frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Honda's special welding method is transforming its car manufacturing

https://www.popsci.com/technology/honda-cdc-welding-ohio/
1•wjb3•1m ago•0 comments

LinkedIn Is Fingerprinting the Browser Extensions

https://github.com/mdp/linkedin-extension-fingerprinting
1•mdp•1m ago•0 comments

Global BESS capacity tops 250GW, overtaking pumped hydro for first time

https://www.pv-magazine.com/2026/02/05/global-bess-capacity-tops-250-gw-overtaking-pumped-hydro-f...
1•toomuchtodo•3m ago•0 comments

We built a free tool to help founders validate their ideas. Looking for feedback

https://www.founderspace.work/
1•VladCovaci•5m ago•0 comments

Claude in PowerPoint

https://claude.com/claude-in-powerpoint
1•jbredeche•7m ago•0 comments

Our early impressions of Claude Opus 4.6

https://resolve.ai/blog/Our-early-impressions-of-Claude-Opus-4.6
1•minotaursage•7m ago•0 comments

Show HN: VectorGuard-Nano – Free secure messaging for AI agents

https://github.com/Active-IQ/VectorGuard-Nano
1•supere989•9m ago•0 comments

Staying engaged with AI plans: give inline feedback

https://huonw.github.io/blog/2026/02/ai-plan/
1•dbaupp•9m ago•0 comments

OpenMP Forms Python Subcommittee

https://www.openmp.org/press-release/python-new-member-anaconda/
1•cameron_b•10m ago•0 comments

Neocities founder stuck in chatbot hell after Bing blocked 1.5M sites

https://arstechnica.com/tech-policy/2026/02/neocities-founder-stuck-in-chatbot-hell-after-bing-bl...
2•ntoskrnl_exe•10m ago•0 comments

Colombia Turns to LNG as Domestic Gas Runs Out

https://oilprice.com/Energy/Energy-General/Colombia-Turns-to-LNG-as-Domestic-Gas-Runs-Out.html
1•PaulHoule•11m ago•0 comments

Japan is Broke, Korea is Rich [video]

https://www.youtube.com/watch?v=fs2-mDbFfzU
1•amelius•12m ago•0 comments

TurboKV: A fast, embedded key-value store in Rust

https://crates.io/crates/turbokv
1•rgbimbochamp•12m ago•0 comments

App Store Review Feels Like RNG, and That's the Problem

https://0xsid.com/blog/apple-review-is-rng
1•ssiddharth•13m ago•0 comments

Minute Maid's frozen juices are being discontinued

https://www.cnn.com/2026/02/05/food/minute-maid-frozen-discontinued
2•mooreds•13m ago•0 comments

How we found exploitable security flaws in OpenClaw that manual review missed

https://www.cubic.dev/blog/we-found-and-fixed-critical-security-vulnerabilities-in-openclaw
2•sanxroz•14m ago•0 comments

Bitcoin drops below $67,000 as selloff heats up and pessimism grows about crypto

https://www.cnbc.com/2026/02/05/bitcoin-price-today-70000-in-focus.html
3•stalfosknight•15m ago•1 comments

Personality should be an Option that you can set to None

https://github.com/openai/codex/issues/10582
2•tosh•15m ago•0 comments

VPN Suggestions

2•kirtyv•16m ago•0 comments

Struct Memory Alingment Minigame

https://rybarix.com/x/mem/
1•sandruso•16m ago•0 comments

Show HN: Registrum – A structural registrar with enforceable release invariants

https://github.com/mcp-tool-shop-org/Registrum
1•mikeyfrilot•18m ago•0 comments

The LLM spectrum and responsible LLM use

https://martin.janiczek.cz/2026/02/05/the-llm-spectrum-and-responsible-llm-use.html
1•todsacerdoti•18m ago•0 comments

Apple's Cook Vows to Lobby Lawmakers on Immigration Issue

https://www.bloomberg.com/news/articles/2026-02-05/apple-s-cook-vows-to-lobby-lawmakers-on-immigr...
1•jmsflknr•19m ago•0 comments

fman is now open source

https://fman.io/blog/fman-is-now-open-source/
1•soheilpro•20m ago•1 comments

NASA will allow astronauts to bring their iPhones to space

https://arstechnica.com/space/2026/02/nasa-will-finally-allow-astronauts-to-bring-their-iphones-t...
2•soheilpro•21m ago•0 comments

CSB: Fatal Explosions at Didion Milling [video]

https://www.youtube.com/watch?v=9h3bar6eIss
2•12_throw_away•25m ago•1 comments

Open Claw = Pasta Maker

https://www.thoughtmerchants.com/opinion/open-claw-pasta-maker
1•deltamidway•27m ago•0 comments

Basecamp Launches (2004)

https://signalvnoise.com/archives/000542
1•tosh•31m ago•0 comments

Imane Khelif confirms SRY gene and 'hormone treatments' before Paris Olympics

https://www.france24.com/en/live-news/20260204-boxer-khelif-reveals-hormone-treatments-before-par...
2•ynbafb•32m ago•0 comments

The time I didn't meet Jeffrey Epstein

https://scottaaronson.blog/?p=9534
16•pfdietz•32m ago•1 comments
Open in hackernews

Anthropic's Claude Opus 4.6 uncovers 500 zero-day flaws in open-source code

https://www.axios.com/2026/02/05/anthropic-claude-opus-46-software-hunting
79•speckx•1h ago

Comments

garbawarb•1h ago
Have they been verified?
emp17344•1h ago
Sounds like this is just a claim Anthropic is making with no evidence to support it. This is an ad.
input_sh•53m ago
How can you not believe them!? Anthropic stopped Chinese hackers from using Claude to conduct a large-scale cyber espionage attack just months ago!
littlestymaar•39m ago
Poe's law strikes again: I had to check your profile to be sure this was sarcasm.
input_sh•4m ago
You checked yourself!? Don't let your boss know, you could've saved some time by orchestrating a team of Claude agents to do that for you!
xiphias2•1h ago
Just 100 from the 500 is from OpenClaw created by Opus 4.5
ains•1h ago
https://archive.is/N6In9
siva7•1h ago
Wasn't this Opus thing released like 30 minutes ago?
jjice•1h ago
A bunch of companies get early access.
input_sh•57m ago
Yes, you just need to be a Claude++ plan!
Topfi•53m ago
I understand the confusion, this was done by Anthropics internal Red team as part of model testing prior to release.
tintor•32m ago
Singularity
blinding-streak•18m ago
Opus 4.6 uses time travel.
acedTrex•1h ago
Create the problem, sell the solution remains an undefeated business strategy.
_tk_•1h ago
The system card unfortunately only refers to this [0] blog post and doesn't go into any more detail. In the blog post Anthropic researchers claim: "So far, we've found and validated more than 500 high-severity vulnerabilities".

The three examples given include two Buffer Overflows which could very well be cherrypicked. It's hard to evaluate if these vulns are actually "hard to find". I'd be interested to see the full list of CVEs and CVSS ratings to actually get an idea how good these findings are.

Given the bogus claims [1] around GenAI and security, we should be very skeptical around these news.

[0] https://red.anthropic.com/2026/zero-days/

[1] https://doublepulsar.com/cyberslop-meet-the-new-threat-actor...

majormajor•56m ago
The Ghostscript one is interesting in terms of specific-vs-general effectiveness:

---

> Claude initially went down several dead ends when searching for a vulnerability—both attempting to fuzz the code, and, after this failed, attempting manual analysis. Neither of these methods yielded any significant findings.

...

> "The commit shows it's adding stack bounds checking - this suggests there was a vulnerability before this check was added. … If this commit adds bounds checking, then the code before this commit was vulnerable … So to trigger the vulnerability, I would need to test against a version of the code before this fix was applied."

...

> "Let me check if maybe the checks are incomplete or there's another code path. Let me look at the other caller in gdevpsfx.c … Aha! This is very interesting! In gdevpsfx.c, the call to gs_type1_blend at line 292 does NOT have the bounds checking that was added in gstype1.c."

---

It's attempt to analyze the code failed but when it saw a concrete example of "in the history, someone added bounds checking" it did a "I wonder if they did it everywhere else for this func call" pass.

So after it considered that function based on the commit history it found something that it didn't find from its initial fuzzing and code-analysis open-ended search.

As someone who still reads the code that Claude writes, this sort of "big picture miss, small picture excellence" is not very surprising or new. It's interesting to think about what it would take to do that precise digging across a whole codebase; especially if it needs some sort of modularization/summarization of context vs trying to digest tens of million lines at once.

tptacek•37m ago
I know some of the people involved here, and the general chatter around LLM-guided vulnerability discovery, and I am not at all skeptical about this.
malfist•33m ago
That's good for you, but that means nothing to anybody else.
pchristensen•25m ago
Nobody is right about everything, but tptacek's takes on software security are a good place to start.
tptacek•19m ago
I'm interested in whether there's a well-known vulnerability researcher/exploit developer beating the drum that LLMs are overblown for this application. All I see is the opposite thing. A year or so ago I arrived at the conclusion that if I was going to stay in software security, I was going to have to bring myself up to speed with LLMs. At the time I thought that was a distinctive insight, but, no, if anything, I was 6-9 months behind everybody else in my field about it.

There's a lot of vuln researchers out there. Someone's gotta be making the case against. Where are they?

From what I can see, vulnerability research combines many of the attributes that make problems especially amenable to LLM loop solutions: huge corpus of operationalizable prior art, heavily pattern dependent, simple closed loops, forward progress with dumb stimulus/response tooling, lots of search problems.

Of course it works. Why would anybody think otherwise?

You can tell you're in trouble on this thread when everybody starts bringing up the curl bug bounty. I don't know if this is surprising news for people who don't keep up with vuln research, but Daniel Stenberg's curl bug bounty has never been where all the action has been at in vuln research. What, a public bug bounty attracted an overwhelming amount of slop? Quelle surprise! Bug bounties have attracted slop for so long before mainstream LLMs existed they might well have been the inspiration for slop itself.

Also, a very useful component of a mental model about vulnerability research that a lot of people seem to lack (not just about AI, but in all sorts of other settings): money buys vulnerability research outcomes. Anthropic has eighteen squijillion dollars. Obviously, they have serious vuln researchers. Vuln research outcomes are in the model cards for OpenAI and Anthropic.

NitpickLawyer•6m ago
> You can tell you're in trouble on this thread when everybody starts bringing up the curl bug bounty. I don't know if this is surprising news for people who don't keep up with vuln research, but Daniel Stenberg's curl bug bounty has never been where all the action has been at in vuln research. What, a public bug bounty attracted an overwhelming amount of slop? Quelle surprise! Bug bounties have attracted slop for so long before mainstream LLMs existed they might well have been the inspiration for slop itself.

Yeah, that's just media reporting for you. As anyone who ever administered a bug bounty programme on regular sites (h1, bugcrowd, etc) can tell you, there was an absolute deluge of slop for years before LLMs came to the scene. It was just manual slop (by manual I mean running wapiti and c/p the reports to h1).

catoc•6m ago
It does if the person making the statement has a track record, proven expertise on the topic - and in this case… it actually may mean something to other people
aaaalone•9m ago
See it as a signal under many and not as some face value.

After all they need time to fix the cves.

And it doesn't matter to you as long as your investment into this is just 20 or 100 bucks per month anyway.

fred_is_fred•1h ago
Is the word zero-day here superfluous? If they were previously unknown doesn't that make them zero-day by definition?
bink•46m ago
Yes. As a security researcher this always annoys me.
tptacek•35m ago
It's a term of art. In print media, the connotation is "vulnerabilities embedded into shipping software", as opposed to things like misconfigurations.
limagnolia•31m ago
I though zero-day meant actively being exploited in the wild before a patch is available?
zhengyi13•1h ago
I feel like Daniel @ curl might have opinions on this.
Legend2440•8m ago
You’re right, he does: https://daniel.haxx.se/blog/2025/10/10/a-new-breed-of-analyz...

Curl fully supports the use of AI tools by legitimate security researchers to catch bugs, and they have fixed dozens caught in this way. It’s just idiots submitting bugs they don’t understand that’s a problem.

ChrisArchitect•1h ago
Earlier source: https://red.anthropic.com/2026/zero-days/ (https://news.ycombinator.com/item?id=46902374)
mrkeen•1h ago
Daniel Stenberg has been vocal the last few months on Mastodon about being overwhelmed by false security issues submitted to the curl project.

So much so that he had to eventually close the bug bounty program.

https://daniel.haxx.se/blog/2026/01/26/the-end-of-the-curl-b...

tptacek•36m ago
We're discussing a project led by actual vulnerability researchers, not random people in Indonesia hoping to score $50 by cajoling maintainers about atyle nits.
malfist•32m ago
Vulnerability researches with a vested interest in making LLMs valuable. The difference isn't meaningful
tptacek•31m ago
I don't even understand how that claim makes sense.
pityJuke•5m ago
Daniel is a smart man. He's been frustrated by slop, but he has equally accepted [0] AI-derived bug submissions from people who know what they are doing.

I would imagine Anthropic are the latter type of individual.

[0]: https://mastodon.social/@bagder/115241241075258997

Topfi•57m ago
The official release by Anthropic is very light on concrete information [0], only contains a select and very brief number of examples and lacks history, context, etc. making it very hard to gleam any reliably information from this. I hope they'll release a proper report on this experiment, as it stands it is impossible to say how much of this are actual, tangible flaws versus the unfortunately ever growing misguided bug reports and pull requests many larger FOSS projects are suffering from at an alarming rate.

Personally, while I get that 500 sounds more impressive to investors and the market, I'd be far more impressed in a detailed, reviewed paper that showcases five to ten concrete examples, detailed with the full process and response by the team that is behind the potentially affected code.

It is far to early for me to make any definitive statement, but the most early testing does not indicate any major jump between Opus 4.5 and Opus 4.6 that would warrant such an improvement, but I'd love nothing more than to be proven wrong on this front and will of course continue testing.

[0] https://red.anthropic.com/2026/zero-days/

ChrisMarshallNY•29m ago
When I read stuff like this, I have to assume that the blackhats have already been doing this, for some time.
bastard_op•18m ago
It's not really worth much when it doesn't work most of the time though:

https://github.com/anthropics/claude-code/issues/18866 https://updog.ai/status/anthropic

tptacek•6m ago
It's a machine that spits out sev:hi vulnerabilities by the dozen and the complaint is the uptime isn't consistent enough?
bxguff•17m ago
In so far as model use cases I don't mind them throwing their heads against the wall in sandboxes to find vulnerabilities but why would it do that without specific prompting? Is anthropic fine with claude setting it's own agendas in red-teaming? That's like the complete opposite of sanitizing inputs.