Readit News logoReadit News
MadsRC commented on Show HN: A context-aware permission guard for Claude Code   github.com/manuelschipper... · Posted by u/schipperai
MadsRC · 3 days ago
Very interesting!

I’ve got an internal tool that we use. It doesn’t do the deterministic classifier, but purely offloads to an LLM. Certain models achieve a 100% coverage with adversarial input which is very cool.

I’m gonna have a look at that deterministic engine of yours, that could potentially speed things up!

MadsRC commented on Auto-compact not triggering on Claude.ai despite being marked as fixed   github.com/anthropics/cla... · Posted by u/nurimamedov
whoevercares · 2 months ago
My guess is SRE culture is a tough sell at Anthropic. When you’re a frontier lab, almost everything else looks more prestigious and more immediately “impactful”.
MadsRC · 2 months ago
Well, the head of reliability did leave a month or two ago zD
MadsRC commented on EU–INC – A new pan-European legal entity   eu-inc.org/... · Posted by u/tilt
MadsRC · 2 months ago
Last I heard of it this was proposed as a directive as opposed to regulation, meaning every single member state would have to interpret it and create their own national implementation. Just like with GDPR.

So 27 individual implementations of this, as opposed to the current 27 different implementations of how to incorporate and assign equity?

Seems… silly?

I’m all for making it more attractive to create startups in the EU… But I don’t think a directive is the right way

MadsRC commented on Show HN: I open-sourced my Go and Next B2B SaaS Starter (deploy anywhere, MIT)   github.com/moasq/producti... · Posted by u/moh_quz
MadsRC · 3 months ago
This is cool - Whenever I have a new idea for a thing I spend too much time writing boilerplate IAM and backend stuff, taking away time that could be spend on actual business logic. Thought about packaging the boilerplate stuff up before, never gotten around to it. Glad you did!

A thing to consider would be to make it easier (or perhaps bake it in) to separate out parts of the app into a separate origin. Something that would be good for pretty much any SaaS app would be to separate the IAM out (could still embed it with an iframe) - this allows you to keep a fairly tight security policy for the IAM stuff and a more lax one for the rest of the app. Kinda how Google separates out accounts.google.com.

MadsRC commented on Show HN: Bloodhound – Grey-box attack-path discovery in Rust/Go/C++ binaries   bloodhoundsecurity.ca... · Posted by u/michaelafam1
MadsRC · 3 months ago
This looks cool, but I’m sad you’ve chosen a name that already associated with another security tool :(
MadsRC commented on Chainalysis Successful Deanonymization Attack on Monero   darkwebinformer.com/chain... · Posted by u/Anon84
bhouston · 3 months ago
So chainalysis is working for governments now? I guess it makes sense.
MadsRC · 3 months ago
Now? Chainalysis has always worked for governments…

It was basically spawned out of the government needing help with investigating crypto - I think it was Mt. Gox…

MadsRC commented on How to harden GitHub Actions   wiz.io/blog/github-action... · Posted by u/moyer
MadsRC · 10 months ago
Shameless plug, I pushed a small CLI for detecting unpinned dependencies and automatically fix them the other day: https://codeberg.org/madsrc/gh-action-pin

Works great with commit hooks :P

Also working on a feature to recursively scan remote dependencies for lack of pins, although that doesn’t allow for fixing, only detection.

Very much alpha, but it works.

MadsRC commented on Show HN: Plandex v2 – open source AI coding agent for large projects and tasks   github.com/plandex-ai/pla... · Posted by u/danenania
MadsRC · a year ago
This looks great!

With the self-host option, it’s not really clear through the docs if one is able to override the base url of the different model providers?

I’m running my own OpenAI, Anthropic, Vertex and Bedrock compatible API, can I have it use that instead?

MadsRC commented on New Vulnerability in GitHub Copilot, Cursor: Hackers Can Weaponize Code Agents   pillar.security/blog/new-... · Posted by u/pseudolus
MadsRC · a year ago
When this was released I thought that perhaps we could mitigate it by having the tooling only load “rules” if they were signed.

But thinking on it a bit more, from the LLMs perspective there’s no difference between the rule files and the source files. The hidden instructions might as well be in the source files… Using code signing on the rule files would be security theater.

As mentioned by another comms ter, the solution could be to find a way to separate the command and data channels. The LLM only operates on a single channel, that being input of tokens.

MadsRC commented on Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours   tomshardware.com/tech-ind... · Posted by u/Ozarkian
wkat4242 · a year ago
Really? We really don't do that anymore. We have a strong XDR (Extended Detection and Response), basically Antivirus + behavioural analysis + SIEM integration. A managed password manager, and even detection for such behaviour of stored passwords in plain text or office files (through Microsoft Purview DLP). XDR is an evolution of EDR (Endpoint Detection and Response) with a bit more in terms of data sources added (and a lot of marketing "Our <..>DR is better than yours because we have a cooler letter" :P

Basically an XDR looks not only at malware but also at potentially malicious actions. This is a much more complete view because not every malicious action is triggered by malware. It can also be simply a user (and AI automation/control will be a new thing there). Big names in this are Crowdstrike (yes that one that killed half the enterprises), SentinelOne, Microsoft Defender for Endpoint (not to be confused with the normal consumer defender). An XDR will notice when a PC is doing a port scan, when a process is trying to gain root rights, when significant numbers of files are suddenly rewritten. It will immediately kill the process and/or trigger a ticket to the SOC (Security Operations Center). Who can take global actions on all endpoints to immediately kill the malware everywhere. It's pretty cool, you can trace back the entire process history, what launched what, what was were the system call parameters etc.

Big companies really have this stuff figured out. Unfortunately exfiltration is harder to detect if the malicious actor is doing it through a cloud service that the company also subscribes to.

If a company doesn't know what XDR is they are probably < 100 employees.

MadsRC · a year ago
Data exfil detection is a game of whack-a-mole. There is an endless variation of ways I can get data of your machine or out of your network.

Your time is much better spend detecting or preventing compromise.

u/MadsRC

KarmaCake day166June 18, 2021
About
[ my public key: https://keybase.io/madsrc; my proof: https://keybase.io/madsrc/sigs/UZ0dqcxMJR_RwnozQbTEn0GmzAsXVQTWGjl30ET_vhY ]
View Original