An initiative to secure the world's software | Project Glasswing

AAnthropic
Computing/SoftwareBusiness NewsInternet Technology

Transcript

00:00:00>> Most people who use software every day don't think about bugs.
00:00:04They don't think about what can happen if the software that they depend upon suddenly is less secure.
00:00:12That's something that software developers have to deal with every single day.
00:00:16[MUSIC]
00:00:19>> So software has always had flaws and vulnerabilities, that's not new.
00:00:23>> For an average person, the bugs are by and large not something they notice on a daily basis
00:00:30because if they do, they get fixed.
00:00:32>> But then every so often, there are vulnerabilities that have real severe impacts.
00:00:36>> Like one single bug that works its way into shared software that many, many, many different products or websites use.
00:00:45So one issue just gets magnified out around the world.
00:00:49>> So historically, finding and patching vulnerabilities has been a slow, time-consuming and expensive process.
00:00:55>> If LLMs are now able to write code at the level of some of the greatest software developers in the world,
00:01:04it can also be used to find bugs and exploit that software equally effectively.
00:01:10>> These models have capabilities which are raising the bar from a cybersecurity point of view
00:01:16with their ability to help defenders, as well as potentially help adversaries.
00:01:23>> We recently developed a new model, Claude Mythos Preview.
00:01:27Early on, it was clear to us that this model was going to be meaningfully better at cybersecurity capabilities.
00:01:33>> There's a kind of accelerating exponential, but along that exponential, there are points of significance.
00:01:40Claude Mythos Preview is a particularly big jump along that point.
00:01:45>> We haven't trained it specifically to be good at cyber.
00:01:48We trained it to be good at code, but as a side effect of being good at code, it's also good at cyber.
00:01:54>> The model that we're experimenting with is, by and large, as good as a professional human identifying bugs.
00:02:03It's good for us because we can find more vulnerabilities sooner and we can fix them.
00:02:07>> It has the ability to chain together vulnerabilities.
00:02:10So what this means is you find two vulnerabilities, either of which doesn't really get you very much independently,
00:02:16but this model is able to create exploits out of three, four, sometimes five vulnerabilities
00:02:21that in sequence give you some kind of very sophisticated end outcome.
00:02:24>> And we think that this model can do this really well because we noticed that this model is very autonomous.
00:02:30It's just generally better at pursuing really long-range tasks that are kind of like the tasks
00:02:37that a human security researcher would do throughout the course of an entire day.
00:02:42Obviously, capabilities in a model like this could do harm if in the wrong hands.
00:02:46And so we won't be releasing this model widely.
00:02:49>> More powerful models are going to come from us and from others.
00:02:53And so we do need a plan to respond to this.
00:02:56>> That's why we're launching what we're calling Project Glasswing, where we partner with a number of the organizations
00:03:02that power some of the world's most critical code to put the model into their hands
00:03:06to allow them to look at how they can use models like this to bring down risk and protect everyone.
00:03:12>> And by giving these software developers advanced tools before anyone else, it gives all of us a collective head start.
00:03:22>> It allows us to find things that we couldn't find before, and it helps us fix these things much more quickly.
00:03:30>> Working with our partners, we've been finding vulnerabilities across essentially every major platform.
00:03:36>> I found more bugs in the last couple of weeks than I found in the rest of my life combined.
00:03:41We've used the model to scan a bunch of open source code.
00:03:44And the thing that we went for first was operating systems,
00:03:48because this is the code that underlies the entire Internet infrastructure.
00:03:52For OpenBSD, we found a bug that's been present for 27 years,
00:03:58where I can send a couple of pieces of data to any OpenBSD server and crash it.
00:04:05On Linux, we found a number of vulnerabilities where, as a user with no permissions,
00:04:11I can elevate myself to the administrator by just running some binary on my machine.
00:04:16For each of these bugs, we told the maintainers who actually run the software about them,
00:04:20and they went and fixed them and have deployed the patches so that anyone who runs this software is no longer vulnerable to these attacks.
00:04:27>> For a developer who tirelessly maintains software,
00:04:30a model that can help them discover vulnerabilities in their own code and fix them before they can be exploited,
00:04:38that is an invaluable tool.
00:04:40>> We've spoken to officials across the U.S. government,
00:04:43and we've offered to work with them and collaborate to assess the risks of these models and to help defend against the risks of these models.
00:04:50Everything that we do in our lives now depends on software.
00:04:55>> Software kind of ate the world.
00:04:56Every analog aspect of our life is somehow represented in digital domain.
00:05:01>> And so all of our daily lives run on the idea that we can rely on the systems that power them.
00:05:08>> Cybersecurity is the security of our society.
00:05:11>> It is essential that we come together and work together across industry to help build better defensive capabilities.
00:05:19>> No single organization sees the whole picture and can tackle this on their own.
00:05:22>> This is not going to be done as part of a few-week program.
00:05:26This is going to be the work of certainly months, perhaps years.
00:05:29But what I do hope is at the end of this, we can be in a position where the world's software, its customer data, its financial transactions,
00:05:38its critical infrastructure are safer than they were before.

Key Takeaway

Project Glasswing uses the Claude Mythos Preview model to give defenders a head start by identifying and patching decades-old vulnerabilities in critical infrastructure like Linux and OpenBSD before they can be exploited by adversaries.

Highlights

Claude Mythos Preview identifies software vulnerabilities with the same proficiency as a professional human security researcher.

The model creates sophisticated exploits by autonomously chaining together sequences of three to five independently minor vulnerabilities.

Project Glasswing provides advanced AI tools to maintainers of critical infrastructure to fix bugs before they are widely released.

A 27-year-old vulnerability in OpenBSD was discovered that allows a remote attacker to crash any server with a few pieces of data.

Security testing on Linux revealed multiple privilege escalation bugs where users with no permissions could gain administrator access.

The AI model demonstrates long-range autonomy by pursuing security tasks that typically require a full day of human effort.

Timeline

The magnifying effect of software vulnerabilities

  • A single bug in shared software components impacts thousands of derivative products and websites globally.
  • Manual processes for finding and patching vulnerabilities are historically slow and expensive.

Daily software users rarely notice bugs because most are fixed before they cause disruption. However, vulnerabilities in shared libraries create a magnification effect where one flaw compromises the security of the entire internet. Traditional security research relies on human speed, which often lags behind the pace of software deployment.

Capabilities of Claude Mythos Preview

  • LLMs trained for high-level coding proficiency acquire cybersecurity capabilities as an unintended side effect.
  • The model performs complex logic by linking three to five separate vulnerabilities into a single sophisticated exploit.
  • High levels of autonomy allow the model to execute long-range security research tasks that mirror a human's full workday.

The model was not specifically trained for cyberattacks but gained these skills through its deep understanding of code. It demonstrates the ability to see connections between minor flaws that humans might miss, creating an 'accelerating exponential' in discovery speed. Because of the potential for harm, this specific model is restricted from wide public release.

Defensive advantages through Project Glasswing

  • Project Glasswing partners with critical code maintainers to find vulnerabilities in operating systems and internet infrastructure.
  • A critical bug present in OpenBSD for 27 years was identified and patched through this initiative.
  • Linux kernel vulnerabilities were discovered that allowed unauthorized users to elevate themselves to administrator status.

By putting powerful models into the hands of defenders first, the project aims to secure the underlying layers of the internet. Security researchers using the model reported finding more bugs in two weeks than in their entire previous careers. Once a bug is identified, the model assists maintainers in developing and deploying patches to protect all users of the software.

Securing the digital foundation of society

  • Cybersecurity is now synonymous with societal security because every analog aspect of life is represented digitally.
  • Collaboration across industry and the U.S. government is necessary to assess and defend against AI-driven risks.
  • The project is a long-term commitment lasting months or years to protect financial transactions and critical infrastructure.

The initiative views software as the backbone of modern life, from financial systems to daily utilities. No single organization can manage the total scope of emerging threats, necessitating a collective defense strategy. The ultimate goal is to reach a state where customer data and infrastructure are demonstrably safer than they were before the advent of these AI capabilities.

Community Posts

View all posts