Death by a thousand slops
daniel.haxx.se/blog/2025/07/14…
Death by a thousand slops
I have previously blogged about the relatively new trend of AI slop in vulnerability reports submitted to curl and how it hurts and exhausts us. This trend does not seem to slow down.daniel.haxx.se
Quentin Pradet
in reply to daniel:// stenberg:// • • •daniel:// stenberg://
in reply to Quentin Pradet • • •Quentin Pradet
in reply to daniel:// stenberg:// • • •Josh Bressers
in reply to daniel:// stenberg:// • • •@quentinpradet
Back when I ran a bug bounty program, the HackerOne folks would suggest new bug hunters find projects that offer no rewards as a way to build up their reputation, as a bunch of the very large bounties only let people in with a reputation greater than some number
I also have a suspicion many of the slop reports are coming from people who decided they could use an LLM to make some quick cash because it told them it was awesome at ... well, everything
Fubaroque
in reply to daniel:// stenberg:// • • •jens persson
in reply to daniel:// stenberg:// • • •Not fully formed thought from the sideline. Perhaps it is possible to incur some kind of cost that is not monetary on the submitter, "You must have a reputation over X on Hackerone" or "You have to have something accepted into a 'well known' project".
Not sure how to implement and it would probably involve some change from Hackerone also.
Or start reviewing the submissions with AI 😉
n-gons
in reply to daniel:// stenberg:// • • •daniel:// stenberg://
in reply to daniel:// stenberg:// • • •Death by a Thousand Slops | Hacker News
news.ycombinator.comRicardo Nabinger Sanchez
in reply to daniel:// stenberg:// • • •Bart Louwers
in reply to daniel:// stenberg:// • • •Have you considered reviewing the security reports with AI? At least as a first pass? I suspect ironically AI is pretty good at detecting AI slop.
chatgpt.com/share/6874f471-7cf…
ChatGPT - New chat
ChatGPTKim Spence-Jones 🇬🇧😷
in reply to daniel:// stenberg:// • • •If the prospect of a reward is driving the report submissions, that should slow down the slop. If something else is going on, that will become clear.
Jason 🍸🫧
in reply to daniel:// stenberg:// • • •David Keck
in reply to daniel:// stenberg:// • • •Janik
in reply to daniel:// stenberg:// • • •Major Denis Bloodnok
in reply to daniel:// stenberg:// • • •Karsten Johansson
in reply to daniel:// stenberg:// • • •I haven't seen the process, but do you require proof of vulnerability? I would ignore anything that doesn't come with proof. It's not like a vuln researcher wouldn't have proof on hand, just by the process of finding vulnerabilities in the first place.
Then you can focus on the proofs, and flat out deny any claims that come with insufficient pre-packaged proof.
ghosttie
in reply to daniel:// stenberg:// • • •