Remix.run Logo
sva_ 17 hours ago

Couldn't you just make it write a PoC?

tptacek 10 hours ago | parent | next [-]

Yes, you can. I strongly encourage people skeptical about this, and who know at a high-level how this kind of exploitation works, to just try it. Have Claude or Codex (they have different strengths at this kind of work) set up a testing harness with Firecracker or QEMU, and then work through having it build an exploit.

weird-eye-issue 15 hours ago | parent | prev | next [-]

Still have to validate it.

matthewfcarlson 13 hours ago | parent [-]

I’ve started to see bug bounty programs put flags into the product (see apples target flags https://security.apple.com/bounty/target-flags/).

I wonder if it’s partially to make it easier to validate from an AI perspective

Gregaros 16 hours ago | parent | prev [-]

[flagged]