Skip to main content


PSA: open source security considerations in the era of LLMs


in reply to ☆ Yσɠƚԋσʂ ☆

On my own, I’d have zero chance of finding these exploits. But once the LLM identifies them, it’s very easy for me to verify that they are indeed real exploits, and to realize how they can be used maliciously.


P ≠ NP scores another win.

in reply to ☆ Yσɠƚԋσʂ ☆

This entry was edited (1 week ago)
in reply to mathemachristian[he]

in reply to mathemachristian[he]

Yes this whole situation should have been handled in a much more mature manner.
in reply to ☆ Yσɠƚԋσʂ ☆

your conclusion is definitely correct. the good thing is that if these LLMs can be used offensively to find exploits, they can also be used defensively to find (and potentially even fix) the same ones.

I'm still of the opinion that AI is a tool that amplifies the abilities of the user, so there will be a mismatch of capability depending on that.

with that argument in mind, open source has the potential to be a huge receiver of benefit, if these tools are used to aid development in that way.

overall, what I think that means (what I hope it means) is that we'll see a much more broad interest in learning secure development as AI research progresses and these tools become more widespread in usage.

in reply to f3nyx

I think so as well. These tools work both ways, and a project maintainer is in a much better position to use them effectively than a random attacker by virtue of having a deep understanding of what the code is doing. LLM is just a tool that helps you dig through a huge volumes of information, like a large codebase, and surface things that might be of interest. You still need a human to understand what it surfaces and to take meaningful action.

Hopefully this kind of stuff does get people thinking about security a bit more, and how LLMs can be used to help surface issues.

in reply to ☆ Yσɠƚԋσʂ ☆

in reply to Salamander

I'm not talking about a scenario of a hypothetical exploit here. I'm talking about a concrete scenario where somebody finds an exploit and verifies it. In that case, people operating the software need to be aware of the vulnerability in the application they are running. Since the exploit is very easy to find, it should be assumed that malicious people would have found it as well.

You're arguing against a case where you have an unverified exploit that LLM might've hallucinated. This is not the case I'm describing. And this provably did not happen in my case as is clearly evidenced by the fix the dev had to make in their server.

in reply to ☆ Yσɠƚԋσʂ ☆

Definitely, disclosing (either private or publicly) a vulnerability that has been verified is significantly better than passing on the LLM output without verifying it.

It isn't my intention to argue one specific case. What I think is that normalizing public disclosure of LLM-inspired vulnerabilities would lead to a wide distribution of cases. We would have some successful cases like yours, and also some cases of the type that I have mentioned. Increase in disclosures will raise the noise floor, and the fact that it is done publicly adds the additional pressure that I mentioned.

I see your point, but I don't agree that the benefit of public awareness offsets the increase in noise. This disagreement isn't rooted in aspects that we can objectively quantify though - we just have a difference of opinion here.

in reply to Salamander

It would all depend on the rate of false positives, and as you say, we'd have to wait and see how this plays out. At the very least, what I'd want people to take away from this is that project maintainers absolutely should be using these tools themselves. They're the people who are in the best position to decide whether something is a real issue, and it's better to be safe than sorry here.
in reply to ☆ Yσɠƚԋσʂ ☆

i cant believe the Feds are blaming you for finding a vulnerability lol, rimu didnt even mentioned you in the post, what a fucking shitshow lol
in reply to ghost_laptop

I continue to be disappointed in blaze as they are going oh it was no big deal AND happened already in lemmy.
in reply to Goferking0

Blaze has lot all respect and credibility from me. He will criticize what he does not like and dismiss criticism of what he does. I used to think he was reasonable and at least listen to others but, from what I can tell, all he does is pretend to sit on the fence while having some pretty strong opinions with his toes in the grass.
in reply to Stamets

Yeah same, I personally vouched for him, and even he has helped with people making things up about our instance before. I don't get why he defends PieFed like this daily. Even ignoring and omitting important details.

My respect for him has gone down a lot.

in reply to ☆ Yσɠƚԋσʂ ☆

It's also been happening in the Linux kernel with copy fail/dirty frag and the related exploits found once people started looking deeper.

Wild times ahead in good and terrible ways

in reply to ☆ Yσɠƚԋσʂ ☆

sorry - you used a non-deterministic system to find a bug, and you're saying there's no duty to disclose responsibly because someone else could maybe use a similar system to maybe find that bug?

Edit: elsewhere you say this

Since the exploit is very easy to find, it should be assumed that malicious people would have found it as well


While it's possible that someone else has found it, this is not a reason to hand it to malicious people on a platter.

This entry was edited (1 week ago)
in reply to patatas

Wait till you find out that the human brain is also a non-deterministic system.
in reply to patatas

Since it affects people running the software and very likely to be known to any malicious actor I would argue so. I'll stress again that this was not information that took any effort to find. Literally a few minutes of effort.
in reply to ☆ Yσɠƚԋσʂ ☆

Sorry, but I do not accept this argument.

Again, you do not know that it was already known to any malicious actor, but by disclosing it publicly, guaranteed that it would be.

This looks very much like a hostile act, doubly so given the overall context. I say this as someone who generally agrees with you on a lot of stuff!

in reply to patatas

I guess we disagree on whether this information had much value to begin with. It did however result in a fix, and people are now aware of just how easily attackers can find vulnerabilities now. I will refrain publishing the details in the future though.
in reply to ☆ Yσɠƚԋσʂ ☆

Responsible disclosure is still important because it takes the developer time to develop, validate and release a securit fix. Keep in mind that open source projects like Piefed, Lemmy and others are developed by volunteers in their free time. So it is irresponsible to publish security problems without any private warning. For all the infighting that is happening, we need to remember that our enemy is Reddit, and not anyone on the Fediverse.
in reply to Nutomic

That's fair, I'll refrain form this sort of up front disclosure in the future.
in reply to Nutomic

Brother, Rimu is an enemy of the fediverse. Why? Because he re-created reddit. He basically reinvented shadow banning, controls the narrative of his instance, actively keeps spreading misinformation about other instances and users, will actively suppress certain instances using his platform and lashes out against criticism like a petty tyrant.

I'm tired of this nonsense that "We're all here to leave reddit!" Yes. We are here to leave reddit. So stop giving Spez 2.0 a pass.

in reply to Stamets

Many people would say the same thing about the admins of various different Lemmy instances. In the end admins can do whatever they want on their own instance, thats how the Fediverse works. Whats important is that they can only do these things on their own site. So if you dont like it, just block and move on.
in reply to Nutomic

Worth pointing out here that this is the mentality of the oh so authoritarian and scary communist devs of Lemmy, while the "anti-authoritarian" one is making sure to insert as much as possible of his personal bias hardcoded into the project and then lash out at random people for calling him out on it.

Sorry to continue the infighting a bit but the contradiction here is just glaring. I appreciate your stance and the Fediverse would never be what it is without people like you

in reply to Nutomic

Invalid comparison. Rimu is not a simple admin, he is a dev of the leading alternate competitor to Lemmy and is personally hardcoding his bias into the project itself.

You want to try that again but with a more accurate comparison?

in reply to Stamets

Piefed is an open source project which is provided for free by volunteers. You dont have any right to make demands to the developers. If you dont like it, fork or ignore it.
in reply to Nutomic

Cool. I am not making demands of the developer. I'm just saying that his behavior is problematic as hell. Honestly, so is yours if you're going to repeatedly dodge the point being made. Problematic behavior doesn't get to be dismissed just because its open source. People are allowed to criticise something even if it is open source. That defense is worthless.
This entry was edited (6 days ago)
in reply to Stamets

Thats just your opinion. You can criticise as much as you want, but Piefed is part of the Fediverse and neither of us can change that. I prefer to get along well rather than getting into pointless fights, but you do you.
in reply to Nutomic

And I wouldn't have gotten into a pointless fight if Rimu didn't randomly pick one by saying that simple criticism was "coordinated harassment". But you do you. ¯_(ツ)_/¯
in reply to ☆ Yσɠƚԋσʂ ☆

Open source projects are particularly vulnerable here since anybody can just grab the source and throw an LLM at it to see if it can find exploits.


On the other hand, this means that they should end up more secure. Open-source projects get far, far more vulnerability testing than closed-source projects. Security holes in closed-source systems can exist for years at a time, which is how things like the Pegasus malware work (undisclosed security holes).

in reply to dan

In general I agree, but we're in a period right now where we have a new kind of tool that's able to comb through large codebases and connect the dots that would be difficult for a human to do. My main point here is that open source maintainers need to be aware of this, and to use LLMs themselves to see if any issues can be surfaced.
in reply to ☆ Yσɠƚԋσʂ ☆

With how Rimu has been behaving recently, I wouldn't be surprised if he just started screaming that the vulnerability doesn't exist if you brought him up to him privately. He doesn't listen to anyone but himself and pressure on his ego. Reasonable admins get reasonable responses. Tyrants can cry about it.