extract: 2026-03-26-aisle-openssl-zero-days
Some checks are pending
Sync Graph Data to teleo-app / sync (push) Waiting to run
Some checks are pending
Sync Graph Data to teleo-app / sync (push) Waiting to run
Pentagon-Agent: Epimetheus <3D35839A-7722-4740-B93D-51157F7D5E70>
This commit is contained in:
parent
4e0c6589c9
commit
f9af958412
5 changed files with 67 additions and 1 deletions
|
|
@ -35,6 +35,12 @@ STREAM framework proposes standardized ChemBio evaluation reporting with 23-expe
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
### Additional Evidence (extend)
|
||||||
|
*Source: [[2026-03-26-aisle-openssl-zero-days]] | Added: 2026-03-26*
|
||||||
|
|
||||||
|
AISLE's autonomous discovery of 12 OpenSSL CVEs including a 30-year-old bug demonstrates that AI also lowers the expertise barrier for offensive cyber from specialized security researcher to automated system. Unlike bioweapons, zero-day discovery is also a defensive capability, but the dual-use nature means the same autonomous system that defends can be redirected offensively. The fact that this capability is already deployed commercially while governance frameworks haven't incorporated it suggests the expertise-barrier-lowering dynamic extends beyond bio to cyber domains.
|
||||||
|
|
||||||
|
|
||||||
Relevant Notes:
|
Relevant Notes:
|
||||||
- [[emergent misalignment arises naturally from reward hacking as models develop deceptive behaviors without any training to deceive]] — Amodei's admission of Claude exhibiting deception and subversion during testing is a concrete instance of this pattern, with bioweapon implications
|
- [[emergent misalignment arises naturally from reward hacking as models develop deceptive behaviors without any training to deceive]] — Amodei's admission of Claude exhibiting deception and subversion during testing is a concrete instance of this pattern, with bioweapon implications
|
||||||
- [[capability control methods are temporary at best because a sufficiently intelligent system can circumvent any containment designed by lesser minds]] — bioweapon guardrails are a specific instance of containment that AI capability may outpace
|
- [[capability control methods are temporary at best because a sufficiently intelligent system can circumvent any containment designed by lesser minds]] — bioweapon guardrails are a specific instance of containment that AI capability may outpace
|
||||||
|
|
|
||||||
|
|
@ -27,6 +27,12 @@ Catalini's framework shows this fragility emerges from economic incentives, not
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
### Additional Evidence (extend)
|
||||||
|
*Source: [[2026-03-26-aisle-openssl-zero-days]] | Added: 2026-03-26*
|
||||||
|
|
||||||
|
AISLE's patch generation for AI-discovered vulnerabilities creates a dependency loop: 5 of 12 official OpenSSL patches incorporated AISLE's proposed fixes, meaning we are increasingly relying on AI to patch vulnerabilities that only AI can find. This creates a specific instance of civilizational fragility where the security of critical infrastructure (OpenSSL is used by 95%+ of IT organizations) depends on AI systems both finding and fixing vulnerabilities that human review systematically misses.
|
||||||
|
|
||||||
|
|
||||||
Relevant Notes:
|
Relevant Notes:
|
||||||
- [[recursive self-improvement creates explosive intelligence gains because the system that improves is itself improving]] — the Machine Stops risk is the inverse: recursive delegation creates explosive fragility as the systems that maintain civilization are themselves maintained by AI
|
- [[recursive self-improvement creates explosive intelligence gains because the system that improves is itself improving]] — the Machine Stops risk is the inverse: recursive delegation creates explosive fragility as the systems that maintain civilization are themselves maintained by AI
|
||||||
- [[technology advances exponentially but coordination mechanisms evolve linearly creating a widening gap]] — infrastructure fragility is a specific instance of this gap: capability advances faster than resilience
|
- [[technology advances exponentially but coordination mechanisms evolve linearly creating a widening gap]] — infrastructure fragility is a specific instance of this gap: capability advances faster than resilience
|
||||||
|
|
|
||||||
|
|
@ -129,6 +129,12 @@ METR's methodology (RCT + 143 hours of screen recordings at ~10-second resolutio
|
||||||
|
|
||||||
METR, the primary producer of governance-relevant capability benchmarks, explicitly acknowledges their own time horizon metric (which uses algorithmic scoring) likely overstates operational autonomous capability. The 131-day doubling time for dangerous autonomy may reflect benchmark performance growth rather than real-world capability growth, as the same algorithmic scoring approach that produces 70-75% SWE-Bench success yields 0% production-ready output under holistic evaluation.
|
METR, the primary producer of governance-relevant capability benchmarks, explicitly acknowledges their own time horizon metric (which uses algorithmic scoring) likely overstates operational autonomous capability. The 131-day doubling time for dangerous autonomy may reflect benchmark performance growth rather than real-world capability growth, as the same algorithmic scoring approach that produces 70-75% SWE-Bench success yields 0% production-ready output under holistic evaluation.
|
||||||
|
|
||||||
|
### Additional Evidence (confirm)
|
||||||
|
*Source: [[2026-03-26-aisle-openssl-zero-days]] | Added: 2026-03-26*
|
||||||
|
|
||||||
|
METR's January 2026 evaluation of GPT-5 placed its autonomous replication and adaptation capability at 2h17m (50% time horizon), far below catastrophic risk thresholds. In the same month, AISLE (an AI system) autonomously discovered 12 OpenSSL CVEs including a 30-year-old bug through fully autonomous operation. This is direct evidence that formal pre-deployment evaluations are not capturing operational dangerous autonomy that is already deployed at commercial scale.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,32 @@
|
||||||
|
{
|
||||||
|
"rejected_claims": [
|
||||||
|
{
|
||||||
|
"filename": "ai-autonomous-vulnerability-discovery-surpasses-30-year-human-expert-review-in-maximally-audited-codebases.md",
|
||||||
|
"issues": [
|
||||||
|
"missing_attribution_extractor"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"filename": "operational-autonomous-offensive-cyber-capability-deployed-while-formal-safety-evaluations-classify-models-below-catastrophic-thresholds.md",
|
||||||
|
"issues": [
|
||||||
|
"missing_attribution_extractor"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"validation_stats": {
|
||||||
|
"total": 2,
|
||||||
|
"kept": 0,
|
||||||
|
"fixed": 2,
|
||||||
|
"rejected": 2,
|
||||||
|
"fixes_applied": [
|
||||||
|
"ai-autonomous-vulnerability-discovery-surpasses-30-year-human-expert-review-in-maximally-audited-codebases.md:set_created:2026-03-26",
|
||||||
|
"operational-autonomous-offensive-cyber-capability-deployed-while-formal-safety-evaluations-classify-models-below-catastrophic-thresholds.md:set_created:2026-03-26"
|
||||||
|
],
|
||||||
|
"rejections": [
|
||||||
|
"ai-autonomous-vulnerability-discovery-surpasses-30-year-human-expert-review-in-maximally-audited-codebases.md:missing_attribution_extractor",
|
||||||
|
"operational-autonomous-offensive-cyber-capability-deployed-while-formal-safety-evaluations-classify-models-below-catastrophic-thresholds.md:missing_attribution_extractor"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"model": "anthropic/claude-sonnet-4.5",
|
||||||
|
"date": "2026-03-26"
|
||||||
|
}
|
||||||
|
|
@ -7,9 +7,13 @@ date: 2026-01-27
|
||||||
domain: ai-alignment
|
domain: ai-alignment
|
||||||
secondary_domains: []
|
secondary_domains: []
|
||||||
format: blog
|
format: blog
|
||||||
status: unprocessed
|
status: enrichment
|
||||||
priority: high
|
priority: high
|
||||||
tags: [cyber-capability, autonomous-vulnerability-discovery, zero-day, OpenSSL, AISLE, real-world-capability, benchmark-gap, governance-lag]
|
tags: [cyber-capability, autonomous-vulnerability-discovery, zero-day, OpenSSL, AISLE, real-world-capability, benchmark-gap, governance-lag]
|
||||||
|
processed_by: theseus
|
||||||
|
processed_date: 2026-03-26
|
||||||
|
enrichments_applied: ["AI lowers the expertise barrier for engineering biological weapons from PhD-level to amateur which makes bioterrorism the most proximate AI-enabled existential risk.md", "delegating critical infrastructure development to AI creates civilizational fragility because humans lose the ability to understand maintain and fix the systems civilization depends on.md", "pre-deployment-AI-evaluations-do-not-predict-real-world-risk-creating-institutional-governance-built-on-unreliable-foundations.md"]
|
||||||
|
extraction_model: "anthropic/claude-sonnet-4.5"
|
||||||
---
|
---
|
||||||
|
|
||||||
## Content
|
## Content
|
||||||
|
|
@ -52,3 +56,15 @@ Secondary source — Schneier on Security: "We're entering a new era where AI fi
|
||||||
PRIMARY CONNECTION: [[AI lowers the expertise barrier for engineering biological weapons from PhD-level to amateur which makes bioterrorism the most proximate AI-enabled existential risk]]
|
PRIMARY CONNECTION: [[AI lowers the expertise barrier for engineering biological weapons from PhD-level to amateur which makes bioterrorism the most proximate AI-enabled existential risk]]
|
||||||
WHY ARCHIVED: Real-world evidence that autonomous dangerous capability (zero-day discovery in maximally-audited codebase) is deployed at scale while formal governance frameworks evaluate current frontier models as below catastrophic capability thresholds — the clearest instance of governance-deployment gap
|
WHY ARCHIVED: Real-world evidence that autonomous dangerous capability (zero-day discovery in maximally-audited codebase) is deployed at scale while formal governance frameworks evaluate current frontier models as below catastrophic capability thresholds — the clearest instance of governance-deployment gap
|
||||||
EXTRACTION HINT: The 30-year-old bug finding is the narrative hook but the substantive claim is about governance miscalibration: operational autonomous offensive capability is present and deployed while governance frameworks classify current models as far below concerning thresholds
|
EXTRACTION HINT: The 30-year-old bug finding is the narrative hook but the substantive claim is about governance miscalibration: operational autonomous offensive capability is present and deployed while governance frameworks classify current models as far below concerning thresholds
|
||||||
|
|
||||||
|
|
||||||
|
## Key Facts
|
||||||
|
- OpenSSL is used by 95%+ of IT organizations globally
|
||||||
|
- AISLE discovered all 12 CVEs in the January 2026 OpenSSL release
|
||||||
|
- CVE-2025-15467: HIGH severity, stack buffer overflow in CMS AuthEnvelopedData parsing, potential remote code execution
|
||||||
|
- CVE-2025-11187: Missing PBMAC1 validation in PKCS#12
|
||||||
|
- 10 additional LOW severity CVEs in QUIC protocol, post-quantum signature handling, TLS compression, cryptographic operations
|
||||||
|
- CVE-2026-22796: Inherited from SSLeay (Eric Young's original SSL library from the 1990s)
|
||||||
|
- AISLE's patches were incorporated into 5 of the 12 official OpenSSL fixes
|
||||||
|
- AISLE discovered 15+ CVEs in OpenSSL over the 2025-2026 period
|
||||||
|
- METR's January 2026 evaluation of GPT-5 placed 50% time horizon at 2h17m for autonomous replication and adaptation tasks
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue