| ▲ | Bender 8 hours ago | |||||||||||||||||||||||||
Along this line can AI's find backdoors spread across multiple pieces of code and/or services? i.e. by themselves they are not back-doors, advanced penetration testers would not suspect anything is afoot but when used together they provide access. e.g. an intentional weakness in systemd + udev + binfmt magic when used together == authentication and mandatory access control bypass. Each weakness reviewed individually just looks like benign sub-optimal code. | ||||||||||||||||||||||||||
| ▲ | cluckindan 8 hours ago | parent [-] | |||||||||||||||||||||||||
Start with trying to find the xz vulnerability and other software possibly tying into that. Is there code that does something completely different than its comments claim? | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||