I used o3 to find a remote zeroday in the Linux SMB implementation
Exploit, validation, and tooling limits
- Commenters ask if the ksmbd bug is practically exploitable and whether syzkaller or classic fuzzing could have found it.
- The vulnerability involves concurrency and shared objects, leading several to doubt that traditional static analysis would reliably catch it.
- Some wonder if other SMB implementations share similar bugs; consensus is that codebases differ enough that this isn’t obvious.
- A later subthread presses for proof-of-concept (PoC) requirements; the author clarifies they did build a crashing PoC with KASAN, but it wasn’t emphasized in the writeup.
Signal-to-noise, workflow, and “prompt engineering”
- The reported ~1:50 useful-to-noisy finding ratio divides opinion: some think it’s excellent for “needle in a haystack” work; others say reading LLM slop is less efficient than a skilled human audit.
- Several maintainers complain they already drown in AI-generated false-positive CVEs and fear this article will worsen the spam.
- Others argue triage is exactly where real gains are needed—if models could generate harnesses/PoCs or use sanitizers as an oracle, S/N might rise dramatically, but that’s expensive.
- There’s extended debate over whether prompt design is “engineering” or just vibes; many describe structured workflows (separate prompt files, XML tagging, scratchpads, multi-step “reasoning” agents) as useful, even if empirically tuned rather than rigorously benchmarked.
Model capabilities and comparisons
- Multiple people see this as evidence that new “reasoning” models (o3, Gemini 2.5 Pro, etc.) have crossed a threshold for nontrivial bug-hunting, especially in concurrent code.
- Others report similar experiments: ~1:10 success on custom code challenges, needing many iterations, suggesting the low raw accuracy but high upside pattern is common.
- There’s disagreement on which frontier model is best; some claim Gemini 2.5 can find the same bug more reliably with a good prompt.
Security arms race and deployment
- Many expect intelligence agencies and serious attackers are already or soon will be automating zero-day discovery this way, triggering an arms race.
- Defenders can also integrate such scans into CI or periodic audits, but abandoned or unmaintained software remains a major weak point.
- Several highlight the mismatch between the modest dollar cost (~$116 for 100 runs) and the potentially high market value of a working zero-day.
ksmbd adoption, performance, and risk
- Discussion notes ksmbd is a kernel-space SMB server offering high performance and SMB Direct/RDMA support, attractive on fast (e.g., 25G) networks and mixed environments.
- Others question why such a large, risky protocol lives in kernel space at all, citing past catastrophic kernel SMB bugs and Samba’s slower but safer user-space model.