frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

AI found 12 vulnerabilities in OpenSSL

https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
80•mmsc•2h ago

Comments

dnw•1h ago
"We submitted detailed technical reports through their coordinated security reporting process, including complete reproduction steps, root cause analysis, and concrete patch proposals. In each case, our proposed fixes either informed or were directly adopted by the OpenSSL team."

This sounds like a great approach. Kudos!

ktimespi•1h ago
Link seems to be down... But also, considering curl recently shut down its bug bounty program due to AI spam, this doesn't really inspire much confidence.
baby•1h ago
This sounds amazing but not too much info on how it worked
blibble•1h ago
> Finding a genuine security flaw in OpenSSL is extraordinarily difficult.

history suggests otherwise

> The fact that 12 previously unknown vulnerabilities could still be found there, including issues dating back to 1998, suggests that manual review faces significant limits, even in mature, heavily audited codebases.

no, the code is simply beyond horrible to read, not to mention diabolically bad

if you've never tried it, have a go, but bring plenty of eyebleach

lumost•1h ago
It really is just a collection of several dozen research grade implementations for algorithms + a small handful of load bearing algorithms for the entire internet. Surprisingly, OpenSSL isn't the only critical piece of internet architecture like this.
ryandvm•43m ago
The longer I develop software, the more I realize just how awful most software engineering it.
dwattttt•20m ago
Referencing the classic https://xkcd.com/2030

"I don't quite know how to put this, but our entire field is bad at what we do, and if you rely on us everyone will die"

"They say they've fixed it with something called <del>blockchain</del> AI"

"Bury it in the desert. Wear gloves"

timschmidt•1h ago
The badness cannot be overstated. "Hostile codebase" would be an appropriate label. Much more information available in Giovani Bechis's presentation: https://www.slideshare.net/slideshow/libressl/42162879

If someone meant to engineer a codebase to hide subtle bugs which might be remotely exploitable, leak state, behave unexpectedly at runtime, or all of the above, the code would look like this.

rakel_rakel•30m ago
Another great example from tedunangst's excellent presentation "LibreSSL more than 30 days later".

https://youtu.be/WFMYeMNCcSY&t=1024

Teaser: "It's like throw a rock, you're gonna hit something... I pointed people in the wrong direction, and they still found a bug".

Swizec•30m ago
> If someone meant to engineer a codebase to hide subtle bugs which might be remotely exploitable, leak state, behave unexpectedly at runtime, or all of the above, the code would look like this.

I wonder who could possibly be incentivized to make the cryptography package used by most of the worlds computers and communications networks full of subtly exploitable hard to find bugs. Surely everyone would want such a key piece of technology to be air tight and easy to debug

But also: surely a technology developed in a highly adversarial environment would be easy to maintain and keep understandable. You definitely would have no reason to play whackamole with random stuff as it arises

oefrha•21m ago
See also The State of OpenSSL for pyca/cryptography

https://cryptography.io/en/latest/statements/state-of-openss...

Recently discussed: https://news.ycombinator.com/item?id=46624352

> Finally, taking an OpenSSL public API and attempting to trace the implementation to see how it is implemented has become an exercise in self-flagellation. Being able to read the source to understand how something works is important both as part of self-improvement in software engineering, but also because as sophisticated consumers there are inevitably things about how an implementation works that aren’t documented, and reading the source gives you ground truth. The number of indirect calls, optional paths, #ifdef, and other obstacles to comprehension is astounding. We cannot overstate the extent to which just reading the OpenSSL source code has become miserable — in a way that both wasn’t true previously, and isn’t true in LibreSSL, BoringSSL, or AWS-LC.

Also,

> OpenSSL’s CI is exceptionally flaky, and the OpenSSL project has grown to tolerate this flakiness, which masks serious bugs. OpenSSL 3.0.4 contained a critical buffer overflow in the RSA implementation on AVX-512-capable CPUs. This bug was actually caught by CI — but because the crash only occurred when the CI runner happened to have an AVX-512 CPU (not all did), the failures were apparently dismissed as flakiness. Three years later, the project still merges code with failing tests: the day we prepared our conference slides, five of ten recent commits had failing CI checks, and the day before we delivered the talk, every single commit had failing cross-compilation builds.

Even bugs caught by CI get ignored and end up in releases.

lovich•59m ago
I can read C/C++ code about as well as I can read German. Bits and pieces make sense but I definitely don’t get the subtleties.

What’s eye bleachy about this beyond regular C/C++?

For context I’m fluent in C#/javascript/ruby and generally understand structs and pointers although not confident in writing performant code with them.

jeffbee•53m ago
For one thing, "C/C++" is not a thing. If you see C-like C++, that is C.

Part of OpenSSL's incomprehensibility is that it is not C++ and therefore lacks automatic memory management. Because it doesn't have built-in allocation and initialization, it is filled with BLAH_grunk_new and QVQ_hurrr_init. "new" and "init" semantics vary between modules because it's all ad hoc. Sometimes callees deallocate their arguments.

The only reason is needs module prefixes like BLAH and QVQ and DERP is that again it is not C++ and lacks namespaces. To readers, this is just visual noise. Sometimes a function has the same name with a different module, and compatible function signature, so it's possible to accidentally call the wrong one.

rzerowan•49m ago
Also werent a lot of deadend code removed and vulns patched into what would become LibreSSL.

Would be interesting to see if any of those found exist there.

cryptonector•33m ago
> history suggests otherwise

The methodology for developing and maintaining codebases like OpenSSL has changed!

> no, the code is simply beyond horrible to read, not to mention diabolically bad

OpenSSL? Parts of it definitely are, yes. It's better since they re-styled it. The old SSLeay code was truly truly awful.

move-on-by•1h ago
Pretty impressive. Whether you think AI is a bubble or not, we all benefit from these findings.

As for all the slop the Curl team has been putting up with, I suppose a fool with a tool is still a fool.

bandrami•1h ago
I'm bearish on AI creating working software but bullish on AI doing this kind of thing
cryptonector•32m ago
AI is definitely creating working software.

It's also leading people to submit hallucinations as security vulns in open source. I've had to deal with some of them.

bandrami•31m ago
Nah, if that were true there would be a lot more new software available. What's it working at is making developers feel busy, which is itself a worthwhile task.
soulofmischief•29m ago
Are you unable to create working software with frontier models?
bandrami•24m ago
I am, though it always takes me longer than just writing it myself because I have to fix so much (which may be a function of the kind of software I write). But more importantly the development team I support as an admin absolutely loves their agents or whatever they're being called this week and yet isn't giving me stuff that I can move into operations any faster than they were a year ago.
soulofmischief•21m ago
What industry, and what kind of software? Your assessment was generally spot on a year ago, but things have changed dramatically in the last quarter, so I'm curious how fresh this assessment is.
bandrami•12m ago
Well, multiple types of software. The avionics simulation software we make isn't really a candidate for AI both because of procurement requirements and the fact that as of this month (we do check periodically) no LLM really gets how to do realtime Linux processes (this may be downstream of the fact that most writing about this topic on the Web is catastrophically wrong). The stuff we can use AI on is just generic customer-facing web schlock and it sure looks like we're trading dev time for integration time for what ends up being a wash.
martinald•1h ago
This really is quite scary.

I suspect this year we are going to see a _lot_ more of this.

While it's good these bugs are being found and closed, the problem is two fold

1) It takes time to get the patches through distribution 2) the vast majority of projects are not well equipped to handle complex security bugs in a "reasonable" time frame.

2 is a killer. There's so much abandonware out there, either as full apps/servers or libraries. These can't ever really be patched. Previously these weren't really worth spending effort on - might have a few thousand targets of questionable value.

Now you can spin up potentially thousands of exploits against thousands of long tail services. In aggregate this is millions of targets.

And even if this case didn't exist it's going to be difficult to patch systems quickly enough. Imagine an adversary that can drip feed zero days against targets.

Not really sure how this can be solved. I guess you'd hope that the good guys can do some sort of mega patch against software quicker than bad actors.

But really as the npm debacle showed the industry is not in a good place when it comes to timely secure software delivery even without millions of potential new zero days flying around.

CharlesW•37m ago
It's good these bugs are being found and closed. The problems have nothing to do with AI, unless I'm missing something.
MBCook•23m ago
There’s a reason multiple projects popped up to replace OpenSSL after Heartbleed was discovered.

Let’s see them to do this on projects with a better historical track record.

crm9125•1h ago
"Humans + AI" ...

Without Humans, AI does nothing. Currently, at least.

adzm•1h ago
Just wait until AI has its own money
belter•1h ago
Wait until AI starts using AI
pizlonator•1h ago
Impressive.

I checked the stack overflow that was marked High, and Fil-C prevents that one.

One of the out-of-bounds writes is also definitely prevented.

It's not clear if Fil-C protects you against all of the others (Fil-C won't prevent denial of service, and that's what some of these are; Fil-C also won't help you if you accidentally didn't encrypt something, which is what another one of these bugs is about).

The one about forgetting to encrypt some bytes is marked Low Severity because it's an API that they say you're unlikely to use. Seems kinda believable but also ....... terrifying? What if someone is calling the AESNI codepath directly for reasons?

Here's the data about that one:

"Issue summary: When using the low-level OCB API directly with AES-NI or other hardware-accelerated code paths, inputs whose length is not a multiple of 16 bytes can leave the final partial block unencrypted and unauthenticated.

Impact summary: The trailing 1-15 bytes of a message may be exposed in cleartext on encryption and are not covered by the authentication tag, allowing an attacker to read or tamper with those bytes without detection."

jeffbee•1h ago
I don't know why you're still using OpenSSL but if you're able to switch I note that BoringSSL was not affected by any of the January 2026 OpenSSL advisories, and was also not affected by any of the advisories from 2025, and was affected by only one of the 2024 advisories. I also note that I don't see any hasty commit activity to s2n-tls that looks like a response to these advisories.

Better software is out there.

cookiengineer•38m ago
I wanted to mention WolfSSL.

I like to recommend that project because it has a very transparent vulnerabilities approach, and is in my opinion written a lot more sane than OpenSSL which is somewhat not using standard C features because it always implements everything from scratch like a kernel does.

But yeah, anyways, WolfSSL comes from the embedded area in case that's your thing.

[1] https://www.wolfssl.com/

[2] https://github.com/wolfssl/wolfssl

aster0id•59m ago
How many false positives did the AI throw up?
ape4•50m ago
I wonder too. Did it take many human hours to verify everything?
tyre•49m ago
Does it matter? They found 12 vulnerabilities. Clearly there was enough signal:noise that they could uncover these as real.

It doesn't look like they had 1 AI run for 20 minutes and then 30 humans sift through for weeks.

awesome_dude•39m ago
> It doesn't look like they had 1 AI run for 20 minutes and then 30 humans sift through for weeks.

It does, though, look like they were running their AI over the codebase for an extended period of time (not per run, but multiple runs over the period of a year)

> Does it matter?

Hell yes, false reports are the bane of the bug bounty industry.

awesome_dude•41m ago
They don't appear to go into detail about anything except how great it is that they found the bugs, what those bugs were, and how rare it is for other people to find bugs.

I think that it would be helpful from a research point of view to know what sort of noise their AI tool is generating, but, because they appear to be trying to sell the service, they don't want you to know how many dev months you will lose chasing issues that amount to nothing.

ChrisArchitect•39m ago
Related:

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

https://news.ycombinator.com/item?id=46782662

panzi•35m ago
What kind of AI does this use?
_JoRo•32m ago
Does anyone have any recommendations on best practice security methods? As others have said, it sounds like there may be an order of magnitude more vulnerabilities found / exploited, and I'm wondering if security such as 2FA and Password Managers will be enough? Should people be getting on board with other protections such as security keys?
ggm•29m ago
OpenSSL is a very odd codebase, it's grown by accretion, under many stewards, with several flavours of coding belief, over time from SSLEAY which Eric Young coded over 2 decades ago. It had chip-specific speedups from the days of the Intel 486.

I was part of a body which funded work to include some stuff in the code, and the way you take something like X509 and incorperate a new ASN.1 structure inside the code, to be validated against conformance requirements (so not just signing blindly over the bitstream, but understanding the ASN.1 and validating it has certain properties about what it says, like not overlapping assertions of numeric ranges encoded in it) is to invoke callouts from deep down, to perform tasks and then return state. You basically seem to have to do about a 5 layer deep callout and return. It's a massive wedding cake of dependency on itself, it personifies the xkcd diagram of "...depends on <small thing>" risks.

I'm not surprised people continue to find flaws. I would like to understand if this approach also found flaws in e.g. libsodium or other more modern crytography, or in the OpenBSD maintained libreSSL code (or whatever it is) or Peter Gutmann's code.

OpenSSL is a large target.

jibal•26m ago
The title change from "AISLE" to "AI" is misleading. As the article states,

> This doesn't mean that AI can replace human expertise. The OpenSSL maintainers' deep knowledge of the codebase was essential for validating findings and developing robust fixes. But it does change the SLA of security. When autonomous discovery is paired with responsible disclosure, it collapses the time-to-remediation for the entire ecosystem.

mvkel•24m ago
So here we have OpenSSL, coded by humans, universally adopted by the Internet, universally deemed to be terrible code.

More evidence that "coding elegance" is irrelevant to a product's success, which bodes well for AI generated code.

kajaktum•11m ago
Openssl? Code elegance?

Super Monkey Ball ported to a website

https://monkeyball-online.pages.dev/
170•rebasedoctopus•2h ago•39 comments

AI found 12 vulnerabilities in OpenSSL

https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
83•mmsc•2h ago•47 comments

Prism

https://openai.com/index/introducing-prism
506•meetpateltech•10h ago•298 comments

Golden Ratio using an equilateral triangle inscribed in a circle

https://geometrycode.com/free/how-to-graphically-derive-the-golden-ratio-using-an-equilateral-tri...
14•peter_d_sherman•4d ago•0 comments

A few random notes from Claude coding quite a bit last few weeks

https://twitter.com/karpathy/status/2015883857489522876
392•bigwheels•1d ago•381 comments

430k-year-old well-preserved wooden tools are the oldest ever found

https://www.nytimes.com/2026/01/26/science/archaeology-neanderthals-tools.html
371•bookofjoe•12h ago•206 comments

Rust’s Standard Library on the GPU

https://www.vectorware.com/blog/rust-std-on-gpu/
97•justaboutanyone•3d ago•15 comments

Time Station Emulator

https://github.com/kangtastic/timestation
119•FriedPickles•7h ago•33 comments

Lennart Poettering, Christian Brauner founded a new company

https://amutable.com/about
249•hornedhob•9h ago•328 comments

Doing the thing is doing the thing

https://www.softwaredesign.ing/blog/doing-the-thing-is-doing-the-thing
276•prakhar897•22h ago•97 comments

Xfwl4 – The Roadmap for a Xfce Wayland Compositor

https://alexxcons.github.io/blogpost_15.html
280•pantalaimon•14h ago•215 comments

SoundCloud Data Breach Now on HaveIBeenPwned

https://haveibeenpwned.com/Breach/SoundCloud
159•gnabgib•11h ago•81 comments

AI2: Open Coding Agents

https://allenai.org/blog/open-coding-agents
143•publicmatt•11h ago•19 comments

Amazon closing its Fresh and Go stores

https://finance.yahoo.com/news/amazon-closing-fresh-grocery-convenience-150437789.html
185•trenning•12h ago•396 comments

Try text scaling support in Chrome Canary

https://www.joshtumath.uk/posts/2026-01-27-try-text-scaling-support-in-chrome-canary/
84•linolevan•9h ago•25 comments

FBI is investigating Minnesota Signal chats tracking ICE

https://www.nbcnews.com/tech/internet/fbi-investigating-minnesota-signal-minneapolis-group-ice-pa...
617•duxup•10h ago•758 comments

Show HN: One Human + One Agent = One Browser From Scratch in 20K LOC

https://emsh.cat/one-human-one-agent-one-browser/
176•embedding-shape•15h ago•90 comments

I found the perfect yearly calendar (for me)

https://blog.notmyhostna.me/posts/i-found-the-perfect-yearly-calendar-for-me
23•dewey•4d ago•7 comments

How many chess games are possible?

https://win-vector.com/2026/01/27/how-many-chess-games-are-possible/
45•jmount•8h ago•23 comments

Thief of $90M in seized U.S.-controlled crypto is gov't contractor's son

https://www.web3isgoinggreat.com/single/lick-theft
243•pavel_lishin•6h ago•53 comments

Show HN: Fuzzy Studio – Apply live effects to videos/camera

https://fuzzy.ulyssepence.com/
29•ulyssepence•13h ago•9 comments

Extremophile molds are invading art museums

https://www.scientificamerican.com/article/how-extremophile-molds-are-destroying-museum-artifacts/
58•sohkamyung•4d ago•27 comments

Show HN: LemonSlice – Upgrade your voice agents to real-time video

76•lcolucci•10h ago•83 comments

Hypercubic (YC F25) Is Hiring a Founding SWE and COBOL Engineer

https://www.ycombinator.com/companies/hypercubic/jobs
1•sai18•9h ago

TikTok settles just before social media addiction trial to begin

https://www.bbc.com/news/articles/c24g8v6qr1mo
152•ourmandave•7h ago•149 comments

Arrows to Arrows, Categories to Queries

https://reasonablypolymorphic.com/blog/arrows-to-arrows/
29•surprisetalk•4d ago•2 comments

Clawdbot Renames to Moltbot

https://github.com/moltbot/moltbot/commit/6d16a658e5ebe6ce15856565a47090d5b9d5dfb6
189•philip1209•10h ago•161 comments

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
85•MagerValp•11h ago•39 comments

The First Eighteen Lines of the Waste Land (1989)

https://yalereview.org/article/hecht-eliot-waste-land
31•benbreen•4d ago•12 comments

TikTok users can't upload anti-ICE videos. The company blames tech issues

https://www.cnn.com/2026/01/26/tech/tiktok-ice-censorship-glitch-cec
1293•kotaKat•14h ago•850 comments