frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Copilot broke audit logs, but Microsoft won't tell customers

https://pistachioapp.com/blog/copilot-broke-your-audit-log
238•Sayrus•3h ago

Comments

jayofdoom•2h ago
Generally speaking, anyone can file a CVE. Go file one yourself and force their response. This blogpost puts forth reasonably compelling evidence.
db48x•2h ago
Fun, but it doesn’t deserve a CVE. CVEs are for vulnerabilities that are common across multiple products from multiple sources. Think of a vulnerability in a shared library that is used in most Linux distributions, or is statically linked into multiple programs. Copilot doesn’t meet that criteria.

Honestly, the worst thing about this story is that apparently the Copilot LLM is given the instructions to create audit log entries. That’s the worst design I could imagine! When they use an API to access a file or a url then the API should create the audit log. This is just engineering 101.

gpm•2h ago
Huh, there are CVEs for windows components all the time, random example: https://msrc.microsoft.com/update-guide/vulnerability/CVE-20...

Including for end user applications, not libraries, another random example: https://msrc.microsoft.com/update-guide/vulnerability/CVE-20...

ecb_penguin•1h ago
> CVEs are for vulnerabilities that are common across multiple products from multiple sources.

This is absolutely not true. I have no idea where you came up with this.

> Honestly, the worst thing about this story is that apparently the Copilot LLM is given the instructions to create audit log entries.

That's not at all what the article says.

> That’s the worst design I could imagine!

Ok, well, that's not how they designed it.

> This is just engineering 101.

Where is the class for reading 101?

immibis•43m ago
More accurately, CVEs are for vulnerabilities that may be present on many systems. Then, the CVE number is a reference point that helps you when discussing the vulnerability, like asking whether it's present on a particular system, or what percentage of systems are patched. This vulnerability was only present on one system, so it doesn't need a CVE number. It could have a Microsoft-assigned bug number, but it doesn't need a CVE.
aspenmayer•2h ago
It’s true. The form is right here. When they support PGP, I suspect they know what they’re doing and why, and have probably been continuously doing so for longer than I have been alive. Just look at their sponsors and partners.

https://cveform.mitre.org/

Please only use this for legitimate submissions.

thombles•43m ago
Is there value in requesting a CVE for a service that only Microsoft runs? What's a user supposed to do with that?
nzeid•2h ago
Hard to count the number of things that can go wrong by relying directly on an LLM to manage audit/activity/etc. logs.

What was their bug fix? Shadow prompts?

gpm•2h ago
I'd hope that if a tool the LLM uses reveals any part of the file to the LLM it counts as a read by every user who sees any part of the output that occurred after that revelation was added to the context.
jsnell•2h ago
> Hard to count the number of things that can go wrong by relying directly on an LLM to manage audit/activity/etc. logs.

Nothing in this post suggests that they're relying on the LLM itself to append to the audit logs. That would be a preposterous design. It seems far more likely the audit logs are being written by the scaffolding, not by the LLM, but they instrumented the wrong places. (I.e. emitting on a link or maybe a link preview being output, rather than e.g. on the document being fed to the LLM as a result of RAG or a tool call.)

(Writing the audit logs in the scaffolding is probably also the wrong design, but at least it's just a bad design rather than a totally absurd one.)

nzeid•2h ago
Heard, but since the content or its metadata must be surfaced by the LLM, what's the fix?
nzeid•1h ago
Thinking about this a bit - you'd have to isolate any interaction the LLM has with any content to some sort of middle end that can audit the LLM itself. I'm a bit out of my depth here, though. I don't know what Microsoft does or doesn't do with Copilot.
verandaguy•2h ago
I'm very sceptical of using shadow prompts (or prompts of any kind) as an actual security/compliance control or enforcement mechanism. These things should be done using a deterministic system.
ath3nd•1h ago
I bet you are a fan of OpenAI's groundbreaking study mode feature.
downrightmike•1h ago
Shadow copies
thenaturalist•2h ago
Hardly have I ever seen corporate incentives so aligned to overhype the capabilities of a technology while it being so raw and unpolished as this one.

The bubble bursting will be epic.

lokar•2h ago
Wait, copilot operates as some privileged user (that can bypass audit?), not as you (or better, you with some restrictions)

That can’t be right, can it?

ceejayoz•2h ago
> That can’t be right, can it?

https://knowyourmeme.com/memes/james-franco-first-time

lokar•2h ago
lol. I’ve avoided MS my entire (30+ year) career. Every now and then I’m reminded I made the right choice.
tomrod•2h ago
Brilliant.
dhosek•1h ago
That was a laugh-out-loud moment in that film.
tomrod•2h ago
Sure sounds like, for Microsoft, an audit log is optional when it comes to cramming garbage AI integrations in places they don't belong.
Spooky23•2h ago
No, it accesses data with the users privilege.
gpm•1h ago
Are you telling me I, a normal unprivileged user, have a way to read files on windows that bypasses audit logs?
lokar•1h ago
I'm guessing they are making an implicit distinction between access as the user, vs with the privs of the user.

In the second case, the process has permission to do whatever it wants, it elects to restrain itself. Which is obviously subject to many more bugs then the first approach.

Spooky23•39m ago
If there is a product defect? Sure.

The dude found the bug, reported the bug, they fixed the bug.

This isn’t uncommon, there bugs like this frequently in complex software.

gpm•23m ago
I think you just defined away the entire category of vulnerability known as "privilege escalation".
p_ing•17m ago
This isn’t an example of escalation. Copilot is using the user’s token similar to any other OAuth app that needs to act on behalf of the user.
jjkaczor•1h ago
So... basically like when Delve was first introduced and was improperly security trimming things it was suggesting and search results.

... Or ... a very long-time ago, when SharePoint search would display results and synopsis's for search terms where a user couldn't open the document, but could see that it existed and could get a matching paragraph or two... Best example I would tell people of the problem was users searching for things like: "Fall 2025 layoffs"... if the document existed, then things were being planned...

Ah Microsoft, security-last is still the thing, eh?

ocdtrekkie•1h ago
I would say "insecure by default".

I talked to some Microsoft folks around the Windows Server 2025 launch, where they claimed they would be breaking more compatibility in the name of their Secure Future Initiative.

But Server 2025 will load malicious ads on the Edge start screen[1] if you need to access a web interface of an internal thing from your domain controller, and they gleefully announced including winget, a wondeful malware delivery tool with zero vetting or accountability in Server 2025.

Their response to both points was I could disable those if I wanted to. Which I can, but was definitely not the point. You can make a secure environment based on Microsoft technologies, but it will fight you every step of the way.

[1] As a fun fact, this actually makes Internet Explorer a drastically safer browser than Edge on servers! By default, IE's ESC mode on servers basically refused to load any outside websites.

beart•23m ago
I've always felt that Microsoft's biggest problem is the way it manages all of the different teams, departments, features, etc. They are completely disconnected and have competing KPIs. I imagine the edge advertising team has a goal to make so much revenue, and the security team has a goal to reduce CVEs, but never the twain shall meet.

Also you probably have to go up 10 levels of management before you reach a common person.

catmanjan•1h ago
As someone else mentioned the file isnt actually accessed by copilot, rather copilot is reading the pre-indexed contents of the file in a search engine...

Really Microsoft should be auditing the search that copilot executes, its actually a bit misleading to be auditing the file as accessed when copilot has only read the indexed content of the file, I don't say I've visited a website when I've found a result of it in Google

faangguyindia•1h ago
I've disabled copilot i don't even find it useful. I think most people who use copilot have not see "better".
ValveFan6969•44m ago
I can only assume that Microsoft/OpenAI have some sort of backdoor privileges that allows them to view our messages, or at least analyze and process them.

I wouldn't be surprised.

heywire•2h ago
I am so tired of Microsoft cramming Copilot into everything. Search at $dayjob is completely borked right now. It shows a page of results, but the immediately pops up some warning dialog you cannot dismiss that Copilot can’t access some file “” or something. Every VSCode update I feel like I have to turn off Copilot in some new way. And now apparently it’ll be added to Excel as well. Thankfully I don’t have to use anything from Microsoft after work hours.
keyle•2h ago
Everything except the best thing they could have brought back: Clippy! </3
fragmede•4m ago
So Louis Rossmann put out a YouTube video encouraging internet users to change their profile pictures to an image of Clippy, as a form of silent protest against unethical conduct by technology companies, so it's making a comeback!
candiddevmike•2h ago
RE: VSCode copilot, you're not crazy, I'm seeing it too. And across multiple machines, even with settings sync enabled, I have to periodically go on each one and uninstall the copilot extension _again_. I'll notice the Add to chat... in the right click context menu and immediately know it got reinstalled somehow.

I'd switch to VSCodium but I use the WSL and SSH extensions :(

userbinator•1h ago
Thankfully I don’t have to use anything from Microsoft after work hours.

There are employers where you don't have to use anything from Microsoft during work hours either.

troad•1h ago
> Every VSCode update I feel like I have to turn off Copilot in some new way.

This has genuinely made me work on switching to neovim. I previously demurred because I don't trust supply chains that are random public git repos full of emojis and Discords, but we've reached the point now where they're no less trustworthy than Microsoft. (And realistically, if you use any extensions on VS Code you're already trusting random repos, so you might as well cut out the middle man with an AI + spyware addiction and difficulties understanding consent.)

TheRoque•58m ago
Same. Actually made me switch to neovim more and more. It's a great time to do so, with the new native package manager (now working in nightly 0.12)
sgentle•30m ago
The coercion will continue until metrics improve.
xet7•2h ago
https://archive.is/PRTRA
Josh5•2h ago
are they even sure that the AI even accessed the content that second time? LLMs are really good and making up shit. I have tested this by asking various LLMs to scrape data from my websites while watching access logs. Many times, they don't and just rely on some sort of existing data or spout a bunch of BS. Gemini is especially bad like this. I have not used copilot myself, but my experience with other AI makes me curious about this.
bongodongobob•2h ago
This is it. M365 uses RAG on your enterprise data that you allow it to access. It's not actually accessing the files directly in the cases he provided. It's working as intended.
crooked-v•1h ago
If that's the case, then as noted in the article, the 'as intended' is probably violating liability requirements around various things.
sailfast•45m ago
Correct. It is precisely that a user can ask about someone’s medical history (or whatever else) and not be reported that would be in violation of any heavily audited system. LLM Summaries break the compliance.
albert_e•33m ago
If this is indeed how copilot is archtected, then it needs clear documentation -- that it is a non-audited data store.

But how then did MS "fix" this bug? Did they stop pre-ingesting, indexing, and caching the content? I doubt that.

Pushing (defaulting) organizations to feed all their data to Copilot and then not providing an audit trail of data access on that replica data store -- feels like a fundamental gap that should be caught by a security 101 checklist.

micromacrofoot•2h ago
AI induced hysteria is probably wider spread than initially thought, these people are absolutely insane
QuadmasterXLII•2h ago
This seems like a five alarm fire for HIPPA, is there something I’m missing?
loeg•2h ago
It's HIPAA.
adzm•2h ago
The HIPAA hippo certainly encourages this confusion
ivewonyoung•2h ago
It's HIPPA now for all intensive purposes.
Spooky23•1h ago
It’s a bug. He reported it, they fixed it.

It is not a five alarm fire for HIPAA. HIPAA doesn’t require that all file access be logged at all. HIPAA also doesn’t require that a CVE be created for each defect in a product.

End of the day, it’s a hand-wavy, “look at me” security blog. Don’t get too crazy.

jeanlucas•2h ago
A better title would be: Microsoft Copilot isn't HIPAA compliant

A title like this will get it fixed faster.

rst•2h ago
It already is fixed -- the complaint is that customers haven't been notified.
troad•1h ago
Microsoft's ham-fisted strategy for trying to build a moat around its AI offering, by shoving everyone's documents in it without any real informed consent, genuinely beggars belief.

It will not successfully create a moat - turns out files are portable - but it will successfully peeve a huge number of users and institutions off, and inevitably cause years of litigation and regulatory attention.

Are there no adults left at Microsoft? Or is it now just Copilot all the way up?

p_ing•58s ago
Copilot pulls from the substrate, like many other apps. No files are store in Copilot. They’re usually on ODSP but could be in Dataverse or a non-Microsoft product like Confluence (there goes your moat!).
TheRoque•1h ago
In my opinion, using AI tools for programming at the moment, unless in a sandboxed environment and on a toy project, is just ludicrous. The amount of shady things going on in this domain (AI trained on stolen content, no proper attribution, not proper way to audit what's going out to third party servers etc.) should be a huge red flag for any professional developer.
neuroelectron•55m ago
The icing on the shit cake is a text editor programmed in typeScript with an impossible to secure plugin architecture.
ThrowawayTestr•39m ago
Companies won't use open source software because of licencing concerns but if you launder it through an LLM it's hunky-dory.
AdieuToLogic•4m ago
> In my opinion, using AI tools for programming at the moment, unless in a sandboxed environment and on a toy project, is just ludicrous.

Well put.

The fundamental flaw is in trying to employ nondeterministic content generation based on statistical relevance defined by an unknown training data set, which is what commercial LLM offerings are, in an effort to repeatably produce content satisfying a strict mathematical model (program source code).

overgard•22m ago
I don’t know much about audit logs, but the more concerning thing to me is it sounds like it’s up to the program reading the file to register an access? Shouldn’t that be something at the file system level? I’m a bit baffled why this is a copilot bug instead of a file system bug unless copilot has special privileges? (Also to that: ick!)
IcyWindows•10m ago
I suspect this might be typical RAG where there is a vector index or chucked data it looks at.
degamad•2m ago
One thing that's not clear in the write-up here: *which* audit log is he talking about? Sharepoint file accesses? Copilot actions? Purview? Something else?

AGENTS.md – Open format for guiding coding agents

https://agents.md/
181•ghuntley•3h ago•111 comments

Copilot broke audit logs, but Microsoft won't tell customers

https://pistachioapp.com/blog/copilot-broke-your-audit-log
238•Sayrus•3h ago•65 comments

How to Draw a Space Invader

https://muffinman.io/blog/invaders/
153•abdusco•4h ago•10 comments

How we exploited CodeRabbit: From simple PR to RCE and write access on 1M repos

https://research.kudelskisecurity.com/2025/08/19/how-we-exploited-coderabbit-from-a-simple-pr-to-rce-and-write-access-on-1m-repositories/
508•spiridow•11h ago•169 comments

Tiny microbe challenges the definition of cellular life

https://nautil.us/a-rogue-new-life-form-1232095/
41•jnord•4h ago•5 comments

We’re Not So Special: A new book challenges human exceptionalism

https://democracyjournal.org/magazine/78/were-not-so-special/
6•nobet•57m ago•0 comments

D2 (text to diagram tool) now supports ASCII renders

https://d2lang.com/blog/ascii/
225•alixanderwang•9h ago•37 comments

Drunken Bishop (2023)

https://re.factorcode.org/2023/08/drunken-bishop.html
45•todsacerdoti•5h ago•7 comments

Tiny, removable "mini SSD" could eventually be a big deal for gaming handhelds

https://arstechnica.com/gadgets/2025/08/tiny-removable-mini-ssd-could-eventually-be-a-big-deal-for-gaming-handhelds/
36•quantummagic•3d ago•24 comments

Emacs as your video-trimming tool

https://xenodium.com/emacs-as-your-video-trimming-tool
191•xenodium•11h ago•101 comments

Physically Based Rendering in Filament

https://google.github.io/filament/Filament.md.html#overview
25•indigo945•1d ago•9 comments

Without the futex, it's futile

https://h4x0r.org/futex/
239•eatonphil•13h ago•113 comments

Candle Flame Oscillations as a Clock

https://cpldcpu.com/2025/08/13/candle-flame-oscillations-as-a-clock/
256•cpldcpu•3d ago•56 comments

CRDT: Text Buffer

https://madebyevan.com/algos/crdt-text-buffer/
76•skadamat•7h ago•2 comments

How to Scale Your Model: How to Think About GPUs

https://jax-ml.github.io/scaling-book/gpus/
51•matt_d•5h ago•1 comments

Show HN: OpenAI/reflect – Physical AI Assistant that illuminates your life

https://github.com/openai/openai-reflect
55•Sean-Der•7h ago•22 comments

How Figma’s multiplayer technology works (2019)

https://www.figma.com/blog/how-figmas-multiplayer-technology-works/
120•redbell•3d ago•44 comments

Rails Charts Using ECharts from Apache

https://github.com/railsjazz/rails_charts
11•amalinovic•1d ago•0 comments

AnduinOS

https://www.anduinos.com/
87•TheFreim•8h ago•116 comments

Why Semantic Layers Matter (and how to build one with DuckDB)

https://motherduck.com/blog/semantic-layer-duckdb-tutorial/
99•secondrow•10h ago•22 comments

Custom telescope mount using harmonic drives and ESP32

https://www.svendewaerhert.com/blog/telescope-mount/
263•waerhert•17h ago•100 comments

Launch HN: Uplift (YC S25) – Voice models for under-served languages

94•zaidqureshi•15h ago•41 comments

Passive Microwave Repeaters

https://computer.rip/2025-08-16-passive-microwave-repeaters.html
96•BallsInIt•3d ago•16 comments

The joy of recursion, immutable data, & pure functions: Making mazes with JS

https://jrsinclair.com/articles/2025/joy-of-immutable-data-recursion-pure-functions-javascript-mazes/
59•jrsinclair•1d ago•13 comments

A renovation project in Turkey led to the discovery of a lost city (2023)

https://www.atlasobscura.com/articles/derinkuyu-turkey-underground-city-strange-maps
69•areoform•11h ago•20 comments

Geotoy – Shadertoy for 3D Geometry

https://3d.ameo.design/geotoy
108•Ameo•1d ago•22 comments

Perfect Freehand – Draw perfect pressure-sensitive freehand lines

https://www.perfectfreehand.com/
114•NikxDa•7h ago•9 comments

Notion releases offline mode

https://www.notion.com/help/guides/working-offline-in-notion-everything-you-need-to-know
186•ericzawo•8h ago•133 comments

Positron, a New Data Science IDE

https://posit.co/blog/positron-product-announcement-aug-2025/
135•kgwgk•13h ago•42 comments

Vendors that treat single sign-on as a luxury feature

https://sso.tax/
233•vinnyglennon•7h ago•160 comments