| ▲ | justincormack 3 hours ago | |||||||
Software security heavily favours the attacker (ex. its much easier to find a single vulnerability than to patch every vulnerability). Thus with better tools and ample time to reach steady-state, we would expect software to remain insecure. | ||||||||
| ▲ | pants2 2 hours ago | parent | next [-] | |||||||
If we think in the context of LLMs, why is it easier to find a single vulnerability than to patch every vulnerability? If the defender and the attacker are using the same LLM, the defender will run "find a critical vulnerability in my software" until it comes up empty and then the attacker will find nothing. Defenders are favored here too, especially for closed-source applications where the defender's LLM has access to all the source code while the attacker's LLM doesn't. | ||||||||
| ||||||||
| ▲ | conradkay 2 hours ago | parent | prev | next [-] | |||||||
That generally makes sense to me, but I wonder if it's different when the attacker and defender are using the same tool (Mythos in this case) Maybe you just spend more on tokens by some factor than the attackers do combined, and end up mostly okay. Put another way, if there's 20 vulnerabilities that Mythos is capable of finding, maybe it's reasonable to find all of them? | ||||||||
| ||||||||
| ▲ | fsflover 2 hours ago | parent | prev [-] | |||||||
This is only true if your approach is security through correctness. This never works in practice. Try security through compartmentalization. Qubes OS provides it reasonably well. | ||||||||