Daniel Cheng

28 Followers
42 Following
12 Posts
Chrome security team metaprogrammer
GitHubgithub.com/zetafunction
@blinkygal @jyasskin There may be a future in which the total harm will be less. But until we have ways of comprehensively mitigating prompt injection, there are too many demonstrated ways to hijack agents for nefarious ends. The current solutions are patchwork and do not address the root causes.
@jyasskin That would be reasonable if agents were only vulnerable to exactly the same types of social engineering attacks that are effective on humans. But agents expose a lot of additional attack vectors via prompt injection, and are prone to errors that a human would never make.
@thakis When creating a shared memory region on Windows, Chrome aligns requested sizes up to the nearest 64k boundary. A TODO claims the extra alignment is only needed for NaCl. But when removed, a bunch of tests fail. It turns out that v8's heap sandbox also enforces this alignment with CHECKs, since 64k is the allocator granularity on Windows. It might be possible to relax v8's CHECKs… but the "simple cleanup" has turned into a far bigger task than I was planning.
On Wednesday, I tried a simple change to delete some NaCl-related code. Two days later, I've determined that I can't delete it after all, and I now know more about shared memory than I ever wanted to.
@ifsecure sadly, it's not that easy to remove XSLT. In fact, some of the Google style guides even use XSLT :)

"#Passkeys are useless to me because I use a fancy password manager and always look at the URL".

Yes but the other users of the site don't so you also have to pay the shitty 2fa tax like everyone else.

Also I promise you you can get phished.

I published a step by step guide on using Windows event logs to hunt for malware trying to steal sensitive data from browsers e.g. cookies, passwords etc. https://security.googleblog.com/2024/04/detecting-browser-data-theft-using.html #DFIR Hope it's useful!
Detecting browser data theft using Windows Event Logs

Posted by Will Harris, Chrome Security Team Chromium's sandboxed process model defends well from malicious web content, but...

Google Online Security Blog
@evmar I thought that was neat as well! Though autoconf and friends generally just make me sad…
@PonderosaJohn I'm not sure what happened; however, the USB-C security keys I've used have a reputation of being a bit finnicky to activate. I'm guessing the repeated physical forces broke a soldered connection.
@ipsquiggle Luckily I had a backup stashed away. But now I need to get a new backup 😂