Dan Guido (@dguido)
Trail of Bits의 보안 감사(skills)를 활용해 Anthropic의 Claude에게 버그 헌터 역할을 가르치려는 시도에 대한 언급. 보안 감사 지식을 Claude에 접목해 취약점 탐지·버그 헌팅에 특화된 모델 활용 사례를 제안하는 내용.
Dan Guido (@dguido)
Trail of Bits의 보안 감사(skills)를 활용해 Anthropic의 Claude에게 버그 헌터 역할을 가르치려는 시도에 대한 언급. 보안 감사 지식을 Claude에 접목해 취약점 탐지·버그 헌팅에 특화된 모델 활용 사례를 제안하는 내용.
Lack of isolation in #agentic browsers resurfaces old vulnerabilities
We exploited a lack of isolation mechanisms in multiple agentic browsers to perform attacks ranging from the dissemination of false information to cross-site data leaks. These attacks resurface decades-old patterns of vulnerabilities that the web security community spent years building effective defenses against.

Trail of Bits discovered and disclosed two vulnerabilities in the widely used elliptic JavaScript library that could allow signature forgery or prevent valid signature verification, with one vulnerability still unfixed after the 90-day disclosure window.
We found cryptography bugs in the elliptic library using Wycheproof
#HackerNews #cryptography #bugs #elliptic #library #Wycheproof #cybersecurity #TrailofBits

Trail of Bits discovered and disclosed two vulnerabilities in the widely used elliptic JavaScript library that could allow signature forgery or prevent valid signature verification, with one vulnerability still unfixed after the 90-day disclosure window.
FHE.org would like to thank Trail of Bits for their continued sponsorship this year (and last!) of the FHE.org 2026 conference.
Sponsorships like Trail of Bits' make it possible to provide a high quality conference with great speakers and to waive registration fees for all students.
Find out more information about Trail of Bits at https://trailofbits.com.
Don't forget to RSVP for your ticket to the FHE.org 2026 conference in Taipei, Taiwan March 8th!
#TrailOfBits: We found #cryptography bugs in the #elliptic library using #Wycheproof

Trail of Bits discovered and disclosed two vulnerabilities in the widely used elliptic JavaScript library that could allow signature forgery or prevent valid signature verification, with one vulnerability still unfixed after the 90-day disclosure window.
huh #trailofbits did an audit of #simplex - only the "protocol spec" https://github.com/simplex-chat/simplex-chat/blob/stable/docs/SimpleX_Design_Review_2024_Summary_Report_12_08_2024.pdf
quite limited scope. and last time i looked at the spec i lost my appetite, but apparently there have been updates, like addition of sntrup pq kem. so maybe this has improved? still wouldn't use it the supply chain attack surface is begging for a "soon" not an "if". and the global transcript of group chats was out of scope in this audit. so, meh?
A deep dive into Linux’s new mseal syscall
https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/

If you love exploit mitigations, you may have heard of a new system call named mseal landing into the Linux kernel’s 6.10 release, providing a protection called “memory sealing.” Beyond notes from the authors, very little information about this mitigation exists. In this blog post, we’ll explain what this syscall is, including […]