logoalt Hacker News

Benderyesterday at 3:10 PM1 replyview on HN

Along this line can AI's find backdoors spread across multiple pieces of code and/or services? i.e. by themselves they are not back-doors, advanced penetration testers would not suspect anything is afoot but when used together they provide access.

e.g. an intentional weakness in systemd + udev + binfmt magic when used together == authentication and mandatory access control bypass. Each weakness reviewed individually just looks like benign sub-optimal code.


Replies

cluckindanyesterday at 3:36 PM

Start with trying to find the xz vulnerability and other software possibly tying into that.

Is there code that does something completely different than its comments claim?

show 1 reply