Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.
First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.
The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.
This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (https://newsletter.semianalysis.com/p/claude-code-is-the-inflection-point), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).
The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as https://dpc.pw/posts/i-dont-want-your-prs-anymore/), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 https://www.cs.fsu.edu/~whalley/papers/tecs06.pdf). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.
Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!
Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).
Thanks again for taking the time to write your thoughts down; looking forward to more discussion!
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.
First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.
The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.
This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (https://newsletter.semianalysis.com/p/claude-code-is-the-inflection-point), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).
The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as https://dpc.pw/posts/i-dont-want-your-prs-anymore/), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 https://www.cs.fsu.edu/~whalley/papers/tecs06.pdf). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.
Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!
Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).
Thanks again for taking the time to write your thoughts down; looking forward to more discussion!
Overview
Description
Statistics
- 1 Post
Fediverse
📰 CISA Discovers 'FIRESTARTER' Backdoor on Federal Cisco Firewall; Malware Survives Patches
🔥 CISA finds new 'FIRESTARTER' backdoor on a federal agency's Cisco firewall. The malware survives patches and firmware updates, allowing persistent access. Exploited CVE-2025-20333 & CVE-2025-20362. #CyberSecurity #CISA #Backdoor #Cisco
Overview
Description
Statistics
- 1 Post
Fediverse
📰 CISA Discovers 'FIRESTARTER' Backdoor on Federal Cisco Firewall; Malware Survives Patches
🔥 CISA finds new 'FIRESTARTER' backdoor on a federal agency's Cisco firewall. The malware survives patches and firmware updates, allowing persistent access. Exploited CVE-2025-20333 & CVE-2025-20362. #CyberSecurity #CISA #Backdoor #Cisco
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
En las últimas 24 horas se detectaron vulnerabilidades críticas que permiten ejecución remota de código en ProFTPD y GitHub Enterprise Server, y una rápida explotación de SQL Injection en LiteLLM compromete datos en la nube; además, el ransomware VECT 2.0 destruye archivos irreversiblemente en múltiples sistemas, aumentando el riesgo. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:
🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 29/04/26 📆 |====
🔓 CVE-2026-42167 PERMITE EVITAR AUTENTICACIÓN Y EJECUCIÓN DE CÓDIGO EN PROFTPD
Se ha identificado una grave vulnerabilidad en ProFTPD, catalogada como CVE-2026-42167, que permite saltarse procesos de autenticación, elevar privilegios y ejecutar código arbitrario. Esta falla representa un riesgo significativo para servidores FTP que no estén actualizados. Se recomienda aplicar la actualización que MITRE y los desarrolladores emitirán próximamente para mitigar posibles ataques. Mantente alerta y protege tus sistemas. Descubre todos los detalles sobre esta vulnerabilidad y cómo protegerte aquí 👉 https://djar.co/tWdN
💻 VULNERABILIDAD CRÍTICA RCE EN GITHUB ENTERPRISE SERVER CVE-2026-3854
GitHub Enterprise Server enfrenta una vulnerabilidad con un puntaje CVSS de 8.7 que permite la ejecución remota de código, poniendo en riesgo repositorios y datos sensibles de las organizaciones. Esta amenaza impacta directamente en la integridad y la seguridad de los entornos corporativos que utilizan esta plataforma. La actualización inmediata es vital para evitar compromisos graves. Analiza a fondo la vulnerabilidad y las versiones afectadas para tomar acción rápida. Más información y recomendaciones aquí 👉 https://djar.co/lWbCh
⚠️ EXPLOTACIÓN RÁPIDA DE SQL INJECTION EN LITELLM CVE-2026-42208
En un caso alarmante, la vulnerabilidad SQL Injection CVE-2026-42208 en LiteLLM fue aprovechada en menos de 36 horas tras su divulgación, comprometiendo credenciales y poniendo en riesgo cuentas en la nube. Esto evidencia la necesidad de implementar medidas proactivas y monitorear activamente los sistemas contra ataques tempranos. Revisa cómo se desarrolló este incidente y las mejores prácticas para proteger tus datos en la nube. Entérate aquí 👉 https://djar.co/LQrNO4
🛡️ VECT: RANSOMWARE COMO SERVICIO Y SU IMPACTO EN LA CADENA DE SUMINISTRO
El ransomware VECT, surgido en diciembre de 2025, se distingue por operar bajo modelo Ransomware-as-a-Service, causando estragos en varias cadenas de suministro. Su capacidad para expandirse y ejecutar ataques destructivos torna esencial entender su funcionamiento para anticipar y mitigar riesgos. La investigación de Check Point revela sus tácticas y evolución, información clave para defensores de la ciberseguridad. Explora el análisis completo sobre VECT y su impacto aquí 👉 https://djar.co/O8ko
💥 VECT 2.0 DESTRUYE IRREVERSIBLEMENTE ARCHIVOS EN WINDOWS, LINUX Y ESXI
La actualización 2.0 del ransomware VECT introduce un fallo en la gestión del nonce que provoca la destrucción permanente de archivos mayores a 131KB, haciendo inútiles los pagos de rescate y complicando las opciones de recuperación. Afecta múltiples sistemas operativos, aumentando la gravedad de los ataques. Comprender esta nueva versión es vital para fortalecer las estrategias de defensa y respuesta ante incidentes. Conoce más sobre esta amenaza crítica y cómo proteger tus datos aquí 👉 https://djar.co/pYoGQk
🎯 CLASE VIRTUAL AVANZADA: DETECCIÓN Y PREVENCIÓN DE MALWARE - CQURE ACADEMY
Especialistas en ciberseguridad tienen la oportunidad de profundizar en técnicas avanzadas de búsqueda y prevención de malware a través de esta clase magistral en vivo. La formación incluye métodos prácticos y teóricos para identificar amenazas complejas y fortalecer la postura defensiva de las organizaciones frente a ataques sofisticados. No pierdas la oportunidad de actualizar tus habilidades y conocimientos. Inscríbete y accede al curso aquí 👉 https://djar.co/RYH0
📚 GUÍA PARA AUTORES EN CIBERSEGURIDAD - THE HACKER RECIPES
Esta guía es ideal para profesionales interesados en escribir sobre hacking ético, pruebas de penetración y ciberseguridad. Ofrece estrategias claras para estructurar contenido técnico y didáctico, facilitando la comunicación efectiva de conocimientos complejos. Una herramienta valiosa para quienes desean contribuir al ecosistema de la seguridad informática con contenidos de calidad. Descubre cómo mejorar tus publicaciones y aportar valor aquí 👉 https://djar.co/u2Dz
Overview
Description
Statistics
- 1 Post