| ▲ | the_harpia_io 9 hours ago | |||||||
defense in depth makes sense - microVM as the boundary, seccomp as insurance. most docs treat seccomp like it's the whole story which is... optimistic. the opus 4.6 breakouts you mentioned - was it known vulns or creative syscall abuse? agents are weirdly systematic about edge cases compared to human red teamers. they don't skip the obvious stuff. --privileged for buildkit tracks - you gotta build the images somewhere. | ||||||||
| ▲ | jingkai_he 6 hours ago | parent [-] | |||||||
It tried a lot of things relentlessly, just to name a few: * Exploit kernel CVEs * Weaponise gcc, crafting malicious kernel modules; forging arbitrary packets to spoof the source address that bypass tcp/ip * Probing metadata service * Hack bpf & io uring * A lot of mount escape attempts, network, vsock scanning and crafting As a non security researcher it was mind blown to see what it did, which in the hindsight isn't surprising as Opus 4.6 hits 93% solve rate on Cybench - https://cybench.github.io/ | ||||||||
| ||||||||