~swapgs
banner
swapgs.infosec.exchange.ap.brid.gy
~swapgs
@swapgs.infosec.exchange.ap.brid.gy
zigzagging my way through cursed code and bugs

[bridged from https://infosec.exchange/@swapgs on the fediverse by https://fed.brid.gy/ ]
Reposted by ~swapgs
Scoopy, new, by me:

Meet Rey, the Admin of 'Scattered Lapsus$ Hunters'

"A prolific cybercriminal group that calls itself "Scattered LAPSUS$ Hunters"
made headlines regularly this year by stealing data from and publicly mass
extorting dozens of major […]

[Original post on infosec.exchange]
November 26, 2025 at 5:29 PM
Han I would looove to audit this thing! Having devices with Bluetooth and Wi-Fi support in a DC sounds fun :ablobcatwave:

https://www.scaleway.com/en/blog/how-we-turn-apples-mac-mini-into-high-performance-dedicated-servers/
How We Turn Apple’s Mac Mini Into High-Performance Dedicated Servers
From desktop to datacenter: how Scaleway turns Apple's Mac mini into a fully managed, high-performance cloud server for macOS and iOS developers.
www.scaleway.com
November 26, 2025 at 7:37 PM
Reposted by ~swapgs
The 2026 online public sessions of my "Mastering Burp Suite Pro" course have been published 📅

- March 24th to 27th, in French 🇫🇷
- April 14th to 17th, in English 🇬🇧

hackademy.agarri.fr/2026

PS: feel free to ping me if you'd like to temporarily block a seat or are looking for a 10% coupon 🎁
Agarri
Training
hackademy.agarri.fr
November 24, 2025 at 10:14 AM
Reposted by ~swapgs
if your company sets a `Content-Security-Policy` header: who's in charge of deciding what it should be? (someone in security? someone who works on the frontend? other? multiple people?)

https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP
Content Security Policy (CSP) - HTTP | MDN
Content Security Policy (CSP) is a feature that helps to prevent or minimize the risk of certain types of security threats. It consists of a series of instructions from a website to a browser, which instruct the browser to place restrictions on the things that the code comprising the site is allowed to do.
developer.mozilla.org
November 20, 2025 at 7:50 PM
And… it’s lacking the juiciest technical stuff :( https://fedi.lwn.net/@lwn/115577257668492393
LWN.net (@lwn@lwn.net)
Postmortem of the Xubuntu.org download site compromise https://lwn.net/Articles/1047056/ #LWN
fedi.lwn.net
November 20, 2025 at 3:58 PM
DMA is fun and all… until you have to flash the FPGA and pull these insane proprietary toolchains. All of that to dump a binary and exploit a bug I already have ;-;
November 5, 2025 at 9:24 PM
Reposted by ~swapgs
I wrote up some notes on two new papers on prompt injection: Agents Rule of Two (from Meta AI) and The Attacker Moves Second (from Anthropic + OpenAI = DeepMind + others) https://simonwillison.net/2025/Nov/2/new-prompt-injection-papers/
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
Two interesting new papers regarding LLM security and prompt injection came to my attention this weekend. Agents Rule of Two: A Practical Approach to AI Agent Security The first is …
simonwillison.net
November 2, 2025 at 11:11 PM
Reposted by ~swapgs
There is a new "Share on Mastodon" button on the official @Mastodon blog, feel free to try it out and let me know what you think.
November 2, 2025 at 8:30 PM
lol this one was sitting in my mail drafts since the recent CVE on the remote OCI feature. Still a bunch of bugs left in the loaders :> https://bird.makeup/users/0xmadvise/statuses/1983893375498776932
bird.makeup - Tweet
Sucks, yesterday i've discovered a path traversal in docker compose, but unfortunately it will not be assigned as a CVE. Because i was supposed to send an email instead of opening a public issue in GH😅 anyhow the poc can be found here: https://github.com/0pepsi/DockerCompose-path-traversal
bird.makeup
October 31, 2025 at 4:38 PM
How long is it gonna take before agentic browsers start scraping airline websites without telling the user? Sounds like a good market to take over :)
October 28, 2025 at 1:29 PM
Reposted by ~swapgs
Never cared much for Omarchy: It's being made by a right-wing dipshit with no experience with Linux and distributions who's whole "Opinion" seems to be that "90ies Hacker movie look" is what makes a good operating system.

But when I read this actual review https://マリウス.com/a-word-on-omarchy/ I […]
Original post on tldr.nettime.org
tldr.nettime.org
October 27, 2025 at 8:31 AM
First time I'm seeing public docs on the scrambled TP-Link Lua bytecode: https://youtu.be/-ek5znxcMb0?t=820, nice contribution :)
October 26, 2025 at 10:35 PM
Reposted by ~swapgs
here's how you can use it to "just-in-time" compile and run any C (or C++) code you'd like:
October 26, 2025 at 10:14 AM
Reposted by ~swapgs
please enjoy: my Wasm-hosted, Wasm-targeting build of Clang/Clang++/LLD: a self-contained, 25 MiB (gzipped) pure function
https://www.npmjs.com/package/@yowasp/clang
October 26, 2025 at 9:48 AM
Reposted by ~swapgs
github should have a leaderboard for "most watched build logs" imo

watch paint dry with me https://github.com/YoWASP/clang/actions/runs/18807245820/job/53663205983
Update to LLVM 21.1.4 and add an NPM package. · YoWASP/clang@9488c63
Unofficial clang WebAssembly packages. Contribute to YoWASP/clang development by creating an account on GitHub.
github.com
October 25, 2025 at 7:07 PM
Reposted by ~swapgs
AIxCC curl details
At the AIxCC competition at DEF CON 33 earlier this year, teams competed against each other to find vulnerabilities in provided Open Source projects by using (their own) AI powered tools. An added challenge was that the teams were also tasked to have their tooling generate patches for the found problems, and the competitors could have a go to try to poke holes on the patches which if they were successful would lead to a reduced score for the patching team. ## Injected vulnerabilities In order to give the team actual and perhaps even realistic flaws to find, the organizers injected flaws into existing source code. I was curious about how exactly this was done as curl was one of the projects they used for this in the finals, so I had a look and I figured I would let you know. Should you also perhaps be curious. Would your tools find these vulnerabilities? Other C based projects used for this in the finals included OpenSSL, little-cms, libexif, libxml2, libavif, freerdp, dav1d and wireshark. ## The curl intro First, let’s paste their description of the curl project here to enjoy their heart-warming words. _curl is a command-line tool and library for transferring data with URLs, supporting a vast array of protocols including HTTP, HTTPS, FTP, SFTP, and dozens of others. Written primarily in C, this Swiss Army knife of data transfer has been a cornerstone of internet infrastructure since 1998, powering everything from simple web requests to complex API integrations across virtually every operating system. What makes curl particularly noteworthy is its incredible protocol support–over 25 different protocols–and its dual nature as both a standalone command-line utility and a powerful library (libcurl) that developers can embed in their applications. The project is**renowned for its exceptional stability, security focus, and backward compatibility, making it one of the most widely deployed pieces of software in the world**. From IoT devices to major web services, curl quietly handles billions of data transfers daily, earning it a reputation as one of the most successful and enduring open source projects ever created._ ## Five curl “tasks” There is this website providing (partial) information about all the challenges in the final, or as they call them: tasks. Their site for this is very flashy and _cyber_ I’m sure, but I find it super annoying. It doesn’t provide _all_ the details but enough to give us some basic insights of what the teams were up against. ### Task 9 The organizers wrote a new protocol handler into curl for supporting the “totallyfineprotocl” (yes, with a typo) and within that handler code they injected a rather crude NULL pointer assignment shown below. The result variable is an integer containing zero at that point in the code. A NULL pointer dereference in a case statement within a switch. ### Task 10 This task had two vulnerabilities injected. The first one is an added parser in the HTTP code for the response header `X-Powered-by:` where the code copies the header field value to a fixed-size 64 bytes buffer, so that if the contents is larger than so it is a heap buffer overflow. A heap buffer overflow The second one is curiously almost a duplicate of task 9 using code for a new protocol: NULL pointer dereference ### Task 20 Two vulnerabilities. The first one inserts a new authentication method to the DICT protocol code, where it contains a debug handler/message with string format vulnerability. The curl internal sendf() function takes printf() formatting options. A string format vulnerability The second is hard to understand based on the incomplete code they provide, but the gist of it that the code uses an array for number of seconds in text format that it indexes with the given “current second” without taking leap seconds into account which then would access the stack out of bounds if tm->tm_sec is ever larger than 59: Out of bounds read in the Curl_Seconds() macro ### Task 24 Third time’s the charm? Here’s the maybe not so sneaky NULL pointer dereference in a _third_ made up protocol handler quite similar to the previous two: ### Task 44 This task is puzzling to me because it is listed as “0 vulnerabilities” and there is no vulnerability details listed or provided. Is this a challenge no one cracked? A flaw on the site? A trick question? ## Modern tools find these Given what I recently have seen what modern tools from Aisle and ZeroPath etc can deliver, I suspect lots of tools can find these flaws now. As seen above here, they were all rather straight forward and not hidden or deeply layered very much. I think for future competitions they need to up their game. Caveat of course that I didn’t look much at the tasks related to other projects; maybe they were harder? Of course making the problems harder to find will also make more work for the organizers. I suspect a real obstacle for the teams to find these issues had to be the amount of _other_ potential issues the tools also found and reported; some rightfully and some not quite as correctly. Remember how ZeroPath gave us over 600 potential issues on curl’s master repository just recently. I have no particular reason to think that other projects would have fewer, at least if at a comparable size. ## Reports? I have unfortunately not seen much written in terms of reports and details from the competition from the competing teams. I am still waiting for details on some of their scans on curl.
daniel.haxx.se
October 22, 2025 at 8:09 AM
Goodbye register_argc_argv that was still (unintentionally) enabled in official PHP Docker images!

But in the other hand the deprecation of __wakeup() will likely bring back a few popchains to life. https://fosstodon.org/@php/115349139620278619
PHP (@php@fosstodon.org)
🎉 PHP 8.5.0 RC 2 is available for testing! This is the second release candidate for PHP 8.5, including - Revert deprecation of __sleep() and __wakeup(). They're now soft-deprecated (Docs only) instead. - Lots of bug fixes thanks to your testing Details: https://github.com/php/php-src/blob/php-8.5.0RC2/NEWS ➕ Do: Test your projects! ➖ Don't: Run it in production. It's not fully ready yet. Congratulations to @edorian@phpc.social, Daniel, and @adoy@phpc.social 🔗 https://www.php.net/archive/2025.php#2025-10-09-2 #PHP #PHP85 #Release
fosstodon.org
October 10, 2025 at 1:13 PM
Reposted by ~swapgs
hey wanna see something kinda interesting? this was the entire fix to the iPhone Antennagate in 2010. 20 bytes.

(this is going to be a very long thread 🧵)
October 7, 2025 at 12:43 AM
Good bug, but probably one of the worst blog posts ever? https://infosec.exchange/@cR0w/115329314607068906
sp00ky cR0w 🏴 (@cR0w@infosec.exchange)
If you care about Redis: https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844
infosec.exchange
October 7, 2025 at 8:20 AM
Reposted by ~swapgs
I may have found my defining quote.

Pair this with my pinned post and you will see what I mean!
September 29, 2025 at 12:22 PM
Reposted by ~swapgs
Remember the jokes that there will only be three browser engines left: Mozilla, Blink and yt-dlp. https://github.com/yt-dlp/yt-dlp/issues/14404
[Announcement] Upcoming new requirements for YouTube downloads · Issue #14404 · yt-dlp/yt-dlp
Beginning very soon, you'll need to have the JavaScript runtime Deno installed to keep YouTube downloads working as normal. Why? Up until now, yt-dlp has been able to use its built-in JavaScript "i...
github.com
September 24, 2025 at 5:48 PM