• rabber@lemmy.caOP
      link
      fedilink
      English
      arrow-up
      35
      ·
      25 days ago

      I agree. This seems fishy to me. I am concerned about compressed code in a public disclosure like this. Also it seems like all the documentation was written by AI.

      • hendrik@palaver.p3x.de
        link
        fedilink
        English
        arrow-up
        31
        ·
        25 days ago

        The entire page is an advertisement for an AI tool that helped uncover it. Guess that’s the demonstration on how it augments a report.

    • treadful@lemmy.zip
      link
      fedilink
      English
      arrow-up
      25
      ·
      25 days ago

      Very quick cursory review: The python script appears to decompress what might be an ELF from those compressed bytes. Then it opens a cryptography socket (AF_ALG) with the kernel and sends that whole thing.

      So the exploit is in the binary data and would likely take some skilled Linux engineers to decompile it and figure out the exploit.

      I’m not entirely sure why they would obfuscate it. Maybe they think it helps with responsible disclosure so people can’t make something more useful than the PoC?