home.social

#curl — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #curl, aggregated by home.social.

  1. @das_robin @bagder
    Yes, #Firefox is probably a few orders of magnitude more complex than #curl and definitely much bigger.

    Still, the blog post explicitly mentions "In addition to fixing the 271 bugs identified by Claude Mythos Preview in the 150 release, we’ve shipped more of these fixes in 149.0.2, 150.0.1, and 150.0.2.", so >270 attributed to #Mythos *alone*.

  2. @das_robin @bagder
    Yes, #Firefox is probably a few orders of magnitude more complex than #curl and definitely much bigger.

    Still, the blog post explicitly mentions "In addition to fixing the 271 bugs identified by Claude Mythos Preview in the 150 release, we’ve shipped more of these fixes in 149.0.2, 150.0.1, and 150.0.2.", so >270 attributed to #Mythos *alone*.

  3. @das_robin @bagder
    Yes, #Firefox is probably a few orders of magnitude more complex than #curl and definitely much bigger.

    Still, the blog post explicitly mentions "In addition to fixing the 271 bugs identified by Claude Mythos Preview in the 150 release, we’ve shipped more of these fixes in 149.0.2, 150.0.1, and 150.0.2.", so >270 attributed to #Mythos *alone*.

  4. @das_robin @bagder
    Yes, #Firefox is probably a few orders of magnitude more complex than #curl and definitely much bigger.

    Still, the blog post explicitly mentions "In addition to fixing the 271 bugs identified by Claude Mythos Preview in the 150 release, we’ve shipped more of these fixes in 149.0.2, 150.0.1, and 150.0.2.", so >270 attributed to #Mythos *alone*.

  5. #Mythos finds a curl vulnerability
    daniel.haxx.se/blog/2026/05/11

    “AI powered code #analyzers are significantly better at finding security flaws and mistakes in #source code than any traditional code analyzers did in the past. All modern AI models are good at this now. Anyone with time and some experimental spirits can find #security problems now.”

    “We have not seen any AI so far report a #vulnerability that would somehow be of a novel kind or something totally new.”

    #AI #curl #code #flaws

  6. So yes, there is at least one more pending #curl CVE involving trailing dots.

  7. So yes, there is at least one more pending #curl CVE involving trailing dots.

  8. So yes, there is at least one more pending #curl CVE involving trailing dots.

  9. So yes, there is at least one more pending #curl CVE involving trailing dots.

  10. So yes, there is at least one more pending #curl CVE involving trailing dots.

  11. "An interactive terminal game for learning #curl and HTTP APIs through hands-on quests"

    github.com/lite-quests/curl-qu

  12. "An interactive terminal game for learning #curl and HTTP APIs through hands-on quests"

    github.com/lite-quests/curl-qu

  13. "An interactive terminal game for learning #curl and HTTP APIs through hands-on quests"

    github.com/lite-quests/curl-qu

  14. "An interactive terminal game for learning #curl and HTTP APIs through hands-on quests"

    github.com/lite-quests/curl-qu

  15. "An interactive terminal game for learning #curl and HTTP APIs through hands-on quests"

    github.com/lite-quests/curl-qu

  16. Attention is fun and good. And sometimes painful. The #curl vulnerability counter keeps getting bumped... No rest for the security team.

    (Yes: even after Mythos scanned the code people find issues...)

  17. Attention is fun and good. And sometimes painful. The #curl vulnerability counter keeps getting bumped... No rest for the security team.

    (Yes: even after Mythos scanned the code people find issues...)

  18. Attention is fun and good. And sometimes painful. The #curl vulnerability counter keeps getting bumped... No rest for the security team.

    (Yes: even after Mythos scanned the code people find issues...)

  19. Attention is fun and good. And sometimes painful. The #curl vulnerability counter keeps getting bumped... No rest for the security team.

    (Yes: even after Mythos scanned the code people find issues...)

  20. Attention is fun and good. And sometimes painful. The #curl vulnerability counter keeps getting bumped... No rest for the security team.

    (Yes: even after Mythos scanned the code people find issues...)

  21. @bagder I am looking over #curl for a month now. And i realized one has to have good knowledge of operating systems, sockets, networking, protocols ...etc along with C.
    For sure, someday i will make it, but i have a long way to go. Till then i am following you guys and joined the mailing list.

  22. @bagder I am looking over #curl for a month now. And i realized one has to have good knowledge of operating systems, sockets, networking, protocols ...etc along with C.
    For sure, someday i will make it, but i have a long way to go. Till then i am following you guys and joined the mailing list.

  23. @bagder I am looking over #curl for a month now. And i realized one has to have good knowledge of operating systems, sockets, networking, protocols ...etc along with C.
    For sure, someday i will make it, but i have a long way to go. Till then i am following you guys and joined the mailing list.

  24. @bagder I am looking over #curl for a month now. And i realized one has to have good knowledge of operating systems, sockets, networking, protocols ...etc along with C.
    For sure, someday i will make it, but i have a long way to go. Till then i am following you guys and joined the mailing list.

  25. @bagder I am looking over #curl for a month now. And i realized one has to have good knowledge of operating systems, sockets, networking, protocols ...etc along with C.
    For sure, someday i will make it, but i have a long way to go. Till then i am following you guys and joined the mailing list.

  26. #curl allows globs used in a single URL to create up to 2^63 permutations - which, if you can do one million transfers per second, would take 292 thousand years to complete.

  27. #curl allows globs used in a single URL to create up to 2^63 permutations - which, if you can do one million transfers per second, would take 292 thousand years to complete.

  28. #curl allows globs used in a single URL to create up to 2^63 permutations - which, if you can do one million transfers per second, would take 292 thousand years to complete.

  29. #curl allows globs used in a single URL to create up to 2^63 permutations - which, if you can do one million transfers per second, would take 292 thousand years to complete.

  30. #curl allows globs used in a single URL to create up to 2^63 permutations - which, if you can do one million transfers per second, would take 292 thousand years to complete.

  31. CW: As an administrator of several Matrix servers, every now and then I have to decommission one. You can't just power the server down, throw it away and be done with it, so let me show you how it's done.
    As an administrator of several Matrix servers, every now and then I have to decommission one.

    You can't just power the server down, throw it away and be done with it (really, you can't!). You'll have to remove all users first, and give those removals some time to propagate over the Matrix universe. After that, you can power the server down and junk it.

    A handful of users can be removed manually with, for example, Synapse-Admin. But today I have a server with several thousands of users... I've had problems with Carpal Tunnel Syndrome before, so there's no way I'm going to spend several hours moving my mouse the same directions over and over again for hours.

    Prepare

    I use the Matrix API and curl (thanks for that, @daniel:// stenberg://) to do this the easy way. Well, some of you may scratch your heads when I call this the easy way... 😏

    All the commands I show here, are run on the Matrix server itself. You can run them anywhere, but then you'll have to replace "localhost" for the URL of your server, of course.

    First of all, you'll need an access token for an account with admin rights. If you happen to have a session open, you can simply copy it from there. If you don't, here's how to get one.

    curl -s -X POST http://localhost:8008/_matrix/client/r0/login \
    -H "Content-Type: application/json" \
    -d '{ \
    "type": "m.login.password", \
    "user": "@administrator:EXAMPLE.COM" , \
    "password": "SECRET ADMIN PASSWORD" \
    }' | \
    jq '.access_token'


    This will give you a string like "syt_YWRtaW5pc3RyYXRvcg_dQCZlHWPsGluyHLYyhnH_2aI2ln", provided you used the right username, password and URL. I'll use "xxxx" for better visibility.

    Check the number of users

    Let's verify our access by checking how many users we're talking about.

    curl -s -X GET http://localhost:8008/_synapse/admin/v2/users?limit=1000000&deactivated=true \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    wc -l


    The limit of 1 million is sort of necessary: you can't say "every user", but if you don't provide a limit, you'll only get the first 100.

    Now that you know how many users there are in your database, let's remove them all.

    Remove all users

    You may be thinking, "if I remove all users, I also remove my admin account, which could complicate things". Good thinking, I ran into that exact problem, because I did my previous user removals with Synapse-Admin (you know, selecting a handful users, clicking "remove", waiting... rince and repeat) and that wouldn't remove my admin account.

    But when you use the API directly, you abandon the guard rails and you can actually hurt yourself. I was lucky enough to find that there was still one other admin account after I had removed mine, so I hijacked that one to finished the job. If yours is (was!) the only active admin account, you have a problem...

    With this code we list all users MINUS OUR ADMIN ACCOUNT and pass them to the next command, that actually deletes them:
    curl -s -X GET http://localhost:8008/_synapse/admin/v2/limit=1000000 \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    sed '/@administrator:EXAMPLE.COM/d' | \
    xargs -I % \
    curl -s -X POST -H "Authorization: Bearer xxxx" \
    -H "Content-Type: application/json" \
    -d '{ "erase": true }' \
    http://localhost:8008/_synapse/admin/v1/deactivate/% | \
    tee removal.log | \
    wc -l


    This will take a looong time, and that's why I have the command write its output to "removal.log", so you can check what's happening.

    Every successful removal prints this result:
    {"id_server_unbind_result":"success"}
    So once no new entries like that are being added to the log file, you're done and should be left with only your admin account(s).

    Give it a few days for the rest of the Matrix universe to pick these removals up, say a week, and then you can junk your server.

    #Matrix #curl #API
  32. CW: As an administrator of several Matrix servers, every now and then I have to decommission one. You can't just power the server down, throw it away and be done with it, so let me show you how it's done.
    As an administrator of several Matrix servers, every now and then I have to decommission one.

    You can't just power the server down, throw it away and be done with it (really, you can't!). You'll have to remove all users first, and give those removals some time to propagate over the Matrix universe. After that, you can power the server down and junk it.

    A handful of users can be removed manually with, for example, Synapse-Admin. But today I have a server with several thousands of users... I've had problems with Carpal Tunnel Syndrome before, so there's no way I'm going to spend several hours moving my mouse the same directions over and over again for hours.

    Prepare

    I use the Matrix API and curl (thanks for that, @daniel:// stenberg://) to do this the easy way. Well, some of you may scratch your heads when I call this the easy way... 😏

    All the commands I show here, are run on the Matrix server itself. You can run them anywhere, but then you'll have to replace "localhost" for the URL of your server, of course.

    First of all, you'll need an access token for an account with admin rights. If you happen to have a session open, you can simply copy it from there. If you don't, here's how to get one.

    curl -s -X POST http://localhost:8008/_matrix/client/r0/login \
    -H "Content-Type: application/json" \
    -d '{ \
    "type": "m.login.password", \
    "user": "@administrator:EXAMPLE.COM" , \
    "password": "SECRET ADMIN PASSWORD" \
    }' | \
    jq '.access_token'


    This will give you a string like "syt_YWRtaW5pc3RyYXRvcg_dQCZlHWPsGluyHLYyhnH_2aI2ln", provided you used the right username, password and URL. I'll use "xxxx" for better visibility.

    Check the number of users

    Let's verify our access by checking how many users we're talking about.

    curl -s -X GET http://localhost:8008/_synapse/admin/v2/users?limit=1000000&deactivated=true \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    wc -l


    The limit of 1 million is sort of necessary: you can't say "every user", but if you don't provide a limit, you'll only get the first 100.

    Now that you know how many users there are in your database, let's remove them all.

    Remove all users

    You may be thinking, "if I remove all users, I also remove my admin account, which could complicate things". Good thinking, I ran into that exact problem, because I did my previous user removals with Synapse-Admin (you know, selecting a handful users, clicking "remove", waiting... rince and repeat) and that wouldn't remove my admin account.

    But when you use the API directly, you abandon the guard rails and you can actually hurt yourself. I was lucky enough to find that there was still one other admin account after I had removed mine, so I hijacked that one to finished the job. If yours is (was!) the only active admin account, you have a problem...

    With this code we list all users MINUS OUR ADMIN ACCOUNT and pass them to the next command, that actually deletes them:
    curl -s -X GET http://localhost:8008/_synapse/admin/v2/limit=1000000 \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    sed '/@administrator:EXAMPLE.COM/d' | \
    xargs -I % \
    curl -s -X POST -H "Authorization: Bearer xxxx" \
    -H "Content-Type: application/json" \
    -d '{ "erase": true }' \
    http://localhost:8008/_synapse/admin/v1/deactivate/% | \
    tee removal.log | \
    wc -l


    This will take a looong time, and that's why I have the command write its output to "removal.log", so you can check what's happening.

    Every successful removal prints this result:
    {"id_server_unbind_result":"success"}
    So once no new entries like that are being added to the log file, you're done and should be left with only your admin account(s).

    Give it a few days for the rest of the Matrix universe to pick these removals up, say a week, and then you can junk your server.

    #Matrix #curl #API
  33. CW: As an administrator of several Matrix servers, every now and then I have to decommission one. You can't just power the server down, throw it away and be done with it, so let me show you how it's done.
    As an administrator of several Matrix servers, every now and then I have to decommission one.

    You can't just power the server down, throw it away and be done with it (really, you can't!). You'll have to remove all users first, and give those removals some time to propagate over the Matrix universe. After that, you can power the server down and junk it.

    A handful of users can be removed manually with, for example, Synapse-Admin. But today I have a server with several thousands of users... I've had problems with Carpal Tunnel Syndrome before, so there's no way I'm going to spend several hours moving my mouse the same directions over and over again for hours.

    Prepare

    I use the Matrix API and curl (thanks for that, @daniel:// stenberg://) to do this the easy way. Well, some of you may scratch your heads when I call this the easy way... 😏

    All the commands I show here, are run on the Matrix server itself. You can run them anywhere, but then you'll have to replace "localhost" for the URL of your server, of course.

    First of all, you'll need an access token for an account with admin rights. If you happen to have a session open, you can simply copy it from there. If you don't, here's how to get one.

    curl -s -X POST http://localhost:8008/_matrix/client/r0/login \
    -H "Content-Type: application/json" \
    -d '{ \
    "type": "m.login.password", \
    "user": "@administrator:EXAMPLE.COM" , \
    "password": "SECRET ADMIN PASSWORD" \
    }' | \
    jq '.access_token'


    This will give you a string like "syt_YWRtaW5pc3RyYXRvcg_dQCZlHWPsGluyHLYyhnH_2aI2ln", provided you used the right username, password and URL. I'll use "xxxx" for better visibility.

    Check the number of users

    Let's verify our access by checking how many users we're talking about.

    curl -s -X GET http://localhost:8008/_synapse/admin/v2/users?limit=1000000&deactivated=true \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    wc -l


    The limit of 1 million is sort of necessary: you can't say "every user", but if you don't provide a limit, you'll only get the first 100.

    Now that you know how many users there are in your database, let's remove them all.

    Remove all users

    You may be thinking, "if I remove all users, I also remove my admin account, which could complicate things". Good thinking, I ran into that exact problem, because I did my previous user removals with Synapse-Admin (you know, selecting a handful users, clicking "remove", waiting... rince and repeat) and that wouldn't remove my admin account.

    But when you use the API directly, you abandon the guard rails and you can actually hurt yourself. I was lucky enough to find that there was still one other admin account after I had removed mine, so I hijacked that one to finished the job. If yours is (was!) the only active admin account, you have a problem...

    With this code we list all users MINUS OUR ADMIN ACCOUNT and pass them to the next command, that actually deletes them:
    curl -s -X GET http://localhost:8008/_synapse/admin/v2/limit=1000000 \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    sed '/@administrator:EXAMPLE.COM/d' | \
    xargs -I % \
    curl -s -X POST -H "Authorization: Bearer xxxx" \
    -H "Content-Type: application/json" \
    -d '{ "erase": true }' \
    http://localhost:8008/_synapse/admin/v1/deactivate/% | \
    tee removal.log | \
    wc -l


    This will take a looong time, and that's why I have the command write its output to "removal.log", so you can check what's happening.

    Every successful removal prints this result:
    {"id_server_unbind_result":"success"}
    So once no new entries like that are being added to the log file, you're done and should be left with only your admin account(s).

    Give it a few days for the rest of the Matrix universe to pick these removals up, say a week, and then you can junk your server.

    #Matrix #curl #API
  34. CW: As an administrator of several Matrix servers, every now and then I have to decommission one. You can't just power the server down, throw it away and be done with it, so let me show you how it's done.
    As an administrator of several Matrix servers, every now and then I have to decommission one.

    You can't just power the server down, throw it away and be done with it (really, you can't!). You'll have to remove all users first, and give those removals some time to propagate over the Matrix universe. After that, you can power the server down and junk it.

    A handful of users can be removed manually with, for example, Synapse-Admin. But today I have a server with several thousands of users... I've had problems with Carpal Tunnel Syndrome before, so there's no way I'm going to spend several hours moving my mouse the same directions over and over again for hours.

    Prepare

    I use the Matrix API and curl (thanks for that, @daniel:// stenberg://) to do this the easy way. Well, some of you may scratch your heads when I call this the easy way... 😏

    All the commands I show here, are run on the Matrix server itself. You can run them anywhere, but then you'll have to replace "localhost" for the URL of your server, of course.

    First of all, you'll need an access token for an account with admin rights. If you happen to have a session open, you can simply copy it from there. If you don't, here's how to get one.

    curl -s -X POST http://localhost:8008/_matrix/client/r0/login \
    -H "Content-Type: application/json" \
    -d '{ \
    "type": "m.login.password", \
    "user": "@administrator:EXAMPLE.COM" , \
    "password": "SECRET ADMIN PASSWORD" \
    }' | \
    jq '.access_token'


    This will give you a string like "syt_YWRtaW5pc3RyYXRvcg_dQCZlHWPsGluyHLYyhnH_2aI2ln", provided you used the right username, password and URL. I'll use "xxxx" for better visibility.

    Check the number of users

    Let's verify our access by checking how many users we're talking about.

    curl -s -X GET http://localhost:8008/_synapse/admin/v2/users?limit=1000000&deactivated=true \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    wc -l


    The limit of 1 million is sort of necessary: you can't say "every user", but if you don't provide a limit, you'll only get the first 100.

    Now that you know how many users there are in your database, let's remove them all.

    Remove all users

    You may be thinking, "if I remove all users, I also remove my admin account, which could complicate things". Good thinking, I ran into that exact problem, because I did my previous user removals with Synapse-Admin (you know, selecting a handful users, clicking "remove", waiting... rince and repeat) and that wouldn't remove my admin account.

    But when you use the API directly, you abandon the guard rails and you can actually hurt yourself. I was lucky enough to find that there was still one other admin account after I had removed mine, so I hijacked that one to finished the job. If yours is (was!) the only active admin account, you have a problem...

    With this code we list all users MINUS OUR ADMIN ACCOUNT and pass them to the next command, that actually deletes them:
    curl -s -X GET http://localhost:8008/_synapse/admin/v2/limit=1000000 \
    -H "Authorization: Bearer xxxx" | \
    jq '.users[] | .name' | \
    sed '/@administrator:EXAMPLE.COM/d' | \
    xargs -I % \
    curl -s -X POST -H "Authorization: Bearer xxxx" \
    -H "Content-Type: application/json" \
    -d '{ "erase": true }' \
    http://localhost:8008/_synapse/admin/v1/deactivate/% | \
    tee removal.log | \
    wc -l


    This will take a looong time, and that's why I have the command write its output to "removal.log", so you can check what's happening.

    Every successful removal prints this result:
    {"id_server_unbind_result":"success"}
    So once no new entries like that are being added to the log file, you're done and should be left with only your admin account(s).

    Give it a few days for the rest of the Matrix universe to pick these removals up, say a week, and then you can junk your server.

    #Matrix #curl #API
  35. CW: As an administrator of several Matrix servers, every now and then I have to decommission one. You can't just power the server down, throw it away and be done with it, so let me show you how it's done.
    As an administrator of several Matrix servers, every now and then I have to decommission one.

    You can't just power the server down, throw it away and be done with it (really, you can't!). You'll have to remove all users first, and give those removals some time to propagate over the Matrix universe. After that, you can power the server down and junk it.

    A handful of users can be removed manually with, for example, Synapse-Admin. But today I have a server with several thousands of users... I've had problems with Carpal Tunnel Syndrome before, so there's no way I'm going to spend several hours moving my mouse the same directions over and over again for hours.

    Prepare

    I use the Matrix API and curl (thanks for that, @daniel:// stenberg://) to do this the easy way. Well, some of you may scratch your heads when I call this the easy way... 😏

    All the commands I show here, are run on the Matrix server itself. You can run them anywhere, but then you'll have to replace "localhost" for the URL of your server, of course.

    First of all, you'll need an access token for an account with admin rights. If you happen to have a session open, you can simply copy it from there. If you don't, here's how to get one.

    curl -s -X POST http://localhost:8008/_matrix/client/r0/login \
    -H "Content-Type: application/json" \
    -d '{ \
    "type": "m.login.password", \
    "user": "@administrator:EXAMPLE.COM" , \
    "password": "SECRET ADMIN PASSWORD" \
    }' \
    | jq '.access_token'


    This will give you a string like "syt_YWRtaW5pc3RyYXRvcg_dQCZlHWPsGluyHLYyhnH_2aI2ln", provided you used the right username, password and URL. I'll use "xxxx" for better visibility.

    Check the number of users

    Let's verify our access by checking how many users we're talking about.

    curl -s -X GET http://localhost:8008/_synapse/admin/v2/users?limit=1000000&deactivated=true \
    -H "Authorization: Bearer xxxx" \
    | jq '.users[] | .name' \
    | wc -l


    The limit of 1 million is sort of necessary: you can't say "every user", but if you don't provide a limit, you'll only get the first 100.

    Now that you know how many users there are in your database, let's remove them all.

    Remove all users

    You may be thinking, "if I remove all users, I also remove my admin account, which could complicate things". Good thinking, but no: Matrix won't remove your admin account. This means you'll have to manually leave all rooms you've joined with that account. The same goes for all other admin accounts. THIS IS IMPORTANT!

    We'll now remove all users, by first listing them all and passing the output of that command to the next, which does the actual removing.

    curl -s -X GET http://localhost:8008/_synapse/admin/v2/limit=1000000 \
    -H "Authorization: Bearer xxxx" \
    | jq '.users[] | .name' \
    | xargs -I % \
    curl -s -X POST -H "Authorization: Bearer xxxx" \
    -H "Content-Type: application/json" \
    -d '{ "erase": true }' \
    http://localhost:8008/_synapse/admin/v1/deactivate/% \
    | tee removal.log \
    | wc -l


    This will take a looong time, and that's why I have the command write its output to "removal.log", so you can check what's happening.

    Every successful removal prints this result:
    {"id_server_unbind_result":"success"}
    So once no new entries like that are being added to the log file, you're done and should be left with only your admin account(s).

    Give it a few days for the rest of the Matrix universe to pick these removals up, say a week, and then you can junk your server.

    #Matrix #curl #API
  36. Mythos contro curl: quando l’AI “troppo pericolosa” incontra la realtà del codice

    Per settimane il nome “Mythos” è stato costruito come un oggetto quasi mitologico. Anthropic lo ha presentato come un modello AI capace di trovare vulnerabilità zero-day a un livello tale da risultare “troppo pericoloso” per una release pubblica. Una narrativa perfetta per il ciclo mediatico dell’AI security nel 2026: modello segreto, capacità offensive avanzate, accesso ristretto, migliaia di vulnerabilità individuate. Il genere di storytelling che nel mondo cyber si propaga in […]

    insicurezzadigitale.com/mythos

  37. Mythos contro curl: quando l’AI “troppo pericolosa” incontra la realtà del codice

    Per settimane il nome “Mythos” è stato costruito come un oggetto quasi mitologico. Anthropic lo ha presentato come un modello AI capace di trovare vulnerabilità zero-day a un livello tale da risultare “troppo pericoloso” per una release pubblica. Una narrativa perfetta per il ciclo mediatico dell’AI security nel 2026: modello segreto, capacità offensive avanzate, accesso ristretto, migliaia di vulnerabilità individuate. Il genere di storytelling che nel mondo cyber si propaga in […]

    insicurezzadigitale.com/mythos

  38. Mythos contro curl: quando l’AI “troppo pericolosa” incontra la realtà del codice

    Per settimane il nome “Mythos” è stato costruito come un oggetto quasi mitologico. Anthropic lo ha presentato come un modello AI capace di trovare vulnerabilità zero-day a un livello tale da risultare “troppo pericoloso” per una release pubblica. Una narrativa perfetta per il ciclo mediatico dell’AI security nel 2026: modello segreto, capacità offensive avanzate, accesso ristretto, migliaia di vulnerabilità individuate. Il genere di storytelling che nel mondo cyber si propaga in […]

    insicurezzadigitale.com/mythos

  39. Mythos contro curl: quando l’AI “troppo pericolosa” incontra la realtà del codice

    Per settimane il nome “Mythos” è stato costruito come un oggetto quasi mitologico. Anthropic lo ha presentato come un modello AI capace di trovare vulnerabilità zero-day a un livello tale da risultare “troppo pericoloso” per una release pubblica. Una narrativa perfetta per il ciclo mediatico dell’AI security nel 2026: modello segreto, capacità offensive avanzate, accesso ristretto, migliaia di vulnerabilità individuate. Il genere di storytelling che nel mondo cyber si propaga in […]

    insicurezzadigitale.com/mythos

  40. Mythos contro curl: quando l’AI “troppo pericolosa” incontra la realtà del codice

    Per settimane il nome “Mythos” è stato costruito come un oggetto quasi mitologico. Anthropic lo ha presentato come un modello AI capace di trovare vulnerabilità zero-day a un livello tale da risultare “troppo pericoloso” per una release pubblica. Una narrativa perfetta per il ciclo mediatico dell’AI security nel 2026: modello segreto, capacità offensive avanzate, accesso ristretto, migliaia di vulnerabilità individuate. Il genere di storytelling che nel mondo cyber si propaga in […]

    insicurezzadigitale.com/mythos