TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Devin AI security vulnerability discovered live on stream [video]

24 点作者 slashnode6 个月前

6 条评论

gnabgib6 个月前
Interesting comment from @Topfi last time this was posted (6 points, 2 days ago) <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42404132">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=42404132</a>
CGamesPlay6 个月前
Skipping over most of this (the vulnerability is not really investigated at all in the stream). But the gist of it is that &quot;access devin&#x27;s machine&quot; links are tough-to-guess but unauthenticated URLs, so anyone who has that URL has all the same access Devin does to your account.
theogravity6 个月前
I don&#x27;t want to watch a 55 minute stream to see what the actual vulun is. Can someone summarize?
评论 #42420914 未加载
jazzyjackson6 个月前
I don&#x27;t know what Devin is but it sounds like this is just a case of using a high entropy uuid as a workspace address, it&#x27;s not that different than password auth if, say, your password was in the query string. Not great, but basically it&#x27;s &quot;anyone with a link&quot; method of sharing access.<p>Did Google Photos ever change their auth scheme? I know I was surprised once when I found out the direct URL of my jpegs was &quot;public&quot;<p>Here&#x27;s an archived link to the Twitter thread you can read without an account <a href="https:&#x2F;&#x2F;xcancel.com&#x2F;TheMidasProj&#x2F;status&#x2F;1867318553046921376" rel="nofollow">https:&#x2F;&#x2F;xcancel.com&#x2F;TheMidasProj&#x2F;status&#x2F;1867318553046921376</a>
评论 #42421124 未加载
satisfice6 个月前
I tried to watch this, but a young man’s silly antics are not educational for me. Maybe people who stream have to ham it up to get likes, but I’d rather see serious people at work.
google2341236 个月前
It;s a funny stream, Devin spends one and half hours trying to push to master.