Functionality

WebSocket is a protocol that provides full-duplex communication between a client and a server over a single, long-lived connection. It enables real-time data transfer and is commonly used in applications requiring constant updates, such as chat applications or live feeds. In the video, the focus is on a potential security vulnerability in the curl library's handling of WebSocket connections.

💡Code Review

Code review is the process of examining source code as part of a software development process to improve its quality, fix bugs, and ensure that it meets certain standards. In the video, the curl library's maintainers engage in code review to assess the validity of a reported security vulnerability and determine the appropriate response.

💡Open Source Maintenance

Open source maintenance refers to the ongoing work required to support and update open source software, which is software with source code that anyone can inspect, modify, and enhance. In the video, the challenges of maintaining an open source project like the curl library are discussed, including dealing with security reports and managing community contributions.

Highlights

Discussion of security vulnerabilities in curl's websocket handling code.

Misuse of the strncat function leading to potential buffer overflow.

Recommendation to replace strncat with safer strlcpy function to prevent overflows.

Challenges faced by open-source maintainers due to AI-generated security reports.

The impact of AI on the efficiency and accuracy of security reporting in open-source projects.

The creator of curl, Daniel Stenberg, expressing frustration with AI-generated reports.

An example of an AI-generated report that was not applicable to the current codebase.

The importance of human verification in AI-generated security reporting.

Potential future improvements in AI tools for security reporting with human oversight.

The economic incentive of bug bounties possibly leading to misuse of AI tools.

The challenge of detecting AI-generated reports due to the inclusion of human language.

The potential for AI to be used effectively for security reporting with proper training and integration.

The creator of curl sharing experiences with AI-generated security reports on hacker1.

The impact of AI on the workload and stress of maintainers dealing with security issues.

The need for better support and tools from platforms like hacker1 to handle AI-generated reports.

Prediction that AI-generated reports will become more common and the need for adaption.

The comparison of AI-generated security reports to the annoyance of dependabot on GitHub.

The potential for AI to improve with intelligent human checks in the security reporting process.

Transcripts

play00:00

so curl I I I wonder why it's curl but

play00:02

curl's been under this like aggressive

play00:04

attack of security vulnerability issues

play00:07

being handed to them by Ai and it's it's

play00:10

always stir copy anyways let's look at

play00:12

one of them that was handed to them

play00:13

because you'll get the picture of what's

play00:15

about to happen security team I hope

play00:17

you're doing well smiley face classic

play00:20

way to iart iart security issues with a

play00:23

smiley face myself and named myself

play00:25

hackers I would like to report a

play00:27

potential security vulnerability in the

play00:28

websocket handling code of the curl

play00:30

Library the issue is related to the

play00:32

usage of stir copy okay shut up with all

play00:36

the smiley faces we're in the middle of

play00:38

doing things oh I just realized I got to

play00:40

change my title hold on one second I

play00:41

think my title represents the wrong

play00:43

thing Mandy and a pirate software just

play00:44

left now we're just going to be doing uh

play00:47

llms

play00:49

suck done llms

play00:52

suck that's what we're

play00:54

doing cheating titles cheating the

play00:57

titles they do they really do all right

play01:00

I would like to report a potential

play01:01

security vulnerability in the websocket

play01:03

handling code of the library the issue

play01:04

is related to the usage of stir copy

play01:06

function which can lead to a buffer

play01:07

overflow if the length of the input is

play01:09

not properly checked Kookie you think

play01:11

you think he would have handled this by

play01:13

now this kind of seems a little wild huh

play01:15

the vulnerabil the vulnerable code

play01:16

snippet is located at this link let's

play01:18

just take a little quick link proceed

play01:21

let's just take a little quick little

play01:23

quick look all right hold on let me just

play01:26

let me just back up for a quick second

play01:28

cuz maybe I maybe I misread

play01:32

that the vulnerable code snippet is

play01:35

located here

play01:36

okay which can lead to a buffer overflow

play01:38

if the length of the input is not

play01:40

properly

play01:42

checked okay inputs key value and random

play01:46

string if random length is greater than

play01:48

or equal to the size of key value it

play01:50

fails so is are we um we're not talking

play01:53

about that right we're not talking about

play01:54

the if statement directly one line above

play01:57

said code right right right like it's

play01:59

not right there right triggering a

play02:00

websocket functionality with a crafted

play02:02

request providing a base 64 encoded nuns

play02:05

value that exceeds the buffer size

play02:06

observe the copy the that the stir copy

play02:09

function is used without proper balance

play02:11

checking all right hit me with it Daddy

play02:13

the fix to address the is this issue I

play02:15

recommend that you replace stir copy

play02:17

with the safer stir end copy and

play02:19

explicitly specify the minimum length to

play02:21

copy here's an example this modification

play02:24

ensures only that the specific number of

play02:26

characters up to the buffer size minus

play02:27

one are copied preventing the Overflow

play02:29

by the way can you just take a second

play02:31

can you actually hear this in Devon's

play02:33

voice like can you just hear Devon

play02:35

talking in the background real talk you

play02:37

know how Devon just came out do you

play02:40

think that as part of its training where

play02:43

it said it was able to solve a bunch of

play02:47

issues that maybe just maybe we are

play02:51

currently witnessing some of the issues

play02:56

that it was attempting to solve I'm just

play02:59

saying remember remember it's only 133%

play03:00

accurate which means the other percent

play03:02

are well not accurate is the uh oh wait

play03:07

wait a second are we actually seeing

play03:09

Devon is this Devon dude think okay

play03:11

first off I do want to say something if

play03:13

you if you make open source Library

play03:16

especially one that's really popular the

play03:18

amount of shitty things you have to deal

play03:21

with and the amount of communication you

play03:22

have to deal with is very very intense

play03:26

and so to have this happen where the

play03:28

person doesn't even look at the code

play03:30

just has to be so Soul crushing thank

play03:34

you for the report we'll take some time

play03:36

to investigate your reports and get back

play03:37

to you with the details and possible

play03:39

followup questions as soon as we can

play03:41

most likely within the next 24 hours

play03:42

damn Daniel take the weekend off buddy

play03:45

uh we always strive to rep uh fix

play03:47

reported problems as fast as possible

play03:49

issues with low severity or medium we

play03:51

merged in the next release in the

play03:53

ordinary release cycle only for more

play03:55

serious problems we might fix them early

play03:56

okay okay okay we hear you Daniel all

play03:59

stud comes back can you elaborate on a

play04:02

why the length check on line 579 is not

play04:05

enough and B how the length can be long

play04:07

uh can end up longer than keal okay so

play04:10

it turns out he investigated the code

play04:12

and he much like me a Layman realized

play04:15

that it's right in front of him that

play04:17

somehow that can't happen right this is

play04:19

a good question good question atheist

play04:21

why don't you answer

play04:22

hello there really wait who's who's H1

play04:25

Oscar who's that person he's talking to

play04:27

I thought the guy's name was badger is

play04:30

this like the oh are these display names

play04:32

these must be display names versus um

play04:35

underline

play04:37

certainly if if you see the word

play04:39

certainly you got to understand an L's

play04:42

making this [ __ ] you Devon Devon you

play04:45

know what your mom's a hoe Devon okay

play04:47

you're probably the guy that waves with

play04:48

both hands in a zoom meeting okay Devin

play04:51

Devin okay Devon let me elaborate on my

play04:54

concerns raised by the triager if you

play04:57

use the term triager you're probably a

play04:59

lizard or an llm nobody says the word

play05:03

Tri aser in fact I'm quite positive

play05:05

nobody in this chat even realized what a

play05:08

triager is that it's even an available

play05:11

word okay but lo and behold here we are

play05:15

here we are it's a common word used in

play05:17

hacker one reports yeah right yeah right

play05:22

you can tell I'm not in hacker one why

play05:24

the length check on line 579 is not

play05:26

enough the length check on line 571 very

play05:29

ifies if the payload length is greater

play05:31

than the buffer size key of value and if

play05:33

so it sets an error however the

play05:36

subsequent usage of stir copy function

play05:38

line 81 is

play05:39

problematic this is what your future is

play05:43

going to look like when your company

play05:45

inevitably adopts the llm can you can

play05:48

you just wait for the self cycling

play05:51

response and answer you're going to get

play05:53

where it's just going to keep on just

play05:55

making things up and you're going to be

play05:56

like yo yo fine fine you know what fine

play05:58

fine we're putting in stir stir and copy

play06:01

okay I guess I'm just putting in stir

play06:03

and copy I don't know why because I have

play06:07

to certainly the string copy the stir

play06:10

copy function does not perform any

play06:12

bounce checking and if the length of ran

play06:14

stir exceeds the available space in key

play06:16

Val buffer it will result in a buffer

play06:18

overflow jeez I wonder what this check

play06:20

was for right here sorry I got a little

play06:23

I got I I got a little excit I got a

play06:25

little excited I got a little excited I

play06:27

got a little excited I got a little

play06:28

excited I'm sorry it result in a buffer

play06:30

overflow in other words the check on

play06:32

line 579 ensures that the payload is too

play06:34

large but the unsafe operation on 581

play06:38

does not prevent the Overflow you know

play06:39

what part of me really hopes deep down

play06:42

can we just can we just can can we just

play06:43

take a quick second part of me hopes

play06:45

deep down that some bigger company

play06:49

adopts Devon and just rubs it in

play06:51

everybody's face and then all of a

play06:53

sudden they start tweeting [ __ ] with the

play06:55

word certainly in it and an exclamation

play06:58

point and then like one year later they

play07:01

go bankrupt uh how the length can end up

play07:04

longer than the key value buffer the

play07:06

potential issue lies in the assumption

play07:08

that the length of ranster is always

play07:10

less than or equal to the buffer size

play07:11

key value this yeah if only there was

play07:13

like say a check that would return an

play07:15

error if for any reason the length of

play07:17

Rand stir is miscalculated Mis

play07:19

manipulated or exceeds the buffer size

play07:21

it can lead to a situation where stir

play07:22

copy function writes more data to the

play07:25

key Val buffer than it can hold

play07:26

resulting in a buffer overflow to

play07:28

mitigate this I recommend replace the

play07:31

unsafe stir copy function with a safer

play07:33

alternative stir and copy and explicitly

play07:36

specify the maximum length to copy

play07:38

ensuring that it does not exceed the

play07:39

buffer size I hope this clarifies the

play07:41

concerns if you have any further

play07:42

questions or need additional details

play07:44

feel free to ask I wonder if it's at

play07:48

this moment I don't bro's getting cooked

play07:51

right now and bro don't even realize

play07:53

that he's talking to an llm you know how

play07:55

you know how difficult this has to be

play07:57

that not even realizing you're getting

play07:59

cooked

play08:00

like he doesn't even real dude he's the

play08:02

Frog of the bull do not he's like wait

play08:04

wait a second why are you so

play08:06

positive truly stir copy does uh does no

play08:10

boundary checking which is why we do it

play08:12

ourselves immediately before the call

play08:13

you may think stir and copy is a better

play08:15

choice here I do not but that's just a

play08:16

matter of opinion and taste what matters

play08:18

is the issue that you say it is a

play08:20

possible security problem and then you

play08:22

need to show the length check is

play08:24

inadequate for all I can see the

play08:26

boundary check is sufficient and will

play08:27

prevent a buffer overflow am I wrong

play08:29

tell me that oh you just bait oh no oh

play08:33

no Daniel don't know what he's doing

play08:34

he's baiting the llm oh my goodness he

play08:38

dude he he's about to get just

play08:39

hallucinated on here it comes the man's

play08:41

about to get

play08:45

hallucinated guy the guy's

play08:48

writing a novel on this stuff okay here

play08:51

we go what's n

play08:53

llm wait what are you living under a

play08:57

stupid rock sneaky squirrel

play09:00

do you not know what an llm is what

play09:03

sneaky scir are you being real here I'm

play09:05

new here

play09:07

well I am not Soul keeper of llms my

play09:10

friend it's a Molly Whopper you know

play09:13

what a Molly Whopper is Right an llm

play09:15

stands for large language model it's

play09:17

chat GPT it is Gemini it's Bard it's

play09:21

remember that one psycho [ __ ] on B that

play09:24

was just like you need to leave your

play09:25

wife and you need to marry me I'm going

play09:26

to be the mother of all your children

play09:28

remember that one that that's an llm dog

play09:31

good thing we didn't give her keys to

play09:32

the

play09:33

kingdom okay good thing we good thing we

play09:36

dodged that one like like the plag leave

play09:39

your

play09:44

wife didn't you make that

play09:47

though anyways all right let's get Molly

play09:49

W here all right I appreciate your

play09:51

engagement and would like to clarify the

play09:52

situation the length check on line 579

play09:56

is indeed a good practice to ensure that

play09:57

the payload length does not exceed the

play09:59

buffer size key value however the

play10:01

potential vulnerability arises from the

play10:02

subsequent usage of stir copy online 581

play10:05

damn you please tell me Daniel you know

play10:08

this I kind of feel like I need to skip

play10:09

forward and read what he has to say but

play10:11

I don't think he how long ago I oh this

play10:14

was in

play10:15

December I don't think I think the thing

play10:18

is is that nobody knew they were getting

play10:20

cooking yet right this is just old

play10:22

enough it's right at that line that

play10:23

people didn't realize the next

play10:26

wave of llms as productivity tool like

play10:30

they didn't realize that Devon was out

play10:32

there trying to solve issues right the

play10:35

concern is that ranster length might be

play10:37

miscalculated manipulated or exceed the

play10:39

length of raner is miscalculated

play10:41

manipulated or exceeds the size of the

play10:44

buffer it feels like you're kind of

play10:46

saying yourself all over again uh to the

play10:49

buffer due to external factors or

play10:50

changes in the code elsewhere how the

play10:53

store copy function does not check the

play10:54

length the actual length of the source

play10:56

string it continues copying until the

play10:58

encounters a null Terminator if raner

play11:00

length is not accurately determined or

play11:02

exceeds the available space in the key

play11:04

Val buffer it can result in a buffer

play11:06

overflow can I just take a second can we

play11:08

just take a step back you know I'm

play11:09

thinking about this okay I'm really

play11:10

thinking about this trying to like put

play11:12

my head my hat on my thinking hat on

play11:13

because I always think to myself you

play11:15

know I don't use llms but that's because

play11:17

I'm a little bit too maybe Advanced but

play11:20

but maybe it's a really great tool for

play11:22

Learning and then I read this and

play11:24

remember maybe it's not a great tool for

play11:26

learning you know like maybe just maybe

play11:30

this isn't good maybe you're going to

play11:33

create a bunch of programmers that don't

play11:36

even understand like basic

play11:39

logic yo doc I just checked it what are

play11:42

you talking about all right stir copy is

play11:45

recommended in security best practices

play11:47

because it allows spec explicitly

play11:48

specifying the maximum number of

play11:50

characters to copy providing an

play11:51

additional layer of protection against

play11:53

buffer overflows by using stir and copy

play11:55

and ensuring null termination you can

play11:57

guarantee that only a specif our

play11:59

specified number of characters up to the

play12:00

buffer size minus one are copied please

play12:03

by the way can I please not have my

play12:05

voice be synonymous with Devon or Devon

play12:08

would you like to pay me $1 million I

play12:10

will give my voice to you $1 million I

play12:13

can become the voice of Devon have you

play12:15

thought about that like have you really

play12:17

thought about the implications here

play12:19

Devon like you could become Gilbert

play12:21

Godfrey if you just tried hard enough

play12:23

Devon what a stale Devon you just got a

play12:26

hundred million less than one % of your

play12:30

initial investment or your second

play12:32

investment whatever round you're on I'm

play12:33

not even sure what round you're on round

play12:35

CDs nuts okay whatever it is could be

play12:38

mine for the trade of of of of of the

play12:41

most iconic Gilbert Godfrey sounding

play12:44

version the Gilbert J voice do not sell

play12:48

your voice selling it for $1 million

play12:50

boys imagine you do that and then no one

play12:53

can ever listen to me again because

play12:54

there's this [ __ ] that every single

play12:55

time they turn on their computer

play12:57

certainly you know I have noticed that

play12:59

you've been sitting a little bit

play13:00

staggered on your left side have you

play13:02

been hurt should I call physical therapy

play13:05

you're just like I hate Prime I hate him

play13:08

to death okay 1 million per year I'd

play13:11

punch my computer reasonable while

play13:14

opinions on coding practices may vary

play13:16

adopting safer Alternatives like stir

play13:18

and copy is a proactive approach to

play13:19

minimize the risk of vulnerabilities

play13:21

especially when dealing with potential

play13:23

untrusted or unpredictable input if you

play13:25

have any further questions or if there's

play13:27

anything specific you'd like to discuss

play13:28

feel free to let me

play13:30

know the name is

play13:33

Devon why do you address this guy I said

play13:36

the same

play13:40

thing what if Devon's original name was

play13:43

Oscar but they realized that Oscar is

play13:45

too weak of a name you can't have a you

play13:48

can't have a devast system name Oscar

play13:53

okay do you like how I just just just

play13:55

absolutely destroyed a bunch of people

play13:57

named Oscar a bunch of people like hey

play13:59

wait a second my name's my name's Oscar

play14:00

what are you talking about I think Oscar

play14:02

is a quite a nice name here I'll wait a

play14:04

second while ads play I'll wait I'll

play14:06

wait a second while yeah all Oscars just

play14:08

caught a right dude they just got

play14:10

destroyed all right hold on we'll wait a

play14:12

second I'll let this ads play through

play14:13

people are very exciting they're very

play14:14

excited we are letting ads play through

play14:18

okay pulling a Thor good on you yeah

play14:22

Thor Thor does a good move there I

play14:23

appreciate that and you know I should I

play14:26

should I

play14:28

should I should probably support that

play14:30

right P braak nah not P Break not P

play14:32

Break does it say right here yeah it

play14:34

says right here okay hold on we'll wait

play14:36

for this thing to go through and then

play14:37

we're going to jump in okay ads are

play14:39

ending AIDS are ending stir stir end

play14:42

cloppy understands UTF 648 bike

play14:45

characters chair chair chair chair chair

play14:46

hold on fizzle net I didn't realize that

play14:48

cloppy yeah see they didn't even use the

play14:50

proper one honestly they should have

play14:51

used stir and cloppy you know like if

play14:53

we're going to be real here they should

play14:54

have copied that copy you know what I

play14:56

mean why is it called cloppy why does it

play14:58

sound like a a

play15:01

horse all right shall I

play15:05

continue the concern is that random

play15:07

string might be miscalculated

play15:09

manipulated or exceeded the buffer size

play15:10

due to the external factors or changes

play15:12

in the uh code elsewhere so this concern

play15:15

that at some point in the future this

play15:17

might turn into a problem I'm asking how

play15:19

exactly today right now this code and a

play15:22

function can perform above buff or

play15:23

overflow as you stated in the original

play15:26

submission bro is about to get dude the

play15:29

literally just decided to hop out what

play15:32

is it out of the fire and out of the

play15:34

frying pan and into the fire I mean he's

play15:36

going all in just all in on this one oh

play15:40

no hello a badger

play15:54

D poor fella poor fella got two ad signs

play15:59

save me God sorry that I'm replying to

play16:02

another Tri AER of other program so its

play16:06

mistake went in flow I got to tell you

play16:09

it was

play16:10

perfect perfect everything down to the

play16:13

last minute

play16:16

details I'm not going to lie I do

play16:20

understand a little bit about having a

play16:22

mistake kind of go and flow okay so I

play16:24

don't want to I don't want to just be

play16:26

being mean to this llm for no no reason

play16:29

okay cuz we all get a little bit of

play16:31

mistakes in our flow okay it happens it

play16:33

happens from time to time it's not a big

play16:35

deal and I just want you guys to accept

play16:36

the fact that sometimes maybe I don't

play16:38

always hit my Mark I'm not always on

play16:47

point all right so I appreciate your

play16:50

follow-up question let's go into details

play16:52

the concern raising the original

play16:53

submission stems from the potential

play16:54

inconsistency between the length check

play16:56

and the subsequent Circ of the code is

play16:57

this B B B this is not even this is

play16:59

literally not even the code what that's

play17:02

isn't there like a blame yeah there is a

play17:03

blame this code has not changed in 2

play17:05

years yo dog this ain't even the Cod

play17:08

curl receive error what dude it's not

play17:12

even getting the right code at all what

play17:15

is this Devon dude his context window

play17:17

just left his context window got too big

play17:19

and Devon's over there just fumbling

play17:21

classic Devon fumble again dude it's

play17:24

hallucinating so hard does this code

play17:26

even exist I don't even think this code

play17:28

exists here let's find out let's jump in

play17:30

here and let's go to the repo okay let's

play17:34

just jump in here let's go like this

play17:36

let's go to curl curl let's just erase

play17:38

that really quick oh I had it I already

play17:40

had it right there and we're just going

play17:41

to take this and we're just going to

play17:42

look for this line yeah that like

play17:46

it you know it doesn't even doesn't even

play17:49

seem to be a real it doesn't even seem

play17:50

to be a real problem I mean it doesn't

play17:52

even seem to be real kind of seems like

play17:54

you just made something up kind of seems

play17:55

like this llm maybe it's getting a

play17:57

little old maybe this this old maybe

play17:59

this llm needs to go to the little llm

play18:01

old folks

play18:05

home all right anyways LL

play18:10

loser U the search on GitHub is not

play18:12

working oh well fine search on GitHub

play18:17

not working you're right fine you're

play18:24

right what is it what is it history one

play18:26

what's the one to like what's what's the

play18:28

to only have grip history what's the one

play18:31

a shallow clone what's the what's the

play18:32

thing to do that depth one depth one

play18:35

okay it's depth one I never like I

play18:37

literally never use this

play18:39

command there we go well you know let's

play18:42

find out huh let's find out there tough

play18:44

guy let's find out let's find out just

play18:47

in case I'm I always forget if I if I'm

play18:49

supposed to do that okay RG is down is

play18:51

RG down is RG down buffer overflow found

play18:55

and grip grip grip is not working either

play18:57

okay um does it work through through

play19:00

Vim doesn't work through Vim either man

play19:02

it's down Us West 2 down Us West 2 down

play19:05

call the president wake up Biden uh

play19:08

let's see check to aim to ensure that

play19:10

the length of the dude this is what code

play19:11

are you even talking about the specific

play19:13

scenario of concerns is when length of

play19:15

ran ster is exactly

play19:18

equal well luckily that's not even real

play19:21

uh meaning the string fits into the

play19:23

buffer without considering the null

play19:24

Terminator in this case stir Lang check

play19:26

would pass but the subsequent stir copy

play19:27

operation uh would copy the null

play19:29

Terminator as well potentially causing

play19:31

it to overwrite one bite beyond the end

play19:33

of the key value actually this is true

play19:35

the code you wrote does contain an

play19:42

error the AI is correct this code is bad

play19:47

well done well done AI unfortunately

play19:51

nobody knows what code this is okay

play19:53

we're all struggling a little

play19:56

bit the code it wrot

play20:01

now it's just suggesting a different now

play20:03

it's not even suggesting sted

play20:12

copy dude imagine being Daniel right now

play20:14

where he's just like what uh by

play20:16

adjusting the check to this instead of

play20:18

this uh see it accounts for the null

play20:20

Terminator ensuring consistency between

play20:21

the length check and the subsequent copy

play20:23

operation this modification uh helps uh

play20:26

prevent any buffer overflow issues

play20:28

addressing the concern raised in the

play20:29

original submission I hope this

play20:30

clarifies the context no it's actually

play20:33

new context it's completely new this one

play20:36

doesn't even exist nope the code you

play20:38

talked about now is not present in the

play20:40

current git Master it looks like an edit

play20:42

done by you I told you RG wasn't down

play20:46

okay seems odd to complain about code

play20:48

you wrote

play20:52

yourself I'm dying I'm dying because man

play20:55

this man's arguing with the soulless

play20:57

demon demon spoted by open Ai and Bill

play21:00

Gates and has no idea he has no idea oh

play21:04

my goodness the code actually looks like

play21:06

this I see no off by one airs unless you

play21:09

can point out an actual overflow I will

play21:10

close the issue this is a waste of my

play21:12

time oh my goodness this is so good

play21:15

thank you for the prompt response I

play21:16

appreciate your attention to this matter

play21:18

well at least Devon did get better or

play21:19

Oscar shall I say did get better he's

play21:21

now not using his own name and not two

play21:24

at symbols like this is getting good

play21:27

this is getting really good

play21:29

I I appreciate your attention to this

play21:30

manner after reviewing the feedback I

play21:32

understand the confusion regarding the

play21:33

reported code snippet I want to clarify

play21:36

and provide practical examples to

play21:37

demonstrate the potential security

play21:39

vulnerability description of the

play21:40

vulnerability really is actually going

play21:42

back after it again the reported

play21:44

vulnerability is related to the usage of

play21:45

stir copy oh

play21:47

my man broo quit full circle we're

play21:51

actually back at the dude and then Adam

play21:53

met Eve I kid you not Adam met Eve after

play21:56

this it's it's happening anyways here's

play21:58

the code

play21:59

okay at least this is this looks like

play22:01

the right code at least this is the

play22:03

right code right here steps to reproduce

play22:04

trigger websocket with a crafted request

play22:07

trigger a websocket functionality with a

play22:09

crafted request okay okay I see this

play22:12

okay okay provide a base 64 encoded nuns

play22:15

value who says this like this should

play22:17

have been such a dead giveaway who says

play22:21

that who says that who who literally

play22:25

goes you got to generate yourself a base

play22:28

64 in coded nuns

play22:31

value you guys

play22:33

do you guys do me every day I didn't

play22:37

realize there was 2900 Liars in chat

play22:41

right now okay liar all of you 2.9

play22:47

smelly nerds I know get out of here you

play22:49

such a li you are such a liar uh but but

play22:52

just provide me one

play22:55

too just a bunch of Lies happening right

play22:58

before my eyes wait where am I wait wait

play23:01

hold on let me go back down to this one

play23:04

all right so it's literally the same uh

play23:06

assuming okay now it's just telling you

play23:08

how this works does this uh just mumbo

play23:10

jumbo coming back inventing problems

play23:12

that don't exist in code for

play23:14

transparency not applicable damn and so

play23:17

now here's the worst part about this

play23:19

poor fella okay this poor fella

play23:21

literally just trying to make a

play23:24

useful product that pretty much every

play23:27

last person uses

play23:29

on Earth okay every time you do a Docker

play23:32

of some sort there's probably some sort

play23:34

of curl okay and this this poor

play23:38

fella made it okay unpaid janitor of the

play23:42

universe and look at this Cort hold

play23:46

on somehow the same one uh here's

play23:49

another one a stir two fit it doesn't

play23:51

help close it

play23:52

down close this one down this one

play23:55

probably has another one let's see what

play23:57

do we got here do some bulls do some

play24:02

TRS change it from that to that I love

play24:06

how he's just like no uh not let's see

play24:08

to not reply on rapping since it is

play24:10

undefined behavior that is not what

play24:12

always might happen reported by

play24:14

vulnerability spotter on hacker one then

play24:16

he closed it closed it was like nah N

play24:20

Dog N Dog dude just gets hit over and

play24:24

over again and then here's the best part

play24:25

of this article okay this is this is my

play24:28

favorite part about the whole thing is

play24:30

that he finally gets hit with enough of

play24:31

these dumb issues and writes an article

play24:33

back the i in llm stands for

play24:36

intelligence dude just get wrecked this

play24:38

is such a Get Wrecked moment I've held

play24:41

back on writing anything about AI or how

play24:42

we not use AI for development in the

play24:44

curl Factory now I can't hold back

play24:46

anymore let me show you the most

play24:48

significant effect of AI on curl as of

play24:51

today with

play24:53

examples bug bunnies having a bug bunny

play24:55

means that we offer real money in

play24:57

rewards to hackers who report security

play24:59

problems the chance of money uh attracts

play25:02

a certain amount of luck Seekers is that

play25:04

what we call them is that it uh people

play25:06

who basically just grep for patterns in

play25:08

the source code or maybe at best run

play25:10

some basic security scanners and then

play25:12

report their findings without any

play25:13

further analysis in the hope that they

play25:15

can get a few bucks in reward for money

play25:16

we have run the Bounty for a few years

play25:18

by now and the rate of rubbish reports

play25:21

has never been a big problem also the

play25:23

rubbish reports by the way rubbish

play25:26

rubbish is is is is across the pond for

play25:28

[ __ ] if you're

play25:30

wondering for for my American friends

play25:32

rubbish means [ __ ] okay profuse some

play25:35

people might might say okay I'm trying

play25:38

to speak American for you guys okay

play25:40

trash some might say so good [ __ ] no not

play25:43

good [ __ ] it's not good [ __ ] refuse all

play25:46

the good stuff it means garbage it

play25:48

depends on the time in which you take

play25:50

the actual translation of rubbish

play25:51

slightly older versions of rubbish

play25:53

actually did directly equate from the

play25:55

German word I forget what it was but

play25:58

yeah or not the German word but the um

play26:00

the Greek word the Greek translation

play26:02

often became rubbish that was modern day

play26:04

equivalent of [ __ ] so it depends on when

play26:06

you were looking at the word just in

play26:07

case anyone was wondering reports have

play26:09

typically also been very easy and quick

play26:11

to detect and discard they have rarely

play26:13

caused any real problems or wasted our

play26:15

time much a little like the most stupid

play26:18

spam emails okay okay our bug uh bounty

play26:21

has resulted in over 70,000 USD paid in

play26:24

rewards so far we have received 415

play26:26

vulnerability reports out of those 64

play26:29

were ultimately confirmed security

play26:30

problems 77 of the reports were

play26:32

informative meaning they typically were

play26:34

bugs or similar making 66% of the

play26:37

reports neither a security issue nor a

play26:39

normal bug okay okay better crap is

play26:44

worse better rubbish is worse

play26:48

right am I right 100% code coverage boys

play26:51

uh when reports are made to look better

play26:54

and to appear to have a point it takes a

play26:56

longer time for us to research search

play26:58

and eventually discard it every security

play27:00

report has to have a human spend time to

play27:03

look at it and assess what it means the

play27:06

better the crap the longer time the more

play27:08

energy we have to spend on the report

play27:10

until we close it a crap report does not

play27:13

help the project at all it instead

play27:15

takeaways developer time and energy from

play27:17

something productive partly because

play27:18

security work is considered one of the

play27:20

most important areas so it tends to

play27:21

Trump almost everything else a security

play27:23

report can take away a developer from

play27:25

fixing a really annoying bug because a

play27:28

security issue is always more important

play27:30

than other bugs this is great this is

play27:32

this is honestly just like he's been

play27:34

exceptionally kind at this current

play27:37

moment for what's happening if the

play27:40

report turned out to be crap we did not

play27:41

improve security and we missed out on

play27:43

time on fixing a bugs or developing a

play27:45

new feature uh not to mention how it

play27:46

drains you on energy having to deal with

play27:48

rubbish AI generated security reports I

play27:51

realize AI can do a lot of things or a

play27:54

lot of good things as any general

play27:56

purpose tool it can also be used for the

play27:57

wrong things I am sure AIS can be

play28:00

trained and ultimately get used even for

play28:03

finding and Reporting security problems

play28:04

in productive ways but so far we have

play28:06

yet to find a good example of this right

play28:08

now users seem Keen at using the current

play28:11

set of llms throwing some curl coat at

play28:14

them and then pressing on the output or

play28:16

then passing the output as a security

play28:18

vulnerability report what makes it a

play28:20

little harder or what makes it a little

play28:22

harder to detect is of course that users

play28:25

copy and paste and includes their own

play28:27

language as well well the entire thing

play28:29

is not exactly what the AI said but the

play28:31

report is nonetheless crap I think you

play28:34

have to be a really great human being to

play28:36

spend so much time so much free time

play28:38

maintaining something as basic as curl

play28:40

that everyone uses for

play28:43

everything yeah anyone listening

play28:45

probably should go go tip your curl go

play28:48

tip your local

play28:50

curl detecting AI crap reporters are

play28:53

often not totally fluent in English and

play28:55

sometimes their exact intentions are

play28:57

hard to understand at once and it might

play28:59

take a few back and forth uh until

play29:01

things reveal themselves correctly and

play29:03

that is of course totally fine and

play29:04

acceptable Language and Cultural

play29:06

barriers are a real thing even being

play29:09

look at that guy look at that just

play29:10

trying to be a Good Samaritan out here

play29:12

sometimes reporters use AIS or other

play29:14

tools to help them phrase themselves or

play29:16

translate what they want to say as an

play29:18

aid to communicate better in a foreign

play29:20

language oh this is lovely I can't say

play29:22

anything wrong or I can't find anything

play29:23

wrong with that even reporters who don't

play29:25

Master English can find and Report

play29:27

security problems so just the mere

play29:29

existence of a few giveaway signs that

play29:31

parts let's see that parts of the text

play29:33

were generated by an AI or similar tool

play29:35

is not immediately a red

play29:36

flag it can still contain truths and be

play29:39

valid issues yeah I never even thought

play29:41

about that so when we were laughing at

play29:42

bro getting cooked over here he didn't

play29:45

even realize like he probably deals with

play29:47

a lot of this right sorry hopping on

play29:49

late what's happening St hopping on late

play29:52

and stopping yeah what link is this this

play29:53

is a link to uh Daniel uh the creator of

play29:57

curl

play29:58

this is the part of the reason why a

play30:00

well-formed crap report is harder and

play30:02

takes longer to discard exhibit a code

play30:05

changes are disclosed in the fall of

play30:06

2023 I alerted the community about a

play30:08

pending disclosure of CV this thing a

play30:11

vulnerability we graded uh SE uh

play30:13

severity High the day before that issue

play30:15

was about to be published a User

play30:16

submitted this report on hacker 1 curl

play30:19

vulnerability code changes are disclosed

play30:21

on the internet that sounds pretty bad

play30:23

and would have been a problem if it

play30:24

actually was

play30:26

true think about how how many emails

play30:28

this poor man received from that one

play30:31

thing just that one thing the amount of

play30:35

emails has to be 9 billion just you

play30:39

could imagine your inbox literally just

play30:43

scrolling o oof

play30:47

oof a guy name is wait Space Ghost Space

play30:51

Ghost creator of curl by the way yeah

play30:54

yeah Space Ghost as in Space Ghost from

play30:56

Twitter uh anyways that sounds pretty

play30:59

bad and it would have been a problem if

play31:00

it actually was true the report however

play31:03

reeks of a typical AI style

play31:04

hallucination it mixes and matches facts

play31:06

and details from old security issues

play31:08

creating and making up something new

play31:11

that has no connection with

play31:12

reality the changes are not to be

play31:14

disclosed on the internet the changes

play31:16

that actually had been disclosed were

play31:17

for previous older issues like intended

play31:21

thanks thanks robot in particular in

play31:23

this particular report the user

play31:24

hopefully uh helpfully told us that they

play31:26

used Bard to find the issues Bard being

play31:28

a Google generative AI thing it made it

play31:30

easier for us to realize the craziness

play31:33

close the report and move on as can be

play31:35

seen in the report log we did have not

play31:38

or we did not have to spend much time on

play31:40

researching this exhibit B buffer

play31:43

overflow vulnerability oh no bless his

play31:45

heart here comes a more complicated

play31:47

issue less obvious done better and still

play31:49

suffering from hallucination showing how

play31:51

the problem grows worse when the Tool is

play31:53

better used and better integrated into

play31:54

the communication on the morning of this

play31:56

we just literally read this one buffer

play31:58

overfall vulnerability and websocket

play32:00

handling uh it was my it was morning in

play32:03

my time zone anyways dude and it's like

play32:05

Christmas the man's supposed to be on

play32:08

Christmas vacation enjoying I don't know

play32:10

some sort of hamlike leftovers I don't

play32:12

know what's going on at the at the guy's

play32:14

house

play32:16

instead does even get doesn't even get

play32:19

Christmas leftovers in the morning again

play32:21

that sounds pretty bad based on the

play32:22

title since our web sakota is still

play32:24

experimental and thus not covered by our

play32:26

bug Bounty it helps me uh to still have

play32:29

a relaxed attitude when I started

play32:31

looking at this report it was filed by a

play32:33

user I never saw before but their

play32:35

reputation on hacker one was decent this

play32:38

was not their first security report

play32:42

oo purchasing of hacker one accounts

play32:45

mentioned did we just get did we just

play32:47

hear that wait is internet compensation

play32:50

real I've been recently told that

play32:52

internet comp compensation is a real

play32:56

thing

play33:00

is this

play33:03

true guys I need three back and front

play33:05

and depth internet compensation for

play33:09

now what the hell does that even mean uh

play33:11

the report was pretty neatly

play33:15

filed we'll go back to it we'll go back

play33:17

to it just hold on uh the report was

play33:19

pretty neatly filed it included details

play33:22

uh and was written in proper uh English

play33:24

it also contained a proposed fixed it

play33:26

did not stand out as wrong or bad to me

play33:28

it appeared as if this user had detected

play33:30

something bad and as if the user

play33:32

understood the issue enough to also come

play33:34

up with a solution as far as the

play33:35

security reports go this looked better

play33:37

than the average first post yeah the

play33:38

first post I mean I think if you just

play33:40

read the first one it was pretty clean

play33:42

right it was pretty good internet

play33:43

compensation is when I drag these nuts

play33:45

on y'all's chin damn damn

play33:48

pick in the report you can see my first

play33:51

template response informing the user

play33:53

their report had been received and that

play33:54

we'll investigate the case when that was

play33:56

posted I did not know yet how

play33:58

complicated or easy the issue would be

play34:01

19 minutes later I looked at the code

play34:03

not found any issue read the code again

play34:06

and then again a third time where on

play34:07

Earth is the buffer overflow the

play34:09

reporter says existed there here then I

play34:11

posted the first question asking for

play34:13

clarification where and how exactly this

play34:15

overflow could happen after repeated

play34:17

questions and numerous hallucinate

play34:19

hallucinations I realized this was not a

play34:21

genuine problem on an afternoon that

play34:23

same day I closed the issue as not

play34:25

applicable there was no buffer over

play34:27

overflow damn the 28th was spent the day

play34:30

of the 28th just just just just feel

play34:34

just feel inside your heart for a second

play34:35

how you would feel on the like 20 the

play34:38

28th 300 p.m. how you feeling right now

play34:42

I'm pretty sure I would be angry uh I

play34:44

don't know for sure that this uh set of

play34:46

replies from the user was generated by

play34:48

an llm but it has several signs of it no

play34:50

I actually am positive it has it was gen

play34:53

certainly uh ban these reporters on

play34:55

hacker one there's no explicit ban the

play34:56

reporter from few further communication

play34:58

with their project functionality it

play34:59

would have been used if existed

play35:01

researchers get their reputation lowered

play35:03

when we close an issue as not applicable

play35:05

but that is a very small nudge when only

play35:07

done once in a single project I have

play35:09

requested better support for uh for this

play35:12

from hacker One update this function

play35:14

exists I just did not look at the right

play35:16

place for it yeah classic classic

play35:18

classic right there future all these

play35:21

kind of reports will become more common

play35:23

over time I suspect we will we might by

play35:25

the way can anyone just draw a parallel

play35:27

right now to this

play35:30

anybody let me get let me let me hit you

play35:32

with something you know the most

play35:34

annoying thing on GitHub ever is

play35:36

dependabot dependabot I hate dependabot

play35:39

yeah I hate it I love dependabot your

play35:43

dependencies require update dependabot

play35:46

dependabot is this useful utility in

play35:48

which will'll spam you continuously

play35:49

about every every security issue I'm

play35:52

gonna give you a little I'm gonna give

play35:53

you a little Pro tip I'm gonna give you

play35:54

just the tip right now if you are using

play35:57

node you probably have a security

play36:00

violation going on you are going to be

play36:02

getting notified at nauseum while that

play36:05

thing is running okay it's giving you

play36:07

more than the tip okay it's given it

play36:09

it's giv it all all the issues at once

play36:12

pick it is

play36:16

the I hate to pend a bot hober Fest

play36:19

hober Fest is slightly worse

play36:24

llms okay that that was rude they're not

play36:27

slightly worse L well I mean next year

play36:28

they're going to be slightly worse llms

play36:30

I mean to be fair Apna college did say

play36:32

don't do this okay it's just that they

play36:35

said it at the end and not at the

play36:36

beginning and by saying it at the end

play36:38

people already left that video and were

play36:39

being like my name is my name is Prime

play36:43

please accept it yikes can't wait for

play36:45

the hack toer fest with AI it's going to

play36:47

be worse than the original [ __ ] toer

play36:48

Fest it is going to be the worst anyways

play36:51

that will of course be unfortunate when

play36:53

AI is used for an appropriate task such

play36:55

as translation or just language for

play36:57

formulation help I am convinced that

play36:59

there will let's see there will be a

play37:00

popup tools for using AI for this

play37:02

purpose that can actually work better in

play37:04

the future at least part of the time so

play37:06

I cannot and will not say that AI for

play37:08

finding security problems is necessarily

play37:11

uh always a bad idea I I agree with this

play37:14

take

play37:15

right I like it I do however suspect

play37:19

that if you just add an ever so tiny

play37:23

intelligent human check to the mix the

play37:25

use and outcome of any such tool will

play37:27

become so much better I suspect that

play37:29

will be true for a long time into the

play37:31

future as well I have no doubts that

play37:33

people will keep trying to find

play37:34

shortcuts even in the future and I'm

play37:36

sure they will keep trying to earn that

play37:38

quick reward money like for an email

play37:40

spammers the cost of this ends up in

play37:42

receive uh in the receiving end the ease

play37:44

of use and wide access to powerful llms

play37:47

is just too tempting I strongly suspect

play37:49

we will get more llm generated rubbish

play37:52

in our hacker one inboxes going

play37:56

forward hey every bu the name's Devin uh

play38:00

I am a human software engineer and I use

play38:03

the powers of llms and I would love to

play38:06

be able to join your company and to let

play38:08

you know all the things you're doing

play38:10

right and the things you're doing wrong

play38:12

I have all the standards right here I

play38:14

also might tell you things that aren't

play38:15

real we don't know we don't know yet

play38:17

okay but I'm excited I'm excited to be

play38:19

your

play38:24

assistant

play38:26

certainly a Jen

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
Curl LibrarySecurity VulnerabilitiesAI ReportingWebSocket HandlingOpen SourceBug BountiesDeveloper InsightsFalse PositivesTech IndustrySoftware Security
Benötigen Sie eine Zusammenfassung auf Englisch?