Jean-Baptiste Maillet

Hardcore embedded C/C++ caveman.
Supply chain cybersecurity, SBOM , vulnerability management.
#embedded #linux #oss #psirt

he/him
embedded
linux
oss
psirt
Jean-Baptiste Mailletjbm@infosec.exchange
2026-03-03

@yossarian this is brilliant. 👍
I just (vibe) coded my first action last week, it comes at the perfect time!

Jean-Baptiste Maillet boosted:
yossarian (1.3.6.1.4.1.55738)yossarian@infosec.exchange
2026-03-03

this hackerbot-claw thing is a good reminder: attackers (and beg bounty spammers) are using zizmor for offensive research, so you should be using it for defense!

docs.zizmor.sh/

Jean-Baptiste Mailletjbm@infosec.exchange
2026-03-03

The ENISA is looking for (preferably European I guess) experts for an ad hoc working group on on Security Architecture Engineering and Vulnerability Management.

Regarding VM, it will be about "the maintenance of the EU Vulnerability Database, its cooperation with the Common Vulnerabilities and Exposures (CVE) Program, and potential other activities that contribute to serving its stakeholders and providing the expected value based on a delivery of matured services."

Closing date mid-April.
enisa.europa.eu/working-with-u
#europe #vulnerabilitymanagement #enisa #euvd

Jean-Baptiste Mailletjbm@infosec.exchange
2026-03-02

@floehopper did I miss something? I thought Claude was 3 years old?
en.wikipedia.org/wiki/Claude_(

Jean-Baptiste Maillet boosted:
2026-02-26
After talking with a bunch of different companies / groups, we've now bumped the length of a few of the longterm kernels we are supporting:
https://git.kernel.org/pub/scm/docs/kernel/website.git/commit/?id=d04587da86a3464881e0c97aabddd2c271105698

As always, the dates can be found at:https://www.kernel.org/category/releases.html
Jean-Baptiste Mailletjbm@infosec.exchange
2026-02-23

@andrewnez sometimes, that's all you have, without the luxury to refuse ¯\_(ツ)_/¯

CPE can also manage firmware, closed source, non-package managed soft, hardware (as in SoC, chipsets, GPU, architectures), and full devices or systems. Poorly, for sure, but they can.

Something that PURL people seem to ignore.

Jean-Baptiste Maillet boosted:
Andrew Nesbittandrewnez
2026-02-23

What happens when a large open source project dies?

nesbitt.io/2026/02/21/whale-fa

Jean-Baptiste Maillet boosted:
2026-02-16

Today in InfoSec Job Security News:

I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

github.com/search?q=author%3Ac

As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

Jean-Baptiste Maillet boosted:
Seth Hanford 🐡ckure@infosec.exchange
2026-02-16

RE: infosec.exchange/@boblord/1160

Corollary: Which software companies are CVE Numbering Authorities (CNAs) for their own products, but shouldn’t be? And why?

Boost to share trauma.

Jean-Baptiste Maillet boosted:
Jamie Gaskinsjamie@zomglol.wtf
2026-02-16

If you use AI-generated code, you currently cannot claim copyright on it in the US. If you fail to disclose/disclaim exactly which parts were not written by a human, you forfeit your copyright claim on *the entire codebase*.

This means copyright notices and even licenses folks are putting on their vibe-coded GitHub repos are unenforceable. The AI-generated code, and possibly the whole project, becomes public domain.

Source: congress.gov/crs_external_prod

Excerpt from the linked document. It reads "The AI Guidance states that authors may claim copyright protection only “for their own contributions” to such works, and they must identify and disclaim AI-generated parts of the works"Excert from the linked document:

Three copyright registration denials highlighted by the Copyright Office illustrate that, in general, the office will not find human authorship where an AI program generates works in response to user prompts:

1. Zarya of the Dawn: A February 2023 decision that AI-generated illustrations for a graphic novel were not copyrightable, although the human-authored text of the novel and overall selection and arrangement of the images and text in the novel could be copyrighted.

2. Théùtre D’opĂ©ra Spatial: A September 2023 decision that an artwork generated by AI and then modified by the applicant could not be copyrighted, since the applicant failed to identify and disclaim the AI-generated portions of the work as required by the AI Guidance.

3. SURYAST: A December 2023 decision that an artwork generated by an AI system combining a “base image” (an original photo taken by the applicant) and a “style image” the applicant selected (Vincent van Gogh’s The Starry Night) could not be copyrighted, since the AI system was “responsible for determining how to interpolate [i.e., combine] the base and style images.”
Jean-Baptiste Maillet boosted:
Thomas DepierreDi4na@hachyderm.io
2026-02-16

@andrewnez not only finite but also already the biggest constraint.

I think people do not realize how much of hobbyist maintainers (which is by far the majority both in term of code volume and maintainers volume) are already far too deep into the negative in term of resources.

Like none of my projects I want to work on has gotten a single commit from me in 2025. I did not have the time. And I know they are use to debug production somewhere, I need them myself, I want them to be better.

But I simply do not have the time.

The first reason in all study for projects to go unmaintained is that *the maintainer changed employer and does not have the time for it anymore*

Jean-Baptiste Maillet boosted:
Seth Larsonsethmlarson
2026-02-13

Deploying generative AI agents in this way is deeply irresponsible and results in real harms to open source maintainers.

sethmlarson.dev/automated-publ

Jean-Baptiste Maillet boosted:
Laura Manach :bongoCat:cmconseils
2026-02-12
The "Spider-Man Pointing at Spider-Man" meme. One is labeled "Not getting things done because I'm too overwhelmed," and the other is labeled "Being overwhelmed because I haven't gotten anything done."
Jean-Baptiste Maillet boosted:
Alexandre Dulaunoyadulau@infosec.exchange
2026-02-10

@jbm The backlash against Linux kernel advisories is confusing. We wanted transparency; now we have it. More data is always better than a black box. If the new influx of CVEs is breaking your vulnerability management workflow, the problem might be your process, not the advisories.

Thanks for the hard work @gregkh

@bagder

Jean-Baptiste Mailletjbm@infosec.exchange
2026-02-10

@adulau @gregkh @bagder "If the new influx of CVEs is breaking your vulnerability management workflow, the problem might be your process, not the advisories."

200% agree.

Oh and BTW: also 200% agree with kernel policy off "no CVSS, this depends on your use case, which we do not know". CVSS are (mostly) for people who want a list of CVE in an excel file, and forget all the "CVSS < 7.0". This is compliance, NOT security.

PS:
The _only_ thing that I could ask from the kernel is that it should not be considered as a single component (as in "CPE"). It is rather thousands components/CPE, one per kernel configuration option. Yes, it would be difficult.
But useful.
At least for me, building everything from sources in embedded contexts. 😁

Jean-Baptiste Maillet boosted:
2026-02-10

I keep seeing stories about LLMs finding vulnerabilities. Finding vulnerabilities was never the hard part, the hard part is coordinating the disclosure

It looks like LLMs can find vulnerabilities at an alarming pace. Humans aren't great at this sort of thing, it's hard to wade through huge codebases, but there are people who have a talent for vulnerability hunting.

This sort of reminds me of the early days of fuzzing. I remember fuzzing libraries and just giving up because they found too many things to actually handle. Eventually things got better and fuzzing became a lot harder. This will probably happen here too, but it will take years.

What about this coordinating thing?

When you find a security vulnerability, you don't open a bug and move on. You're expected to handle it differently. Even before you report it, you need at a minimum a good reproducer and explanation of the problem. It's also polite to write a patch. These steps are difficult, maybe LLMs can help, we shall see.

Then you contact a project, every project will have a slightly different way they like to have security vulnerabilities reported. You present your evidence and see what happens. It's very common for some discussion to ensue and patch ideas to evolve. This can take days or even weeks. Per vulnerability.

So when you hear about some service finding hundreds of vulnerabilities with their super new AI security tool, that's impressive, but the actually impressive part is if they are coordinating the findings. Because the tool probably took an hour or two but the coordination is going to take 10 to 100 times that much time.

Jean-Baptiste Maillet boosted:
daniel:// stenberg://bagder
2026-02-10

The European Open Source Awards ceremony from January 29th, in one loooong recording with yours truly showing up several times.

Most blabbing at 1h24 and onward when @gregkh was up.

youtu.be/KXS5KQjWjns?si=bN35So

Jean-Baptiste Mailletjbm@infosec.exchange
2026-02-10

@bagder @gregkh and (and I know this is not going to be popular among my peer community of vulnerability management), thank you Greg KH for the very best documented and automatable CVE there is today.

And by far.
youtube.com/watch?v=KXS5KQjWjn
👏 🎉

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst