<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Mythos finds a curl vulnerability]]></title><description><![CDATA[<blockquote>
<p dir="auto">Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead trickle it out to a selected few companies for a while to allow a few good ones(?) to get a head start and fix the most pressing problems first, before the general populace would get their hands on it…</p>
</blockquote>
<ul>
<li><a href="https://daniel.haxx.se/blog/2026/05/11/mythos-finds-a-curl-vulnerability/" rel="nofollow ugc">https://daniel.haxx.se/blog/2026/05/11/mythos-finds-a-curl-vulnerability/</a></li>
</ul>
<hr />
<p dir="auto"><em>ping: <a href="https://framapiaf.org/@bagder@mastodon.social/116554421974341351" rel="nofollow ugc">https://framapiaf.org/@bagder@mastodon.social/116554421974341351</a></em></p>
]]></description><link>https://billboard.bsd.cafe/topic/160/mythos-finds-a-curl-vulnerability</link><generator>RSS for Node</generator><lastBuildDate>Sun, 17 May 2026 21:45:35 GMT</lastBuildDate><atom:link href="https://billboard.bsd.cafe/topic/160.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 11 May 2026 11:18:20 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Mythos finds a curl vulnerability on Fri, 15 May 2026 18:13:42 GMT]]></title><description><![CDATA[<p dir="auto">Linked from the commentary, the <code>gov.uk</code> domain:</p>
<ul>
<li><a href="https://www.aisi.gov.uk/blog/our-evaluation-of-openais-gpt-5-5-cyber-capabilities" rel="nofollow ugc">Our evaluation of OpenAI's GPT-5.5 cyber capabilities | AISI Work</a></li>
</ul>
]]></description><link>https://billboard.bsd.cafe/post/465</link><guid isPermaLink="true">https://billboard.bsd.cafe/post/465</guid><dc:creator><![CDATA[grahamperrin]]></dc:creator><pubDate>Fri, 15 May 2026 18:13:42 GMT</pubDate></item><item><title><![CDATA[Reply to Mythos finds a curl vulnerability on Tue, 12 May 2026 17:55:34 GMT]]></title><description><![CDATA[<p dir="auto">Thanks! Also:</p>
<ul>
<li><a href="https://lobste.rs/s/am7evd/mythos_finds_curl_vulnerability" rel="nofollow ugc">Mythos finds a curl vulnerability | Lobsters</a></li>
<li><a href="https://news.ycombinator.com/item?id=48091737" rel="nofollow ugc">Mythos Finds a Curl Vulnerability | Hacker News</a></li>
<li><a href="https://www.reddit.com/r/BetterOffline/comments/1tah4lx/mythos_finds_a_vulnerability_in_curl_a_single_low/" rel="nofollow ugc">Mythos finds a vulnerability in curl, a single low severity one, and curl's creator is not impressed, calls it "a succesful marketing stunt". : r/BetterOffline</a> and (old Reddit) <a href="https://old.reddit.com/r/BetterOffline/duplicates/1tah4lx/mythos_finds_a_vulnerability_in_curl_a_single_low/" rel="nofollow ugc">nine other discussions …</a></li>
</ul>
]]></description><link>https://billboard.bsd.cafe/post/442</link><guid isPermaLink="true">https://billboard.bsd.cafe/post/442</guid><dc:creator><![CDATA[grahamperrin]]></dc:creator><pubDate>Tue, 12 May 2026 17:55:34 GMT</pubDate></item><item><title><![CDATA[Reply to Mythos finds a curl vulnerability on Mon, 11 May 2026 18:31:56 GMT]]></title><description><![CDATA[<p dir="auto">What is the relationship between vmm and curl?</p>
]]></description><link>https://billboard.bsd.cafe/post/424</link><guid isPermaLink="true">https://billboard.bsd.cafe/post/424</guid><dc:creator><![CDATA[CiotBSD]]></dc:creator><pubDate>Mon, 11 May 2026 18:31:56 GMT</pubDate></item><item><title><![CDATA[Reply to Mythos finds a curl vulnerability on Mon, 11 May 2026 18:27:43 GMT]]></title><description><![CDATA[<p dir="auto">I love <code>bhyve</code> but OpenBSD's security defaults (as well as its cohesiveness) are what pulled me to hosting on OpenBSD. <code>vmm(4)</code> is not a bad hypervisor, hopefully more work goes into it.</p>
]]></description><link>https://billboard.bsd.cafe/post/423</link><guid isPermaLink="true">https://billboard.bsd.cafe/post/423</guid><dc:creator><![CDATA[naltun]]></dc:creator><pubDate>Mon, 11 May 2026 18:27:43 GMT</pubDate></item></channel></rss>