frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Speed Matters: Why AI Software Vulnerability Exploitation is going be bad

6•randersson1000•1h ago
I co-founded a successful security company close to the Mythos ecosystem and have spoken with participants in the know and I am deeply concerned. We, collectively, have answers for some but not all of the problems ahead but are overlooking the speed at which we can apply fixes even if they magically are generated instantaneously by Mythos.

Here are some considerations to consider:

1. More Vulnerabilities Are Coming: Supposedly Mythos can find vulnerabilities more effectively, many models can do this, but the claim it can find them more acutely. Based on the momentum of the models, others will follow and we can all agree that many more vulnerabilities will be found in the future.

2. The supposedly game changer with Mythos is not the finding, it is chiefly because it can chain these vulns together sequentially to develop exploit chains and is creative/innovative in doing so.

3. Anthropic claims Mythos can also be used to provide FIXES as well, I am not convinced about that. I believe it will FIND more than it can FIX.

4. FIXING SPEED MATTERS. But even if it can FIND and FIX at the same rate, which it can’t, there is a whole other aspect that is being overlooked. How long it takes to get these FIXES deployed.

5. WE CAN'T FIX FAST ENOUGH. Even if it can fix all of them it takes time to get these patches into the software upstream because they have to be accepted and TESTED and there is an entire approval process and release process. It’s not instantaneous. Typically a patch takes days even weeks to move through the upstream ecosystem before it becomes available to the general public. Here is the AI generated timescales for a critical vuln: Upstream Fix: 24–48 hours after confirmation by the core project team. Downstream Packaging 12–48 hours for major distros (Ubuntu LTS, RHEL, Debian Stable) to backport and test. Availability to User: 2–5 days from the initial public disclosure of the vulnerability. For arguments sake lets assume we shrink that down to a day. Magically.

6. WE CAN'T DEPLOY FAST ENOUGH: Then the end users themselves must take these patches and apply them to their infrastructure. This requires another QA cycle at least. These stats are AI generated YMMV: but for Log4J, by Day 10: On average, organizations had patched only 45% of their vulnerable cloud resources. Average Remediation Time: For systems that were detected and tracked, the average time to remediate was 17 days. Priority Patching: Externally-facing systems (those most at risk) were patched faster, averaging about 12 days, while internal systems lagged behind. The 1-Year Mark: By late 2022, telemetry from security firms like Tenable showed that 72% of organizations still had at least one vulnerable Log4j instance in their environment. The U.S. Department of Homeland Security's Cyber Safety Review Board (CSRB) stated that Log4j is a "endemic vulnerability" and predicted it will take a decade or longer to fully eliminate it from the global software supply chain. A DECADE!!

7. So there is a massive timing problem even if FIND to FIX rate is the same which it won’t be, the entire downstream system cannot move at the right speed to get the fixes deployed into the infrastructure.

8. This all sucks up developer time and cost as teams pivot to emergency mode etc. It’s just a scary prospect. If you are a dev get ready for some genuine stress and miserly.

CONCLUSION: The deployment time lag is what we are facing. Please can you make suggestions in terms of what you are planning on doing to find and apply patches faster, so that we can get some creative ideas around best practices. We have other things we are doing that solves some of these issues but the speed timing issue is the one that is being overlooked in this entire debate.

Russ from RapidFort

Website streamed live directly from a model

https://flipbook.page/
1•sethbannon•1m ago•0 comments

Is Starlink a Secret Radar Constellation?

https://www.youtube.com/watch?v=jbp3kdJZ1_A
1•vpmadd52huq•1m ago•0 comments

The AI-Native Interview

https://sierra.ai/blog/the-ai-native-interview
1•ej88•1m ago•0 comments

Pancreatic cancer mRNA vaccine shows lasting results in an early trial

https://www.nbcnews.com/health/cancer/pancreatic-cancer-mrna-vaccine-shows-lasting-results-early-...
1•bookofjoe•2m ago•0 comments

Muskism as Fordism

https://lpeproject.org/blog/muskism-as-fordism/
1•abrownbear•2m ago•1 comments

Malicious Checkmarx Artifacts Found in Official KICS Docker Repository

https://socket.dev/blog/checkmarx-supply-chain-compromise
1•justsomehuman•2m ago•0 comments

Show HN: Everest Drive – a multiplayer spaceship crew simulator in the browser

https://everestdrive.io/
1•jakej256•4m ago•0 comments

X.400, and how email was almost different

https://techinch.com/blog/x-400
1•speckx•5m ago•0 comments

ColombiaEscoge – Plataforma para que los colombianos voten con información

https://www.colombiaescoge.com/
1•byandrev•6m ago•1 comments

A jumping spider on the ISS learned to hunt in microgravity (2012)

https://www.colorado.edu/today/2012/11/29/cu-boulder-space-traveling-spider-finds-home-smithsonia...
1•madpen•8m ago•1 comments

GPT-Proxy Backdoor in NPM and PyPI Turns Servers into Chinese LLM Relays

https://www.aikido.dev/blog/gpt-proxy-backdoor-npm-pypi-chinese-llm-relay
1•lschueller•10m ago•0 comments

Coding Models Are Doing Too Much

https://nrehiew.github.io/blog/minimal_editing/
3•pella•11m ago•0 comments

Y'all want the new Boards of Canada so bad you crashed Warp's server

https://cdm.link/new-boards-of-canada-crashed-the-server/
1•glitcher•12m ago•0 comments

Show HN: Callmux – MCP multiplexer that cuts tool call context pollution by ~19x

https://github.com/edimuj/callmux
1•edimuj•12m ago•0 comments

Anthropic's New Mythos A.I. Model Sets Off Global Alarms

https://www.nytimes.com/2026/04/22/technology/anthropics-mythos-ai.html
2•edward•13m ago•0 comments

Show HN: Dead Simple Email – Email API for AI Agents

https://deadsimple.email/
1•bridgetburch•13m ago•0 comments

Workspace Agents in ChatGPT

https://openai.com/index/introducing-workspace-agents-in-chatgpt/
4•mfiguiere•15m ago•0 comments

The uphill climb of making diff lines performant

https://github.blog/engineering/architecture-optimization/the-uphill-climb-of-making-diff-lines-p...
2•ezekg•15m ago•0 comments

What is tech neck? (2024)

https://my.vanderbilthealth.com/what-is-tech-neck/
2•the-mitr•16m ago•0 comments

Google says 75% of it's new code is AI written

https://blog.google/innovation-and-ai/infrastructure-and-cloud/google-cloud/cloud-next-2026-sunda...
3•Drakexor•18m ago•6 comments

Agents and the Era of Overproduction

https://mattrogish.com/blog/2026/03/11/agents-and-the-era-of-overproduction/
1•MattRogish•19m ago•0 comments

Garbage collection and the edge of safe Rust

https://kyju.org/blog/tokioconf-2026/
1•fanf2•20m ago•0 comments

PulseBench-Tab: Open-source, multilingual benchmark for table extraction

https://www.runpulse.com/blog/pulsebench-tab
3•ritvikpandey21•21m ago•1 comments

YouTuber Turns $2k Wrecked Tesla into Wild Go-Kart – Then Tesla Shuts It Down

https://guessingheadlights.com/youtuber-turns-2000-wrecked-tesla-into-wild-go-kart-then-tesla-shu...
1•toss1•21m ago•2 comments

Parallel Agents in Zed

https://zed.dev/blog/parallel-agents
10•ajeetdsouza•23m ago•1 comments

Font-Family Doesn't Fall Back the Way You Think

https://csswizardry.com/2026/04/font-family-doesnt-fall-back-the-way-you-think/
1•speckx•24m ago•0 comments

Microsoft Moving All GitHub Copilot Subscribers to Token-Based Billing in June

https://www.wheresyoured.at/exclusive-microsoft-moving-all-github-copilot-subscribers-to-token-ba...
2•brandrick•24m ago•1 comments

What Makes a Language Flourish?

https://www.5jt.com/what-makes-a-language-flourish
4•tosh•24m ago•0 comments

Adding live reload to a static site generator written in Go

https://jon.chrt.dev/2026/03/20/adding-live-reload-to-a-static-site-generator-written-in-go.html
1•PaulHoule•24m ago•0 comments

Understanding security warnings when opening Remote Desktop (RDP) files

https://learn.microsoft.com/en-us/windows-server/remote/remote-desktop-services/remotepc/understa...
1•neogodless•24m ago•0 comments