1. LLMs excel at exploit generation due to clear success metrics but struggle with subjective tasks like bug reporting.
The discussion notes that exploit development has a verifiable goal (e.g., executing a shell), allowing LLM agents to iterate without human intervention, while bug reporting requires triage and is prone to low-quality, unverified submissions.
- "An exploit tends to involve building a capability to allow you to do something you shouldnโt be able to do. If, after running the exploit, you can do that thing, then youโve won." - moyix
- "LLMs produce good output and bad output. The trick is figuring out which is which. They excel at tasks where good output is easily distinguished." - wat10000
- "Both are true. Exploits are a very narrow problem with unambiguous success metrics. While also naturally complementing the ingrained persistence of LLMs. Bug reports are much more fuzzy by comparison..." - GoatInGrey
2. Human expertise remains crucial for setup, verification, and interpreting results, challenging claims of full automation.
Despite claims of "industrialisation" where agents work without humans, many argue that human skill is essential for designing the experiment, setting up the environment, and ensuring the verifier is accurate, making the process not truly autonomous.
- "My expectation is that any organization that attempts this will need subject matter experts to both setup and run the swarm of exploit finding agents for them." - simonw
- "You need an objective criterion you can use as a success metric. 'Design of verifiers' is a specific form of domain expertise." - adw
- "The people sending useless bug reports aren't checking for good output." - wat10000
3. The asymmetry favors attackers, as they only need to find one exploit to succeed, while defenders must secure the entire system.
This dynamic is exacerbated by LLMs, which allow attackers to find vulnerabilities at scale with minimal cost. Defenders face the impossible task of fixing all potential issues, making the security landscape increasingly challenging for them.
- "If the offender runs these tools, then any bug they find becomes a cyberweapon. If the defender runs these tools, they will not thwart the offender unless they find and fix all of the bugs." - pizlonator
- "The defensive side needs everything to go right, all the time. The offensive side only needs something to go wrong once." - digdugdirk
- "The only guaranteed winner is the LLM companies, who get to sell tokens to both sides." - pixl97