Search

Items tagged with: Curl


Even as #curl is soon 10000 days, here's a list of changes and features that we have queued up for the coming next release. And these are just things we think have a chance of getting merged. (But not all of them will manage, most likely.)
#curl


the accumulated work done with the help from more than 3460 individuals. 10474 days since that fine November day in 1996 when httpget first saw light.

9980 days since the first release we called #curl

#curl


Seven day embargo limit for #curl: git.hardenedbsd.org/shawn.webb…

It can take the #HardenedBSD project a full month to rebuild its package repos. And since we've built this software monoculture against libcurl, this will be FUN!

#infosec #libcurl



The #curl security ream consists of seven team members. I encourage the others to also chime in to back me up (so that we do right). Every report thus engages 3-4 persons. Perhaps for 30 minutes, sometimes up to an hour or three. Each.

I personally spend an insane amount of time on curl already, wasting three hours still leaves a lot of time for other things. My fellows are not full time on curl. They might only have three hours per week for curl.

Times eight the last week.

#curl


#curl security report number **eight** within the last seven days was just received. And as 8 out of 8 it will be closed as not applicable.

This is roughly 4x our normal average frequency. No clue as to why this peaks now.

We clearly need to raise the bar somehow to stop sand from getting into the machine.

#curl


I trust you all take the opportunity to enjoy the fun curl's --libcurl option brings after that security report debacle.

1. run any #curl command line
2. add "--libcurl template.c" to the command line and run it again
3. there, a fine source code embryo to start your libcurl using app from

#curl


How I do it.

Some words on how I work on #curl and lead the #curl project. Every day of the week. Year in, year out. It never ends.

daniel.haxx.se/blog/2025/07/13…

#curl


#curl


#curl


#curl #cra


We have 6 open issues now in curl, 3 of them are handled but waiting for the feature window to open again.

Optimistic that the release next week will fix this!
#curl

#curl


#curl


Started a curl discussion about adding an API call to retrieve information from a curl multi handle.

If you develop a libcurl application and you need information from a multi, please make your case.
#curl
github.com/curl/curl/discussio…

#curl


#curl



we keep ftp support in #curl for readline 😁
#curl


#curl


“#curl up AI: Quit It”
#curl


Abstract:

In these days of "vibe coding" and chatbots, users ask AIs for help with everything. Asked to find security problems in Open Source projects, AI bots tell users something that sounds right. Reporting these "findings" wastes everyone's time and causes much frustration and fatigue. Daniel shows how this looks, how it DDoS projects and how totally beyond crazy stupid this is. With examples and insights from the #curl project.

----

Good enough maybe?

#curl


I'm doing a keynote next month at an Open Source conference about AI (abuse) in #curl's security program etc. I could use your help:

1. Give me a clever title
2. What details would you like such a talk to contain?

#curl


I think this is slightly better. Shows better how many really old #curl vulnerabilities we have had reported. Age of the flaw in number of the years on the y-axis, proper date of the report on the x-axis.
#curl


I've polished the graph that shows #curl vulnerability age when they were fixed. With median and average ages added.
#curl


So far in 2025, we have received 52 vulnerability reports submitted to #curl. Two per week on average.

5 have been confirmed security problems (and have been published)

11 were tagged AI slop; all banned and reported to HackerOne

15 were considered "normal bugs"

21 were deemed "not applicable" (various reasons)

#curl


#curl


1.Download curl.se using #curl built to use OpenSSL (that is over HTTPS in case Mastodon hides the scheme for you)
2. count number of allocations made with heaptrack
3. pause for gasping
4. double-check that curl only does 134 allocs itself, independently of the downloaded size
5. check the heaptrack number again

54,000

hm

#curl


I posted "writing C for #curl" just a short while ago, which is relevant to the recent "C mistake" graphs.

daniel.haxx.se/blog/2025/04/07…

#curl


You can follow along with the stream of security reports submitted to #curl by watching the ones we make public:

hackerone.com/curl/hacktivity

Per project policy, we make ALL reports public. (For practical reasons we have so far focused on getting everything submitted during 2025 disclosed. Hackerone has no method to disclose in bulk or automated, so it is a highly manual and tedious process involving a lot of clicks per single report)

#curl


C mistakes among the vulnerabilities present in #curl code

(C mistakes are vulnerabilities that were caused by a mistake that "probably would not have been possible" had we not been using C for curl. Manually assessed for each case.)

#curl


Number of graphs in the #curl dashboard - as a graph.
#curl


I checked the latest stats. The median time a #curl CVE lingers in code before getting reported: 2163 days (almost 6 years). The average is 2893 days (almost 8 years)
#curl


does my late night habits make me commit #curl security problems at strange hours?

Not obviously.

The hour of the day with most #curl security problem commits is 14!

The top-5 bad commit hours of the day:

14:00 21 vulns
22:00 17
23:00 11
15:00 11
11:00 10

Hard to make fun graph out of...

#curl