We help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.
Aug 13 • 5 tweets • 3 min read
Trail of Bits is heading to the AIxCC finals! 🏆 Our Cyber Reasoning System, Buttercup, ranked in the top 7 out of 39 teams in the @DARPA AI Cyber Challenge semifinals @defcon 2024. buff.ly/4dGrdRz
@DARPA @defcon The AIxCC semifinals put CRSs to the test with challenges on real-world software like nginx and the Linux kernel. Buttercup took an early lead on the achievement board by being the first to patch vulnerabilities in nginx. buff.ly/4djtJ09
Jan 16 • 4 tweets • 2 min read
Today, we are disclosing LeftoverLocals, a vulnerability that allows listening to LLM responses through leaked GPU local memory created by another process on Apple, Qualcomm, AMD, and Imagination GPUs (CVE-2023-4969) buff.ly/48RDP68
Our PoC can listen to another user's llama.cpp session across process or container boundaries. LeftoverLocals can leak ~5.5 MB per GPU invocation on an AMD Radeon RX 7900 XT running a 7B model on llama.cpp, adding up to ~181 MB for each LLM query. buff.ly/41WKaLf
Nov 14, 2023 • 14 tweets • 8 min read
The @raft_fi issue is complex and we're actively investigating it. We've offered to help their team however we can. Here's some of what we know so far:
Raft published the exploit details here:
tl;dr get the pool into an unbalanced state, repeatedly mint 1 share because `divUp` mints more than expected, then redeem elsewhere.mirror.xyz/0xa486d3a7679D…