this post was submitted on 27 Jul 2025
170 points (96.7% liked)

Technology

73331 readers
4982 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 15 comments
sorted by: hot top controversial new old
[–] Bubbey@lemmy.world 2 points 15 hours ago

I'm sure nothing will go wrong with tons of critical business documents being routed through copilot for organizations...

[–] nathan@piefed.alphapuggle.dev 79 points 1 day ago (2 children)

$10 says they haven't actually escaped anything and it's just hallucinating a directory structure & file contents

[–] communism@lemmy.ml 31 points 1 day ago (1 children)

MS said they fixed it and categorised it as a "moderate severity vulnerability" so presumably they did in fact gain root access to the container

[–] wewbull@feddit.uk 17 points 1 day ago (4 children)

If they gained root access to the container, that's not a moderate vulnerability. Root inside a container is still root. You can still access the kernel with root privs and it's the same kernel as the host.

Docker is not a virtual machine.

[–] Grappling7155@lemmy.ca 1 points 13 hours ago* (last edited 13 hours ago)

Docker isn’t, but I was under the impression that hyperscalars tended to put all their containers in lightweight VMs or use something like kata containers anyways for security purposes

[–] ftbd@feddit.org 1 points 19 hours ago

That assumes the container itself is run as root, right?

[–] communism@lemmy.ml 9 points 1 day ago (1 children)

I know that? I'm just saying that MS categorised it as such. It would be strange to include the part about MS's responses if MS also found that the vulnerability was not what the researchers claimed it was.

[–] wewbull@feddit.uk 6 points 23 hours ago (1 children)

What I'm saying is something about the story doesn't add up.

Either Microsoft classified a major issue as a minor one so they didn't have to payout the bug bounty (quite possible), or the attack didn't achieve what the researchers thought it did and Microsoft classified it according to it's actual results.

[–] trolololol@lemmy.world 7 points 23 hours ago

If I have to choose between either ms or an unknown being correct, I pick the unknown person.

[–] Fizz@lemmy.nz 1 points 20 hours ago

I think they gained root to the python env which they couldn't do anything with because it was still running in docker inside a VM.

  • According to a smart sounding fella on hacker news.
[–] MagicShel@lemmy.zip 25 points 1 day ago

Even if it had access to its own source during training, the chances of it regurgitating it with total fidelity are zero.

[–] ignirtoq@fedia.io 25 points 1 day ago

Several years ago I created a Slack bot that ran something like Jupyter notebook in a container, and it would execute Python code that you sent to it and respond with the results. It worked in channels you invited it to as well as private messages, and if you edited your message with your code, it would edit its response to always match the latest input. It was a fun exercise to learn the Slack API, as well as create something non-trivial and marginally useful in that Slack environment. I knew the horrible security implications of such a bot, even with the Python environment containerized, and never considered opening it up outside of my own personal use.

Looks like the AI companies have decided that exact architecture is perfectly safe and secure as long as you obfuscate the input pathway by having to go through a chat-bot. Brilliant.

[–] BaroqueInMind@piefed.social 14 points 1 day ago (1 children)

And so Microsoft decided this wasn't a big enough vulnerability to pay them a bounty. Why the fuck would you ever share that with them then, if you could sell it to a black-hat hacking org for thousands?

[–] fmstrat@lemmy.nowsci.com 4 points 1 day ago (1 children)

There may not have been any logical progression beyond the container.

[–] deadcade@lemmy.deadca.de 1 points 7 hours ago

Surely there wasn't an exploit on the half a year out of date kernel (Article screenshots from April 2025, uname kernel release from a CBL-Mariner released September 3rd 2024).