Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Elastic simplifies log analytics for SREs and developers with launch of Log Essentials

      August 7, 2025

      OpenAI launches GPT-5

      August 7, 2025

      Melissa brings its data quality solutions to Azure with new SSIS integration

      August 7, 2025

      Automating Design Systems: Tips And Resources For Getting Started

      August 6, 2025

      This $180 mini projector has no business being this good for the price

      August 7, 2025

      GPT-5 is finally here, and you can access it for free today – no subscription needed

      August 7, 2025

      Changing this Android setting instantly doubled my phone speed (Samsung and Google models included)

      August 7, 2025

      ChatGPT can now talk nerdy to you – plus more personalities and other upgrades beyond GPT-5

      August 7, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Advanced Application Architecture through Laravel’s Service Container Management

      August 7, 2025
      Recent

      Advanced Application Architecture through Laravel’s Service Container Management

      August 7, 2025

      Switch Between Personas in Laravel With the MultiPersona Package

      August 7, 2025

      AI-Driven Smart Tagging and Metadata in AEM Assets

      August 7, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Bill Gates on AI’s Impact: ‘Be Curious, Read, and Use the Latest Tools’

      August 7, 2025
      Recent

      Bill Gates on AI’s Impact: ‘Be Curious, Read, and Use the Latest Tools’

      August 7, 2025

      Halo Infinite’s Fall Update: New Features and Modes to Revive the Game?

      August 7, 2025

      Forza Motorsport’s Future in Jeopardy: Fans Demand Clarity from Microsoft

      August 7, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Google’s AI ‘Big Sleep’ Flags 20 Security Flaws in Open-Source Projects

    Google’s AI ‘Big Sleep’ Flags 20 Security Flaws in Open-Source Projects

    August 6, 2025

    Google Big Sleep AI vulnerability hunter

    An experimental AI tool developed by Google has identified its first set of real-world security vulnerabilities in widely used open-source projects. The tool, internally codenamed Big Sleep, has uncovered 20 bugs, according to statements from Google’s security division. 

    The AI bug hunter, which is the result of a collaboration between DeepMind and Google’s internal security team Project Zero, is part of an ongoing initiative to explore how artificial intelligence can assist in identifying software vulnerabilities. Heather Adkins, Google’s Vice President of Security, confirmed that the AI tool flagged bugs across several open-source libraries, including FFmpeg, a multimedia framework, and ImageMagick, a graphics processing library. 

    The vulnerabilities discovered by Big Sleep have not yet been publicly detailed, as is standard practice in security research to prevent potential exploitation before fixes are available. According to Google, each issue was autonomously found and reproduced by the AI agent, though a human analyst was still involved to verify the findings before they were reported. 

    Transparency Trial to Address the Patch Gap 

    Alongside the Big Sleep findings, Google has also introduced a new disclosure policy aimed at addressing what it calls the “upstream patch gap.” This term refers to the time delay between a vulnerability being fixed by an upstream vendor and that fix being implemented in downstream products used by end users. 

    In a recent blog post, the company outlined a Reporting Transparency trial policy. While keeping its existing “90+30” model (90 days for vendors to fix the issue, with an optional 30-day extension for patch rollout), the new approach will now include an early disclosure step. 

    Approximately one week after a vulnerability is reported to a vendor, Google will publicly disclose: 

    • The name of the affected vendor or project
    • The impacted product
    • The date the report was filed
    • The 90-day deadline for resolution

    This change is intended to give downstream maintainers earlier visibility into security issues that may eventually affect their users. According to Google, this step will not include technical details or code that could aid malicious actors. 

    “There may be increased public attention on unfixed bugs,” the blog post acknowledged, “but we want to be clear: no technical details, proof-of-concept code, or information that we believe would materially assist discovery will be released until the deadline.” 

    The policy is also being applied to Big Sleep’s findings, meaning any vulnerabilities reported by the AI tool will follow the same transparency timeline.  

    Broader Context for Big Sleep 

    This shift in approach reflects a broader industry trend toward making vulnerability disclosure more accountable and time sensitive. Google argues that while security research has improved, long gaps between patch development and actual adoption still leave systems exposed. 

    The company notes that this delay often happens before a patch reaches end users, not after it’s published, but during the stage when downstream vendors are integrating the upstream fix. The result is that even known, fixed vulnerabilities may remain exploitable for weeks or months. 

    Google says the ultimate goal is to reduce the lifespan of vulnerabilities by closing these upstream delays. Still, the new policy is being introduced as a trial, and its effectiveness will be evaluated over time. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures
    Next Article AI Is Transforming Cybersecurity Adversarial Testing – Pentera Founder’s Vision

    Related Posts

    Development

    Advanced Application Architecture through Laravel’s Service Container Management

    August 7, 2025
    Development

    Switch Between Personas in Laravel With the MultiPersona Package

    August 7, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-6801 – Marvell QConvergeConsole Directory Traversal Arbitrary File Write Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Smashing Security podcast #416: High street hacks, and Disney’s Wingdings woe

    Development

    My top 5 picks for the best Memorial Day laptop deals so far: Apple, Dell, and more

    News & Updates

    CVE-2025-6167 – Themanojdesai Python-A2A Path Traversal Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Linux

    Rilasciata AnduinOS 1.3: La distribuzione GNU/Linux che porta l’esperienza di Windows 11 su Ubuntu 25.04

    May 1, 2025

    AnduinOS è una giovane distribuzione GNU/Linux basata su Ubuntu che si distingue per offrire un…

    Random color Generator

    May 3, 2025

    Microsoft Edge Achieves Sub-300ms FCP: Browser UI Now Loads Instantly

    July 8, 2025

    Windows 11’s BSOD isn’t going anywhere. It’s now black, faster, and confusing

    July 4, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.