cURL removes bug bounties

etn.se

126 points by jnord 2 hours ago


dlcarrier - an hour ago

An entry fee that is reimbursed if the bug turns out to matter would stop this, real quick.

Then again, I once submitted a bug report to my bank, because the login method could be switched from password+pin to pin only, when not logged in, and they closed it as "works as intended", because they had decided that an optional password was more convenient than a required password. (And that's not even getting into the difference between real two-factor authentication the some-factor one-and-a-half-times they had implemented by adding a PIN to a password login.) I've since learned that anything heavily regulated like hospitals and banks will have security procedures catering to compliance, not actual security.

Assuming the host of the bug bounty program is operating in good faith, adding some kind of barrier to entry or punishment for untested entries will weed out submitters acting in bad faith.

jameslk - an hour ago

It seems open source loses the most from AI. Open source code trained the models, the models are being used to spam open source projects anywhere there's incentive, they can be used to chip away at open source business models by implementing paid features and providing the support, and eventually perhaps AI simply replaces most open source code

Snakes3727 - 20 minutes ago

The company I work for has a pretty bad bounty system (basically a security@corp email). We have a demo system and a public API with docs. We get around 100 or more emails a day now. Most of it is slop, scams, or my new favourite AI security companies sending us an AI generated pentest un prompted filled with false positives, untrue things, etc. It has become completely useless so no one looks at it.

I had a sales rep even call me up basically trying to book a 3 hour session to review the AI findings unprompted. When I looked at the nearly 250 page report, and saw a critical IIS bug for Windows server (doesn't exist) existing at a scanned IP address of 5xx.x.x.x (yes an impossible IP) publically available in AWS (we exclusively use gcp) I said some very choice words.

nottorp - 10 minutes ago

What I wonder is if this will actually reduce the amount of slop.

Bounties are a motivation, but there's also promotional purposes. Show that you submitted thousands of security reports to major open source software and you're suddenly a security expert.

Remember the little iot thing that got on here because of a security report complaining, among other things, that the linux on it did not use systemd?

bilekas - 23 minutes ago

I just read one of the slop submissions and it's baffling how anyone could submit these with a straight face.

https://hackerone.com/reports/3293884

Not even understanding the expected behaviour and then throwing as much slop as possible to see what sticks is the problem with generative AI.

- 27 minutes ago
[deleted]
eknkc - an hour ago

A list of the slop if anyone is interested:

https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d...

plastic041 - an hour ago

related: cURL stopped HackerOne bug bounty program due to excessive slop reports https://news.ycombinator.com/item?id=46678710

- an hour ago
[deleted]
ChrisArchitect - an hour ago

Previously: https://news.ycombinator.com/item?id=46617410

https://news.ycombinator.com/item?id=46678710

ares623 - 25 minutes ago

Alternate headline: AI discovering so many exploits that cybersecurity can't keep up

Am I doing this right?

novalis78 - an hour ago

Just use an LLM to weed them out. What’s so hard about that?