News

Calif
blog. calif. io > p > mad-bugs-finding-and-exploiting-a

MAD Bugs: Finding and Exploiting a 21-Year-Old Vulnerability in PHP

13+ hour, 5+ min ago  (1740+ words) This post is part of MAD Bugs, our Month of AI-Discovered Bugs, where we pair frontier models with human expertise and publish whatever falls out. Before we dive in, one piece of news. Stefan Esser is joining Calif. Stefan was…...

Calif
blog. calif. io > p > mad-bugs-all-your-reverse-engineering

MAD Bugs: All Your Reverse Engineering Tools Are Belong to US

1+ week, 3+ day ago  (478+ words) Two weeks ago we told you about how we used AI to find a radare2 0-day, and the day after that, an auth bypass in NSA's Ghidra Server that has been hiding in plain sight since 2019. Some of you were, understandably,…...

Calif
blog. calif. io > p > mad-bugs-feeding-claude-phrack-articles

MAD Bugs: Feeding Claude Phrack Articles for Fun and Profit

3+ week, 1+ day ago  (853+ words) He shared exploit. py with me. Two problems: It imported rsync_lib, which wasn't in the repo. He just forgotto share it. Claude had generated this custom protocol library tohandle all the heavy lifting: daemon handshake, multiplexed I/O, file list parsing,…...

Calif
blog. calif. io > p > mad-bugs-vim-vs-emacs-vs-claude

MAD Bugs: vim vs emacs vs Claude

1+ mon, 2+ day ago  (275+ words) It started like this: Vim maintainers fixed the issue immediately. Everybody is encouraged to upgrade to Vim v9. 2. 0272. Full advisory can be found here. The original prompt was simple: Somebody told me there is an RCE 0-day when you open a…...