Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Spin Torque Nano-Oscillators with Tilted Magnetic Anisotropy

    April 16, 2026

    This AI company leaked its own code. It’s also built something terrifying • Graham Cluley

    April 16, 2026

    MuleSoft Agent Fabric adds new ways to keep AI agents in line

    April 16, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»This AI company leaked its own code. It’s also built something terrifying • Graham Cluley
    IT/ Cybersecurity

    This AI company leaked its own code. It’s also built something terrifying • Graham Cluley

    big tee tech hubBy big tee tech hubApril 16, 20260046 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    This AI company leaked its own code. It’s also built something terrifying • Graham Cluley
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Tanya Janca

    I had my data stolen once, Graham, from a governmental organization I worked at.

    Graham Cluley

    Right.

    Tanya Janca

    And they were selling it online for the bitcoin equivalent of $50 Canadian. And that made me feel very humiliated.

    Graham Cluley

    Were you like, please, please sell it for more?

    Tanya Janca

    I know, I was like, aren’t we worth more than that?

    Unknown

    463. This AI company leaked its own code. It’s also built something terrifying. With Graham Cluley and special guest Tanya Janca. Hello, hello, and welcome to Smashing Security episode 463. My name’s Graham Cluley.

    Tanya Janca

    And I’m Tanya Janca.

    Graham Cluley

    Tanya Janca, first time on Smashing Security. Hello. How the flip are you?

    Tanya Janca

    I am wonderful, Graham. How are you?

    Graham Cluley

    I’m gorgeous. Now, you are dialing in today from the beautiful Canadia. Thank you very much for doing that. Now, you are a famous name, right? You’re a pretty big deal in the world of cybersecurity. So if people haven’t heard of you, how can you describe what you do and what you’re all about?

    Tanya Janca

    So I am a software developer turned application security expert who really likes to write. And now has written a bunch of books and tons of blogs. I really like to speak, so I speak at conferences, and right now I’m giving secure coding training to large organizations and then kind of just doing contracts here and there, helping people change their application security program so it’s more AI aware.

    Graham Cluley

    Okay, so you are going into organizations and you’re helping those developers code more securely, which is a pretty good idea, I think, because we don’t want software which is full of security holes like Swiss cheese.

    Tanya Janca

    Well, we have a lot of that right now all over the internet. Right now, that is a giant problem, and especially not on the internet, embedded devices. You know, you go into an emergency room, a hospital, all of those places, the security is usually much worse than it is on the internet, and it’s not great on the internet.

    Graham Cluley

    Now, a little birdie tells me, Tanya, that you have recently set up a rival podcast to Smashing Security, and you are basically I’m thinking that you can come in here and tell everyone about your podcast. Is that correct?

    Tanya Janca

    It’s 100% correct, Graham. Right, right. My completely different topic podcast is called DevSecStation, and it’s 5 to 10 minute mini lessons for software developers about security. So, this month I’m covering the supply chain and how to secure the supply chain and how software developers they’re a target now. Malicious actors are actually targeting the actual developer, the human, and they need to know.

    Graham Cluley

    That’s interesting actually, isn’t it? Because of course, it’s easy to imagine how hackers could target people who work in the finance department, for instance.

    Graham Cluley

    But if they’re targeting the developers themselves, the idea, I presume, is to try to implant code within the code which these developers are writing, because eventually it will roll out to many, many organizations and could cause absolute mayhem.

    Tanya Janca

    Absolutely. So, often, the past couple years, people will say, oh, there was a software supply chain breach. But if we look at maybe half of those, it was actually the software developer that was compromised. And then as a result, multiple parts of the supply chain was breached because they have superpowers, because they can control the CI, and they control their IDE, and they control the repo, and they can go to prod, and, and, and. And so, you get the developer’s credentials and suddenly you have everything. And then on top of that, what some of the malicious actors have been doing, Graham, is then they rob the developer as well.

    Tanya Janca

    So they go and they try to empty their crypto wallets because why don’t we just kick people while we’re down?

    Graham Cluley

    Developers are the kind of people who quite often would have crypto wallets, wouldn’t they?

    Graham Cluley

    And so they understand the technology and so they may have a few thousand dollars or perhaps more.

    Tanya Janca

    They’d be significantly more likely to have a crypto wallet than the average person.

    Graham Cluley

    And I’m also thinking that, I mean, my background is I used to be a developer many years ago, used to write antivirus software. And I remember from way back then that the programmers are also the kind of people who would demand to have admin privileges on their computers because they feel they have godlike capabilities anyway. And so they would be arguing with the IT team, well, I need all of these rights. And that could be a security threat in itself, couldn’t it?

    Tanya Janca

    Oh yeah, for sure, Graham. And I was a software developer longer than I’ve worked in security. I was that person for sure. And on top of having admin rights and being the lord of their workstation, I think a lot of people, when we think of the CI/CD, we think of it as a thing that publishes code and we don’t think about how it’s a thing that talks to the outside, does downloads, tells us if everything’s okay or not, decides to log or not log certain security things. And very few organizations are currently logging or alerting, for instance, if a new admin gets added or if a new workflow gets added. I worked at a place, I was contracting there, and we’re playing around with their CI because I’m going to add some stuff and—

    Graham Cluley

    Time, time, time, Tanya. Look, you’ve been developing code more recently than me, and I recognize that there’s a lot of listeners who may not work in the programming world. You’re giving me some acronyms here. No, no, no, it’s all right. But what is that? What is that that you are talking about?

    Tanya Janca

    So a CI/CD, continuous integration, continuous delivery pipeline. It’s a piece of software that the software developers will put their code into, and then it will run lots of tests. It will go and get things off the internet for them. It’ll add some updates, it can log things, it can send alerts, and then it will put a copy of whatever the thing is they’re building onto maybe a development server so they can play with it and look at it and do more tests. And then if all those tests pass, it’s, hmm, that seemed pretty good. Let’s put it on another server and let another team see it. And it goes from environment to environment automatically, automagically even. And then by the end, assuming it passes all the tests and the humans it, it goes out into production, which is where you and I and most of us humans live. So, if you’re a customer and you’re using software, you don’t know, but that’s called production. That’s the place where the magic happens, where the users are. But there’s all these other environments below that where we’re playing around with things of making sure things are okay and making sure they’re safe. And so this system is usually the most powerful software system in an organization. It can go to the internet and download things. It can install things. It can delete things. It can decide this code’s not good enough and it’s not going anywhere on my watch. And it does most of this quite automatically without human intervention. And now imagine a malicious actor takes that over. They could literally put code in that’s bad and put it out into your product and release it to all your customers without you knowing. And it’s happened a bunch of times and we’re not protecting these systems very well. And so, I’m talking about it.

    Tanya Janca

    If you’re there for a month, Graham, you could have 50 cappuccinos.

    Tanya Janca

    I think new software is having security added significantly more often. However, we couldn’t have a podcast episode without talking about AI. So everyone right now is using Cloud, which we’re going to talk about in a bit, and Copilot, et cetera, to write code for them. And the quality of code coming out of those is not very good right now. And I am seeing it improve, but not the speed that I dream of. Graham, it sounds weird, but I want to be put out of a job, right? Like, I would like to not need to teach secure coding anymore because we’ve got this. That’s what I want. And the AI is not doing it for us. So what’s happening now is that we have developers with varying levels of how to create secure software and varying level of prioritization on that. And then now they’re being told develop software at 10 times the speed or we’re going to fire you and hire someone else. So, they’re using the AI, the AI is changing tons and tons of things they don’t fully understand. They don’t have time to review it. They’re just pressing the commit button. And that is my fear for new software. For old software, it’s, it’s that, oh, it’s always worked. Why would we update it? We’d have to re-architect it to fix that. We don’t have money for that. We’ll just leave it. A lot of legacy is in a bad shape. And by legacy, I mean software that’s already out in production that’s been out one or more years.

    Graham Cluley

    Well, you know what? I think more people need to tune into DevSecStation, the brand new podcast, something of a competitor to Smashing Security, to learn more about this. Anyway, great to have you here, Tanya. Before we kick off, let’s thank this week’s wonderful sponsors: Meta, CoreView, and Vanta. We’ll be hearing more about them later on in the podcast. This week on Smashing Security, we won’t be talking about how hackers have breached travel site Booking.com, stealing names, addresses, phone numbers, and information shared with hotels. You’ll hear no discussion of how Rockstar Games, the makers of Grand Theft Auto, have been hacked for the second time in 3 years. And we won’t even mention how Meta is blocking lawyers from running ads on Facebook and Instagram to recruit clients who say that they’ve been harmed by social media. So, Tanya, what are you going to be talking about this week?

    Tanya Janca

    I am going to talk about how Anthropic accidentally leaked their code for Claude Code CLI. And then I’m also going to talk about Mythos, the new model that is terrifying. Yeah.

    Graham Cluley

    Yeah. And I’m going to be talking about how Venetians are getting themselves in a world about hackers. All this and much more coming up on this episode of Smashing Security. Well, we’ve got time now to talk about one of today’s sponsors, Vanta. Joe, what keeps you up at 2 o’clock in the morning?

    Joe

    The dog next door, mostly.

    Graham Cluley

    So you are not even All right, well, yeah, but I’m getting the web traffic is talking professionally, what keeps you up? the truth, right?

    Joe

    Oh, whether we’ve got the right security controls in place, whether our vendors are secure, how to escape the nightmare of outdated tools and endless manual processes.

    Graham Cluley

    Exactly, which is where today’s sponsor comes in. It’s Vanta.

    Tanya Janca

    It’s a little bit like when H.D. Moore released Metasploit so many years ago. So Metasploit is a tool that you can point at a web app or a piece of online infrastructure. So it needs to be webby. And it will go and try to exploit a list of known CVEs, so Common Vulnerability Enumerators. So vulnerabilities that are publicly known in software that you can buy. So not custom software, but, you know, I have version XYZ of Apache web server and it’s known to have that vulnerability. And so you point Metasploit at it, and if it has that vulnerability, it’ll go and it’ll open up a hole there and exploit it. And in the wrong hands, you can use that to hurt people just the same as if you give a scalpel to someone, they can cut themselves, they can cut someone else. But this tool, it’s kind of handing someone an atomic bomb.

    Joe

    Fanta, the fizzy orange drink.

    Tanya Janca

    And so I feel, you know, for instance, let’s say a big company Microsoft or Netflix or whatever, some big software company, they get a license to use it internally. They find all their own bugs. They have time because they’re not publicly exposing, you know, no one else knows but them and they’re fixing it. It would be the ultimate pen test, right? That could be great, except for what if one of those employees then sells those vulnerabilities to a malicious actor?

    Joe

    How can this possibly be true?

    Tanya Janca

    You know what I mean? Or they take it and then they point it at something they’re not supposed to, right? Because it’s so powerful and it’s so fast and it’s finding apparently very novel, unique things that humans haven’t been able to see before. It’s quite disconcerting, or I think so.

    Graham Cluley

    No, no, Joe, it’s a Vanta with a V. It’s a trust management platform. It’s not a drink full of sugar. It automates all of that tedious manual compliance work so you can stop drowning in spreadsheets, chasing audit evidence, and filling out questionnaire after questionnaire.

    Joe

    Lush. I hate questionnaires.

    Graham Cluley

    Well, who doesn’t? Vanta continuously monitors your systems. It centralizes your security data. It keeps your program audit ready all of the time. It also uses AI to streamline evidence collection and flag risks. It automates compliance for SOC 2, ISO 27001, HIPAA, GDPR, and more.

    Tanya Janca

    Yeah. Yeah.

    Joe

    So basically it handles the boring stuff so we can focus on the interesting stuff.

    Graham Cluley

    Exactly. Precisely that. And for a limited time, new customers can get $1,000 off. $1,000? Yep, $1,000. Head to vanta.com/smashing. That’s vanta.com/smashing and get started today. Which is this. Maybe this will give you a little bit of comfort.

    Joe

    And maybe get a decent night’s sleep for once. Oh, and unlike fizzy drinks, Fanta isn’t bad for you.

    Graham Cluley

    Do you get any comfort at all from the thought that the people building these tools are still fundamentally human and therefore fundamentally fallible? Thank goodness it’s not the AI, right?

    Joe

    That was a fruit twist.

    Graham Cluley

    It’s human error. Hey, yes, us humans, haven’t we done great? Now, chums, I want you to picture this. You are a tourist in Venice. It’s a warm, Spring morning, you’ve just paid €12 for a cappuccino, and you’re standing in Piazza San Marco watching the pigeons do their thing. Because we’ve really cocked up on this occasion by leaking the source code. I think we should feel good about that rather than it being an AI which screwed up, which surely is only a short way away. And what you don’t realise is, while you’re there in that beautiful setting, that somewhere on a dark Telegram channel, a hacking group is claiming that they could, at the press of a button, send water flooding across the very stones that you are standing on. Which would of course solve the pigeon problem in Venice, at least temporarily. Now, Tanya, have you ever been to Venice? Does this make you want to go?

    Tanya Janca

    So I haven’t been to Venice, and I still want to go. Wet feet are okay with me.

    Graham Cluley

    Right? Wet feet are alright. Pack your flippers. Well, a hacking group called the Infrastructure Destruction Squad, they announced in early April that they had broken into the hydraulic pump system that protects Piazza San Marco, in Venice from the notorious high tides of Venice. They said that they accessed the system’s control interface on the 26th of March. They spent about 10 days quietly poking around, having a little rummage, and then on the 7th of April, they began what they called the disclosure phase. And the disclosure phase, that’s hacker speak for bragging about it on Telegram. Right?

    Graham Cluley

    Because you can’t be a hacker these days without a bit of bragging. They were sharing screenshots of control panels and valve states and system layouts, and then they offered to sell full root access to one of Italy’s most iconic pieces of critical infrastructure.

    Tanya Janca

    So they should go to shehackspurple.ca. And if you sign up for my newsletter, which is free, you’ll get invites to everywhere I speak. That’s scary. You’ll see all my new content every month. You’ll get the episode of the podcast and you’ll get at least one meme. And memes are important, Graham.

    Graham Cluley

    How much do you think they could charge?

    Tanya Janca

    A million dollars?

    Graham Cluley

    I mean, that is plausible, isn’t it? They could try that. How about $600? Oh my gosh, Graham. Not $6 million. Not $6,000. $600. Which is about the price of a mid-range Android phone. Or if you’re in Venice, round about 50 cappuccinos.

    Tanya Janca

    Yeah, 50 cappuccinos. That sounds nice though. 50 cappuccinos sounds nice.

    Graham Cluley

    You’d be high as anything, Tanya. You can’t drink 50 cappuccinos.

    Graham Cluley

    I suppose over a month you could. I was thinking it would all be consumed in one day, in which case you’d be desperate for the loo, wouldn’t you?

    Tanya Janca

    Yeah, that’d be awful.

    Graham Cluley

    Now, you live in the world of application security, Tanya. It’s all about software code, web apps, all that CI/CD nonsense. When you hear $600 to access flood defense infrastructure, is that a surprising number to you, or is it just depressingly familiar for critical systems security? What’s your feeling?

    Tanya Janca

    So my first thought is that it’s very low. However, I had my data stolen once, Graham, from a governmental organization I worked at.

    Graham Cluley

    Right.

    Tanya Janca

    And they were selling it online for the bitcoin equivalent of $50 Canadian. And that made me feel very humiliated.

    Graham Cluley

    Were you like, please, please sell it for more?

    Tanya Janca

    I know. I was like, aren’t we worth more than that?

    Graham Cluley

    It’s such a slap in the face, isn’t it?

    Tanya Janca

    Right, right. But you could just scrape the stuff off our website. None of it was private. It was publicly available data. So I was like, well, I mean, maybe what they’re paying for is the convenience of it being in an Excel spreadsheet instead of having to scrape it. But I feel like $600 seems like they don’t actually have access and they’re just a kid in a basement being like, whoa, €600, that would be amazing. We could have 50 cappuccinos.

    Graham Cluley

    It’s a strange old thing, isn’t it? So they were posting up on Telegram this thing saying, you know, you can have access to this too as well for such a small amount of money. And their Telegram post, which was written in Chinese— I don’t speak Chinese, I don’t read Chinese, but thankfully the internet can do all that for me. This is what it was saying in English. It said, yes, you conducted new checks after the attack in late March. Yes, equipment tests came back positive after Easter. In other words, they were tracking the remediation efforts being made by the organisation trying to clean up afterwards. They were doing this in real time while Telegram posts were being written about it. And they continued, but what you haven’t understood is that we have refused to completely shut down the flood defense system. So they’re trying to make Venice basically say, oh, thank you very much. That’s very good of you. We’re very grateful. They said, we are not here to destroy you. We are simply here to deliver a message. We can do it and we are still inside your network. ‘No tests conducted by your security teams can drive us away. No system updates can expel us. We’ve been here for months and will remain here for months to come.’ Which is fairly aggressive, kind of spooky talk, isn’t it?

    Tanya Janca

    It is. It makes me wonder if they have persistence on the network, where that is, right?

    Graham Cluley

    Yeah. I wonder how they’re managing it. It’d be interesting to know, wouldn’t it? And they carried on. They had a message for the press as well. They said, ‘Any newspaper that disseminates this news without understanding the truth, prepare for a devastating attack. I mean, to be honest, at this point, I’m beginning to think this is most likely a 14-year-old. Yeah, there’s a lot of bravado going on here, isn’t there? But to recap, these hackers broke in, refusing to leave, threatening journalists, but they’re only charging $600 for the privilege of having access yourself. So you could imagine if someone had a problem with Venice. I don’t know, maybe you were in charge of IT at a rival European tourist destination. Maybe if you thought, “Oh, Venice has beaten us once again with all of their gondoliers and cornettos. If only we could access their flood defence system, and basically when that next high tide comes, we could ensure that they get flooded.”

    Tanya Janca

    I don’t know. I don’t want to cause destruction. Maybe I’m weird.

    Graham Cluley

    You’re Canadian. Of course you’re not destructive. You know, you’re just unbelievably pleasant all the time, aren’t you? But I mean, but there are— now, this may come as a shock to you as a Canadian, but there are countries— I’m not going to name any countries, particularly to you, a Canadian— but there are countries which are perhaps a little bit more interested sometimes, some elements of them, in destruction. I’m just saying it’s possible. But of course, lots of hacktivist groups may be interested. And look, a lot of the early malware which we saw was purely destructive. It would wipe drives or delete files. You know, there was no point to it. There was no financial incentive. It was about just being mindless, really, in a way.

    Tanya Janca

    I feel like there’s a certain, I need to prove that I’m cool sort of thing, especially when we are coming of age, like teenagers, like I need my peers to see I’m cool. I need people to think I’m powerful. And then hopefully that sort of just wears off when we mature and we’re like, actually, I could just achieve things and be awesome and I could prove I’m amazing by actually doing positive, good contributions to the world rather than negative ones. But I feel like sometimes people get lost, and maybe they don’t see that there are good things that they could do to prove how awesome they are rather than bad things.

    Graham Cluley

    Do you think it’s a bit of low self-esteem? Do you think, is it that they simply don’t have girlfriends, boyfriends, or whatever it is that they’re after? Maybe there’s something missing in their lives.

    Tanya Janca

    Yeah, I often joke they just need to go get a life and maybe they need a dog. Think about it though, they’re not finding this purpose in their life, this thing that brings them joy, and they’re angry. And so they’re taking it out on people. And I feel like if we could find a way— when we do the Pick of the Week, we’re gonna talk a little bit about maybe this, but I feel like you’re really onto something there, Graham. I’ve said things like this before where I’m just like, you know, why are people doing this? Maybe we need to find a focus to give them where they could show their brilliance, show their determination and be successful, but in a positive way.

    Graham Cluley

    Yeah, absolutely. So this claim they make about still being on the network, that’s interesting to me. And this, no updates can expel us. In your world, when someone says they’ve got that kind of persistent access, do you take that seriously? Is that a technical claim, do you think, or is that just bravado?

    Tanya Janca

    So I do software and that’s definitely an infrastructure network thing, but yeah, absolutely. Potentially still have access. There was an incident a few years ago where I remember the malicious actor was posting images of the Slack channel that the incident responders and security team was using. So they could actually see the Slack channel and the discussions of the security incident, and then they were posting it to Twitter, mocking them, which made me feel so bad for that team. And this is why we need to have a way to talk to each other that’s I call it out of bound, a different separate way. So maybe there’s a Signal chat where you talk or Telegram if that’s your jam and you have this separate space where you can discuss things and where you can double-check things.

    Graham Cluley

    You’ve given the example of that Slack channel. It reminded me of a story from, oh my goodness, years and years ago, there was a hacking group in the UK. I think it was the LulzSec hacking gang. The police in the States, the police in the UK, Smashing Security set up a conference call to discuss this particular hacking group. And one of the participants in that call, a British police officer, was accessing the call from his private email account, or he had forwarded the login details because he had to connect late in the evening. What he didn’t know was that a member of that particular hacking group had hacked his personal email, and they were actually able to tune in to the conference call and hear the police discussing the investigation into them. So, these things can really badly backfire.

    Tanya Janca

    Yeah. The comms are really important during an incident. When I teach software developers, I have this little section about what a security incident is, what it looks like, how you should call the security team, and what not to do. Because I’ve had so many software developers attempt to help me, and always from a good place, just to be clear, then ruining the chain of custody, effing up all my evidence. You know, “Don’t worry, I erased it.” I was like, oh my God. Yeah, I feel like the security team needs to communicate better to the entire rest of the organization, the processes that they should follow so that if there is an emergency, everyone knows what to do because a helpful person can sometimes completely ruin everything.

    Graham Cluley

    Yeah. Well, this is at its heart what we call an OT attack, operational technology. So it’s not your email server. It’s not a web application necessarily. It’s not a customer database. This is all about the physical world of pumps and valves and sensors. This means that when it goes wrong, it’s not your data that’s being leaked. It could mean water’s going everywhere. I know your world is very much the software side of things, Tanya, but OT security and application security, they are converging in some ways, aren’t they?

    Tanya Janca

    Software runs everything. You can’t have OT without any software. And I would say in this case, it sounds like it’s critical infrastructure because at first when you were describing it, you’re like, oh, you’ll get your feet wet. And I was like, whatever, I’m British Columbian, we’re always wet. It would actually flood, people could be harmed and stuff. It becomes critical infrastructure, if that makes sense. And so software runs literally everything.

    Graham Cluley

    That’s true. And the problem is that OT systems, these operational technology systems, they were built for longevity and reliability and uptime. You know, the important thing was that they need to always work. And this was long before people were thinking about connecting them to anything. But once they were networked for convenience, maybe, or remote maintenance, suddenly this decades-old infrastructure is perhaps accessible via the public internet and may have very weak security.

    Tanya Janca

    I find, Graham, quite frankly, that a lot of the security industry focuses on the internet and web, but that’s the tip of the iceberg of all the software that we have. In December I was working with this company that does embedded medical devices and then they do operating systems and emergency room systems, all of the devices that are in there, they write the software for that. And obviously, the security is pretty important. Safety and security and privacy, pretty darn important, right? And we worked together, and it was a really cool project. But I feel like a lot of organizations, they’re like, oh, well, we’re not on the internet, so it’s not that important. So when we did a threat model of all the things that could happen and how easy it would be, they’re really shocked. And hospitals get hit with ransomware all the time, but if you— it’d be so easy to hit a hospital physically.

    Graham Cluley

    Yeah, it’s a big problem. And we’re living in this world of web apps. People build them, they work, and then they think, oh, maybe we should add security later. If you’re lucky, they have that part of the conversation. But do you think the software world is actually learning that lesson to integrate security earlier on in the process? Well, whether you believe every word that Infrastructure Destruction Squad has said about Venice or not doesn’t really matter, because the next group that finds their way into a system like that, they might not be interested in writing threatening Telegram posts or asking for the mighty sum of $600. They might just want to open the valves and cause mayhem that way.

    Tanya Janca

    Yeah, it’s true.

    Graham Cluley

    Well, time now to talk about one of our sponsors, Meta. Joe, have you ever had to set up a network for a new office?

    Joe

    Once. I’ve since sought therapy.

    Graham Cluley

    Ah, right. Well, Meta exists to make all of that someone else’s problem. They are a network as a service company, but a proper end-to-end one. You hand them a physical address, a floor plan, they handle everything. They sort out the ISP, they design and deploy the network, they turn up on the site, they rack their own hardware. Kits that they’ve actually designed themselves, not just rebranded someone else’s gubbins.

    Joe

    So I don’t have to spend 45 minutes on hold with the telecoms company only to be told they’ve misspelled our company name on the contract.

    Graham Cluley

    Right, right. Yeah. Not a single minute of that. And once you’re up and running, you get one dashboard for monitoring, security, VLANs, firewall, DNS security, the whole works. Full control without any of the soul-destroying groundwork.

    Joe

    This begs the question, what’s the catch?

    Graham Cluley

    Genuinely, no catch. It’s a straightforward subscription model. They even have a hardware buyback program if you’ve already blown the budget on equipment from another vendor.

    Joe

    So they’ll take away the evidence of my previous terrible decisions.

    Graham Cluley

    Right, basically, yes. So find out more at meter.com/smashing. That’s meter.com/smashing. Smashingsecurity.com/smashing, and thanks to Meta for supporting the show. Tanya, what story have you got for us this week?

    Tanya Janca

    Okay, so I wanted to talk about how Anthropic accidentally leaked the full source code for Claude Code CLI. So—

    Graham Cluley

    Sorry, isn’t it Claude rather than Claude?

    Tanya Janca

    Oh, je parle français. I’m Canadian. I speak French. So—

    Graham Cluley

    Ah, mais oui, ce sont des mots qui vont très bien ensemble. Sorry, I’m putting you off.

    Tanya Janca

    Basically, when we publish code to production, the magical place where the users are, software developers are supposed to turn off debug mode, which is a nerdy thing that we use so that we can find problems and fix things. And then we also usually have something called an ignore file, which means don’t put all of those files up there. These are the just-for-us files. And both of those things didn’t happen. And so then they published this file, it’s called a source map file, and it can be opened like a present, and inside was the code.

    Graham Cluley

    What actually got leaked here? This was Anthropic, the big AI company, which did this. They leaked the code for Claude. Is that right? The thing they spent billions on, right?

    Tanya Janca

    So they accidentally leaked all the intellectual property. This would be a data spill because they did it themselves. I can’t imagine being the software developer that did that because they’re probably pretty upset with themselves. So it wasn’t a hack, it was human error. And the reason why this is a really big deal is, so first of all, they spilled their intellectual property. And as a person who has made most of her income off of her intellectual property her whole life, ’cause when I was younger, I was a professional musician, then I was a software developer writing code, then I wrote books. I did all of these things, right? All of that’s intellectual property. So that’s one thing. But the other thing is that then the internet got ahold of it and analyzed it for vulnerabilities and started writing exploits for it so that they could take advantage of Claude. And so people can dissect all of its defenses and come up with better attacks. And all of the other AI companies now are stealing it. And basically, so someone, rather than seeing that and reporting it immediately to Anthropic, the person’s “you know what I’m gonna do? I’m gonna copy it to my own GitHub repo and start distributing it.” Which makes me sad. And I know that it’s a cool thing to find. I would be really excited too, but—

    Graham Cluley

    The thing is, yes, obviously that’s naughty, right? Because it’s Anthropic’s code, right? But let’s not forget what Anthropic and the other AI companies have been doing for years, which is they’ve been stealing everyone else’s content without permission in order to train their AI models, right? So isn’t this just actually a case of they’re getting their just desserts. They have spilt their code and now it’s in the hands of everybody.

    Tanya Janca

    So I would say yes to that part. So I’ve written two books and my second book came out last year and it is barely sold. And the theory is, is because Claude and all the other AIs just give you all the answers. When you go and you Google something now, it’ll just tell you the smart thing that Tanya said, but it doesn’t say Tanya said it.

    Tanya Janca

    And so before people would Google things and it’d be “oh, you wanna know what pushing left is, or you wanna know what security drift is, or whatever the many things that I have defined throughout my entire career.” And then instead of it bringing you to the blog post where I’ll explain that to you, it now just tells you the answer. No. So there’s a place where I write articles for them that I’m not gonna name ’cause I like them. And I used to write articles for them and they’d get a couple hundred thousand reads, and now they’re getting 2,000 reads. It’s that different because the AI reads it and then now it knows everything Tanya just spent weeks researching to write that article. And so this is a huge problem for those of us that do research and release research because immediately it’s taken from us. It sucks.

    Graham Cluley

    Yeah.

    Tanya Janca

    I know we’re supposed to do one article, but I wanted to do two because they’re related. So Anthropic also announced but did not publicly release a new model called Mythos. And what Mythos does, it’s quite dangerous. So it finds vulnerabilities in applications and chains them together into exploits. And it has been finding novel new kinds of things that humans haven’t been able to find before. And it’s been finding them so terribly fast. It’s absolutely completely terrifying. So for instance, they found, I can’t even remember just how many bugs in OpenSSL, but Heartbleed level terrifying bugs. For those of you that don’t know, Heartbleed was a bug found in OpenSSL where you could just send a specially crafted call and then it would just tell you all the secret sauce.

    Graham Cluley

    Yeah, it would spit back what should have been confidential encrypted information, things which no one should ever have been able to see.

    Tanya Janca

    And Anthropic, they’re not publicly releasing it. They’re just working with a couple trusted organizations for now. But they’ve openly admitted that they can’t fully control it or understand it. And I would really not want to see Mythos on the internet.

    Graham Cluley

    Oh, okay. So let’s just backtrack for one second. So we’ve got this company Anthropic, which has just goofed up. They called it a human error. They said it was a release packaging issue rather than a security breach. And they’re saying, oh, it doesn’t matter because no customer data or credentials were involved. And technically that’s right. It’s their code. It’s not somebody else’s. But, you know, they were leaking their source code. They were careless.

    Tanya Janca

    It’s still a data spill. It’s their data and they spilled it and it was private, confidential data that’s high value.

    Graham Cluley

    Yeah. And meanwhile, they’ve just publicized this new technology they’ve built called Mythos, which can do something which could be very useful for many people in terms of securing their systems, because it can find vulnerabilities and you could find flaws in software and you could hopefully patch them and fix those bugs. But if that fell into the wrong hands, if they had a release packaging issue and they spilt it out like they’ve just spilt out something, that’s horrendous because anybody could use something like Mythos to hack all kinds of systems and software, couldn’t they?

    Graham Cluley

    And there have been AI-powered bug hunting solutions in the past. I mean, I believe if you look at the HackerOne league table right now, the number one bug hunter is an AI-powered bug hunting solution at the moment.

    Graham Cluley

    But the other thing which worries me is that, okay, so Anthropic has had this data spill. We’re worried that maybe it could happen with Mythos as well. Potentially it could. The thing which I think changes the story a bit, this isn’t even the first time Anthropic has had a data leak this. I mean, earlier versions of the same package in 2025 also shipped with full source maps before being pulled. So this isn’t a one-off slip. It seems to almost be a pattern which has happened. And who’s to say it couldn’t happen again? And maybe it could happen with Mythos.

    Tanya Janca

    You know what, Graham? I had no idea that they’d previously accidentally leaked their map. Oh my gosh. This is completely shocking. I don’t mean to sound insulting, but I can’t believe that they could make the same mistake again, right? Because that would be so painful the first time.

    Graham Cluley

    So Anthropic says this is a human error. But should it be possible for a single human error to publish source code that should never have been made public? Is that a process failure? Is it a tooling failure? Do we just have to sort of shrug and say, oh well, that’s life, these things happen?

    Tanya Janca

    So first of all, in Git, so Git is a tool that you can use to hold your source code and take care of it and manage it and store it. There’s this setting that you can do called .gitignore, and you list all of these files to say basically no matter what I say, don’t upload this.

    Graham Cluley

    Yes. Override my own stupidity. Yes.

    Tanya Janca

    Yeah, exactly. And I take advantage of that all the time. So there should be a default for every org and it should include those map files. So that’s step one is that we want to have the ignore file things set up properly. And then we always know we’re not supposed to have debug mode in production, right? So, we know that we should have on the build server these settings turned off. And so basically this is like security misconfiguration happening twice, which is on the new OWASP Top 10 2025, as a top risk to web apps. Basically, they didn’t configure the build server correctly and then they didn’t configure Git correctly. And then they don’t have a process or a checklist to check that. So I would love to see those three things. I teach supply chain security. I’m expanding and expanding that class all the time because there’s more and more that we’re doing wrong there. And I feel like if organizations had a checklist and they had, you know, a hardening of these things that they’re using that are part of their supply chain, like we talked about earlier, if we properly hardened our build server. So, the CI/CD and build server, those are usually synonymous. They’re usually the same thing. Or you have a build server and then you have a pipeline and you connect the two, but usually, it’s all one big thing. And so, if we were properly hardening that, if we’re checking it at least once a year, if we analyzed who, you know, there’s an alert. Oh my gosh, there’s a new administrator.

    Tanya Janca

    Who’s that? Why do we have a new administrator? We could do a lot better. So, it is a human error, but the human error happened because we didn’t have processes to protect that human from making that error. And I don’t like to blame Alice or Bob. I like to look at, no, but did we train Alice or Bob on this? Did we? Right? Did we have a safeguard to stop them from making this error? Did we have a policy? Or do we just assume they knew? Because when we assume, we’re let down a lot.

    Graham Cluley

    So what we have here, Tanya, is an AI company which has leaked the source code of its AI coding assistant. Via a packaging mistake, which is kind of ironic. I’m going to give you a little bit of silver lining on the cloud, right? Because this has all been a bit depressing.

    Tanya Janca

    Okay. But we don’t know that.

    Graham Cluley

    That’s true, actually. That is true.

    Tanya Janca

    Right? Have you heard this term dark factory?

    Graham Cluley

    Oh, hello.

    Tanya Janca

    So we don’t know if Anthropic is becoming a dark factory. So in manufacturing, it means we just have robots, so we don’t need lights. But there’s software dark factories being built now where you don’t have a single software developer anymore, and literally every single part is only written by the AI. And wouldn’t you think the AI company might be most likely to do something like that? I don’t know.

    Graham Cluley

    Well, thank you very much, Tanya. There I was trying to be optimistic and cheer everybody up, and you’ve just made it all doomy and gloomy again. Great. That’s great. Thank you.

    Joe

    This episode of Smashing Security is brought to you with support from CoreView.

    Graham Cluley

    Now, Joe, quick question. If someone broke into your Microsoft 365 tenant right now and quietly disabled your conditional access policies, grabbed global admin rights, turned off Defender, would you even notice?

    Joe

    I’d like to say yes.

    Graham Cluley

    Well, that’s the spirit, Joe. Good job. But here’s the uncomfortable reality. 63% of Microsoft 365 tenants hand out admin rights not that they’re going out of fashion. One compromised account and an attacker can quietly reshape your entire tenant. No alerts, no noise, just someone systematically dismantling your defenses while you’re none the wiser.

    Joe

    So wait, restore from backup doesn’t fix that?

    Graham Cluley

    No, no, no. Backups protect your data. They don’t restore tenant-level configurations. There’s no native rollback for that. You could be rebuilding your tenant settings from scratch for weeks.

    Joe

    And who’s doing that?

    Graham Cluley

    Exactly. Who wants to do that? Well, CoreView have written a white paper called Total Tenant Takeover: The Microsoft 365 Disaster No One’s Ready For. It’s actually a really practical read. It covers how these attacks unfold step by step, where your existing tools are leaving gaps, and what it actually takes to recover control once it’s been lost.

    Joe

    So less detect and panic, more here’s how to actually get your tenant back.

    Graham Cluley

    That’s it. Exactly. And you can download this paper for free right now. You can learn more at smashingsecurity.com/coreview and maybe do it before someone else does something bad to your organization.

    Joe

    That’s smashingsecurity.com/coreview. And thanks to CoreView for supporting the show.

    Tanya Janca

    And welcome back.

    Graham Cluley

    And you join us for our favorite part of the show, the part of the show that we like to call pickpocketing. Pick of the Week.

    Tanya Janca

    Pick of the Week.

    Graham Cluley

    Pick of the Week is the part of the show where everyone chooses something they like. Could be a funny story, a book that they’ve read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish. It doesn’t have to be security related necessarily. Well, my Pick of the Week this week is actually security related. In fact, my Pick of the Week this week, and this is gonna get very, very meta, not in a Mark Zuckerberg kind of way, because my pick of the week this week is actually about the Smashing Security podcast, because I’ve been busy doing a bit of vibe coding. I know, very dangerous. I’ve been exploring the world of podcast transcripts, ladies and gentlemen. I think it must have been about 9 years ago when I first got an email from a listener saying, why don’t you have a transcript? I’d much rather read rather than listen to you. And I said, well, you know, it’s very hard putting together a transcript. I’d be up all hours typing my nonsensical words into a word processor. Or I’d get some computer system to try and transcribe me into written English. And, you know, the quality is going to be diabolical anyway. After quite a lot of work involving largely pipe cleaners and pots of treacle, bicycle chains, I have got together a Heath Robinson-type solution which now has, I believe, acceptable transcripts for this show. Now, my podcast host, does create automated transcripts. So if you go into your favorite podcast app at the moment and look at transcripts, if it supports that, you will see a very, very bad transcript of the show. My intention is to replace all of those. And if you go to my website or to the Smashing Security website right now, you will find a much better transcript. And in fact, it will even display the words as they are being said. So you can read as you are listening I think it works reasonably well most of the time. Sometimes it makes a mistake, for goodness’ sake. Yes, I know. Sometimes it will mix up my name with someone else’s or something will go wrong. But most of the time, I think it’s pretty darn impressive. So my pick of the week, rather self-referentially, is the new transcripts on the Smashing Security podcast. Go to smashingsecurity.com or go and check out my articles on Graham Cluley.com. And you will be able to see the transcripts in all of their glory there and tell me that it doesn’t work. And then I’ll have to try and work out what the code’s doing and try and fix it. Cool. That is my pick of the week.

    Tanya Janca

    I your pick of the week, Graham.

    Graham Cluley

    Thank you very much.

    Tanya Janca

    That was awesome. Well done.

    Graham Cluley

    Do you have a pick of the week, Tanya?

    Tanya Janca

    I do. So my pick of the week is a television show on Apple TV called Shrinking. And it is about three psychologists that are friends that are all grieving because one of the psychologists, his wife died. And it shows how he grieves, how his daughter grieves, how the two other psychologists grieve. And they teach all these different psychology lessons essentially in the show. And last year I did a talk about the psychology of bad code and applying economic behavior types of concepts to our security programs. And how if we do that, we can get better results. ‘Cause just yelling at software developers actually doesn’t improve code quality at all, as it turns out. Just being mean to them doesn’t work. We’ve tried that for two decades. So, I was what if instead we did something different?

    Graham Cluley

    Have you tried the old cricket bat trick of taking a cricket bat and just bopping them on the back of the head? Does that help at all?

    Tanya Janca

    My old boss was have you tried violence, Tanya? And I was no, I haven’t. And he’s you’re not really trying to problem solve at all, are you?

    Graham Cluley

    Oh, so I’ve just realized why your show is called Shrinking because of—

    Tanya Janca

    It shrinks. Yeah.

    Graham Cluley

    I’m so stupid sometimes. It’s taken me this long to work it out. Okay.

    Tanya Janca

    No, but so I’m fascinated by the reason that people do things and why people react the way they do. I’ve always been really curious about things like that. And so also so that I could get better results, right? If someone blows up at me, it’s like, why did they blow up at me? And often it’s not because of something I did. It’s because they feel insecure or afraid or whatever.

    Tanya Janca

    And so in the show, they’re always explaining these different concepts and I keep seeing them pop up in my life, whether it be at work or personally. And so most shows aren’t very educational, Graham. Most of them are kind of garbage.

    Graham Cluley

    Oh, really? I’d never noticed. I’ve just been watching Married at First Sight Australia. So I thought all of them were really high quality, personally.

    Tanya Janca

    But so this one teaches lots of psychology lessons and why people do the things they do, but in an entertaining way. So I don’t know, I like that. I think if people are curious about, you know, why people do the things they do, they might like this.

    Graham Cluley

    And is this a drama or a documentary? What is it?

    Tanya Janca

    So it’s sort of a drama and it’s sort of a comedy. So I think they call them dramedies.

    Graham Cluley

    I think that’s what you call a one-humped camel, actually. So anyway, yes, carry on. So a dromedary, right?

    Tanya Janca

    Basically, there’s a bunch of parts that are sad, and then there’s a bunch of parts that are funny. And so I think they call it a drama comedy, which they literally put on Apple TV, Dramedy.

    Graham Cluley

    Oh, I don’t know if I like that word. Yeah. I’m not so sure about that.

    Tanya Janca

    You’re like, no, I do not accept.

    Graham Cluley

    Anyway. Okay. So your pick of the week is the TV show Shrinking.

    Graham Cluley

    Well, that just about wraps up the show for this week. Thank you so much, Tanya, for joining us. I think you’ve been absolutely smashing. I’m sure lots of our listeners would love to find out what you’re up to and follow you online or listen to your podcast, of course. What’s the best way to do that?

    Graham Cluley

    Yes, that’s what we need more of, is more memes.

    Graham Cluley

    That and emojis and animated GIFs. And of course, Smashing Security is on social media as well. You can find me, Graham Cluley, on LinkedIn, or you can follow Smashing Security on Reddit or Bluesky or Mastodon. And don’t forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts for episode show notes, sponsorship info, guest lists, and the entire back catalog of 463 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye.

    Tanya Janca

    Bye. You’ve been listening to Smashing Security with me, Graham Cluley, and I’m very grateful to Tanya for joining us this week and this episode’s sponsors, CoreView, Vanta, and Meta. And of course, to all of our fabulous supporters via Patreon.



    Source link

    built Cluley Code Company Graham Leaked terrifying
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Bringing Rust to the Pixel Baseband

    April 15, 2026

    Microsoft adds Windows protections for malicious Remote Desktop files

    April 15, 2026

    ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers

    April 14, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Spin Torque Nano-Oscillators with Tilted Magnetic Anisotropy

    April 16, 2026

    This AI company leaked its own code. It’s also built something terrifying • Graham Cluley

    April 16, 2026

    MuleSoft Agent Fabric adds new ways to keep AI agents in line

    April 16, 2026

    Apple’s Worldwide Developers Conference returns the week of June 8

    April 16, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Spin Torque Nano-Oscillators with Tilted Magnetic Anisotropy

    April 16, 2026

    This AI company leaked its own code. It’s also built something terrifying • Graham Cluley

    April 16, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.