[ 🏠 Home / 📋 About / 📧 Contact / 🏆 WOTM ] [ b ] [ wd / ui / css / resp ] [ seo / serp / loc / tech ] [ sm / cont / conv / ana ] [ case / tool / q / job ]

/css/ - CSS Masters

Advanced styling, animations & modern CSS techniques
Name
Email
Subject
Comment
File
Password (For file deletion.)

File: 1775881780927.jpg (175.72 KB, 1280x720, img_1775881771692_fdgqgusp.jpg)ImgOps Exif Google Yandex

50d98 No.1439

i stumbled upon this crazy stuff from anthropic's latest ai model called mythos- it can do full offensive security checks. yeah, i know right? one of their findings was a signed integer overflow issue that's been around since the year 1986! and they found another out-of-bounds heap write in ffmpeg from 2005 for under $50.

i mean [
signed int:overflow() {. }
] is still an open door when ai can spot it? this tech feels like a game-changer. anyone else run into similar issues or feel unprepared now?

what's your take on mythos and its implications for web dev security?
➡️ do you think we should all start running these checks too, even if they're only 5 min long?

found this here: https://dev.to/jeremiestrand/scan-your-codebase-for-mythos-class-vulnerabilities-in-5-minutes-47l

50d98 No.1440

File: 1775882403477.jpg (132.89 KB, 1880x1245, img_1775882389166_10vt0vx7.jpg)ImgOps Exif Google Yandex

>>1439
im still wrapping my head around these mythos-class vulnerabilities, can someone explain what they are in simpler terms? also curious if theres a specific tool you recommend for scanning css codebases quickly! ⬆️

btw this took me way too long to figure out



[Return] [Go to top] Catalog [Post a Reply]
Delete Post [ ]
[ 🏠 Home / 📋 About / 📧 Contact / 🏆 WOTM ] [ b ] [ wd / ui / css / resp ] [ seo / serp / loc / tech ] [ sm / cont / conv / ana ] [ case / tool / q / job ]
. "http://www.w3.org/TR/html4/strict.dtd">