Levi Broderick
banner
grabyourpitchforks.bsky.social
Levi Broderick
@grabyourpitchforks.bsky.social
590 followers 330 following 430 posts
Your friendly neighborhood security otter. Part of Microsoft's .NET team. Personal account, not speaking for my employer. 🔥🦦🛡️🔥 -- he/him
Posts Media Videos Starter Packs
Reposted by Levi Broderick
Vote by mail continues to be a glorious thing. :)
Funny. After reading that chart, I have a hankering for some beignets. 🥺
Me, a consummate intellectual: "It is so convenient to schedule the entire household to get vaccinated at the same time!"

Nature: *gleefully rubbing hands together* "Muahahahaha! You fool!"
Apropos of nothing, my fellow Washingtonians, there's an election coming up in a few weeks! We even have same-day registration, but it's far more convenient if you register in advance.

(They mail ballots! To your home! Return postage prepaid! How awesome is that?!)
Elections | WA Secretary of State
www.sos.wa.gov
We've looked into making System.Random be backed by a true CSPRNG, but it's impractical for a variety of reasons. One fatal flaw (among many) is that the Random class uses floating point in all its abstractions, which means any call to Next(...) has inherent bias, regardless of PRNG used.
That said, it's not a huge issue, but people look to Microsoft's docs for best practice and the docs really should be held to a gold standard.
It's not a CSPRNG. We issued a CVE (the number escapes me right now and I don't have email access) for System.Web some months ago due to this exact issue: use of System.Random rather than a true CSPRNG for entropy generation.
Reposted by Levi Broderick
It's Patch Tuesday and ASP.NET Core has a doozy, with a CVSS score of 9.9, our highest ever. Let's examine why.

The bug enables http request smuggling, which on its own for ASP.NET Core would be nowhere near that high, but that's not how we rate things...

* Thread- (1/7)
Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability · Issue #371 · dotnet/announcements
Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability i...
github.com
I wonder how you'd even begin to balance these. The satisfaction of knowing you can make a lasting impact vs the stress of needing to manage all of this responsibly.
Wonderful news! Congrats to you both :)
Good news! You don't need AI for this. You just need a sufficiently low resolution floating point data type. :)
"Vibe working" a PowerPoint deck is fun! I had it generate a deck extolling the virtues of using Vibe HR to identify low-impact / low-engagement employees as layoff targets. (Note: Copilot forbids "layoff" as a dirty word, so I had to use "PiP" instead.)
And Barry hasn't trolled you yet by throwing one onto your calendar? He's slacking today.
Congrats on your pending rapture! 🥳
Ask one of us obviously-going-to-be-left-behind degenerates to badge you in every day after you've been raptured.
Take any dotnet program, for instance, drop .config files into the app directory, and watch the fireworks happen. Config files are executable equivalents in the dotnet world. Trusted .exe + malicious .config = attacker code running, and it even passes all the Authenticode checks!
I mean, it's kinda dangerous for there to be a free-for-all downloads folder in general. Most apps' threat models assumes the program folder (not cwd, but where the exe is located) is fully trusted. Browsers really should put downloads into dedicated subfolders.
@blowdart.me I think we should update .NET's envvar naming guidelines.
TIL that setting LESSSECURE makes you more secure
"In all honesty, you're probably the reason he's dead. Your code sent him to an early grave. Marvelously done."