CVE-2025-27407: Inside the Critical GraphQL-Ruby RCE Vulnerability https://cenobe.com/blog/cve-2025-27407/
wait3() system call as a side-channel in setuid programs (nvidia-modprobe CVE-2024-0149)
We have been aware of a bypass for that protection since May last year.
My small child BlogFlock (https://blogflock.com) is a social RSS feed reader - share the blogs you follow with friends and strangers!
BlogFlock will always be free to use and never show you ads.
But running a feed aggregator is expensive at scale.
On top of BlogFlock's pretty decent feature set (if I say so myself), what features or service guarantees would convince you to spend $25/year on a social feed reader?
"The designer of a new system must not only be the implementor and the first large-scale user; the designer should also write the first user manual. If I had not participated fully in all these activities, literally hundreds of improvements would never have been made, because I would never have thought of them or perceived why they were important."
-- Donald Knuth, “The Errors of TeX”
looks like the AI + MCP-assisted reverse engineering hype train is gaining steam! 🚂✨
in just the past few days, we've seen:
• @itszn13 integrating MCP into @vector35’s Binary Ninja (https://x.com/itszn13/status/1903227860648886701)
• @jh_pointer casually dropping his IDA MCP project, which I had to nerdsnipe myself into trying (https://github.com/MxIris-Reverse-Engineering/ida-mcp-server, https://x.com/bl4sty/status/1904631424663379973)
• @mrexodia rolling out a clean (judging by a quick code quality check) MCP implementation for IDA (https://github.com/mrexodia/ida-pro-mcp)
• @lauriewired dropping GhidraMCP for @nsagov’s Ghidra (https://github.com/LaurieWired/GhidraMCP)
these tools are early-stage but already hint at the potential for interactive RE software running on (semi) autopilot.
makes me wonder—should we formalize a set of MCP primitives across RE tools and unify them under one overarching framework? 🤔
of course, these aren’t silver bullets. but much like typical LLM usage, in the right hands, they could be powerful time-savers.
curious to see what comes next! might be time for hacking competitions focused on small/constrained binaries to start thinking about countermeasures against AI-assisted cheesing. 👀
Today we are very proud to announce that the United Nations has switched from Google Forms to CryptPad Form for collecting endorsements on the UN Open Source Principles: https://unite.un.org/news/sixteen-organizations-endorse-un-open-source-principles
CryptPad Form is a full-fledged application allowing you to build privacy-preserving questionnaires for your respondents.
Try it for free, without even registering an account, on our CryptPad.fr flagship instance!
#UnitedNations #UN #Privacy #OpenSource #Forms #Studies #FOSS
Looking to write your own MCP for a popular decompiler? Check out our unified API that allows scripting in IDA, Ghidra, Binja, and angr. In the same few Python lines, you can make a struct, retype a function, and modify local vars. Check it out: https://github.com/binsync/libbs