PulseAugur
LIVE 13:42:42
tool · [1 source] ·
3
tool

Doyensec exploits OpenAI Codex at PWN2OWN, but bug was known

Doyensec successfully exploited OpenAI's Codex model in the Coding Agent category at the PWN2OWN competition. However, the exploit was based on a previously disclosed vulnerability, leading the team to label it a "collision." They are now returning to further research. AI

Summary written by gemini-2.5-flash-lite from 1 source. How we write summaries →

IMPACT Highlights potential vulnerabilities in AI coding assistants, underscoring the need for ongoing security research and patching.

RANK_REASON The cluster describes a successful exploit of an AI model at a security competition, which is a form of research milestone. [lever_c_demoted from research: ic=1 ai=1.0]

Read on Mastodon — mastodon.social →

Doyensec exploits OpenAI Codex at PWN2OWN, but bug was known

COVERAGE [1]

  1. Mastodon — mastodon.social TIER_1 · [email protected] ·

    While we're happy for our prize and that our exploit targeting OpenAI's Codex in the Coding Agent category was successful at # PWN2OWN , this was a collision💥 a

    While we're happy for our prize and that our exploit targeting OpenAI's Codex in the Coding Agent category was successful at # PWN2OWN , this was a collision💥 as the bug was previously known to the vendor. Back to the research! # P2OBerlin # doyensec # appsec # security # ai # op…