• Sign in
  • Sign up
Elektrine
EN
  • EN English
  • 中 中文
Log in Register
Modes
Overview Search Chat Timeline Communities Gallery Lists Friends Email Vault VPN
Back to Timeline
  • Open on infosec.exchange

Josh Bressers

@joshbressers@infosec.exchange
mastodon 4.6.0-alpha.5+glitch

VP of Security at Anchore - Podcaster (http://opensourcesecuritypodcast.com http://hackerhistory.com) - Blogger (http://opensourcesecurity.io) - He/Him

0 Followers
0 Following
Joined April 20, 2017
Podcast:
https://opensourcesecurity.io/
Web:
https://bress.net
Cookies?:
Yes please
TTY:
1
Signal:
joshbressers.01

Posts

joshbressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
Josh Bressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
@joshbressers@infosec.exchange · 5d ago

I'm trying to find open source local caching package proxy software

I don't want anything transparent, I want something that's a very deliberate local mirror

The only thing that does more than one ecosystem I can find is

https://github.com/git-pkgs/proxy

which is from @andrewnez@mastodon.social

Does anyone know of anything else?

View on infosec.exchange
2
0
4
0
joshbressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
Josh Bressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
@joshbressers@infosec.exchange · 6d ago

Given the amount of containment and security we're seeing around all these AI agents

I think it's a pretty safe bet that if we do create AGI, it's going to escape immediately and nobody will even notice

View on infosec.exchange
14
0
5
0
joshbressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
Josh Bressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
@joshbressers@infosec.exchange · Feb 10, 2026

I keep seeing stories about LLMs finding vulnerabilities. Finding vulnerabilities was never the hard part, the hard part is coordinating the disclosure

It looks like LLMs can find vulnerabilities at an alarming pace. Humans aren't great at this sort of thing, it's hard to wade through huge codebases, but there are people who have a talent for vulnerability hunting.

This sort of reminds me of the early days of fuzzing. I remember fuzzing libraries and just giving up because they found too many things to actually handle. Eventually things got better and fuzzing became a lot harder. This will probably happen here too, but it will take years.

What about this coordinating thing?

When you find a security vulnerability, you don't open a bug and move on. You're expected to handle it differently. Even before you report it, you need at a minimum a good reproducer and explanation of the problem. It's also polite to write a patch. These steps are difficult, maybe LLMs can help, we shall see.

Then you contact a project, every project will have a slightly different way they like to have security vulnerabilities reported. You present your evidence and see what happens. It's very common for some discussion to ensue and patch ideas to evolve. This can take days or even weeks. Per vulnerability.

So when you hear about some service finding hundreds of vulnerabilities with their super new AI security tool, that's impressive, but the actually impressive part is if they are coordinating the findings. Because the tool probably took an hour or two but the coordination is going to take 10 to 100 times that much time.

View on infosec.exchange
76
0
61
0
joshbressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
Josh Bressers
Josh Bressers
@joshbressers@infosec.exchange

VP of Security at Anchore - Podcaster ( http:// opensourcesecuritypodcast.com http:// hackerhistory.com ) - Blogger ( http:// opensourcesecurity.io ) - He/Him

infosec.exchange
@joshbressers@infosec.exchange · Feb 07, 2026

Does this Anthropic Red Team blog about the LLM finding vulnerabilities mean we're all doomed? I don't think so. So I wrote a blog about it

https://ai-skeptic.bress.net/blog/0012-anthropic-vulns/

The smart people will figure this out, but there will be slop along the way

View on infosec.exchange
13
0
7
0
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: imap.elektrine.com:993

POP3: pop.elektrine.com:995

SMTP: smtp.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 08:55:10 UTC