5/15/2026 at 1:29:32 PM
Whenever one of these vulnerability apocalypse posts comes along I cannot help but think of the Litany of Gendlin: What is true is already so.
Owning up to it doesn't make it worse.
Not being open about it doesn't make it go away.
And because it's true, it is what is there to be interacted with.
Anything untrue isn't there to be lived.
People can stand what is true,
for they are already enduring it.
I cannot wrap my mind around why people think finding vulnerabilities is bad. The code already was broken before somebody published the vulnerability. The difference now only is that you know about this.Imagine somebody finding a flaw in a mathematical proof and everybody being sad because a beautiful proof got invalidated rather than being glad future work won't build on flawed assumptions.
I get that the rate of vulnerability discovery can be a burden, especially for people doing FOSS in their spare time, but the sustainability problem with that has always existed and only gets exacerbated by the vulnerability stuff, but the latter isn't the cause you need to make go away.
by ahlCVA
5/15/2026 at 2:18:39 PM
To address this framing directly: "a bug exists" is a different truth/state of the world than "the bug is known to exist", and that's also very different from "this bug exists and an exploit is readily available". So the transmission of information about the bugs does change the state of the world, and requires action.by _alternator_
5/15/2026 at 4:45:28 PM
There are actually three states:- A bug exists and nobody knows
- A bug exists and some people know
- A bug exists and everyone knows
As an outside observer, there is no way for you to determine if a bug is in state one or two, you only know once it's in the third state.
Which is the entire problem here. Having the bug be known to everyone is a vastly improved state over being known to a few. Yes, the bug being completely unknown is better than being known to a few, but there is no way to ever know if that's the case.
From the outside, known to none and known to a few are indistinguishable, and thus both states are the worst possible case. The only remedy is to make the bug known to everyone such that it cannot be covertly exploited.
by graceful6800
5/15/2026 at 6:25:14 PM
That's not the whole picture though. Bugs exist anyway. The only practical concern is, which are practically most likely going to be used among all these bugs that yes exist and included in production.by psychoslave
5/15/2026 at 8:30:40 PM
You've described states one and two as outlined above.Whether a bug is exploitable is an entirely separate category of unknowable, because seemingly-innocuous bugs quite often have very deep and very subtle implications that when combined with another innocuous bug, result in an RCE or PE.
Therefore, it's sensible to treat all bugs as potential threat vectors unless and until proven otherwise. Which brings us full circle: state 3, all bugs being public, is probably the safest thing because nobody can know if a bug is in state 1 or 2.
by graceful6800
5/16/2026 at 4:08:46 PM
It's sensible just as it's sensible to have invulnerable immune system.Sure, who wouldn't like to have that? Such a thing is impossible to reach starting with the same reason as Gödel's incompleteness theorem is a thing, plus a gazillion of more practical constraints.
by psychoslave
5/15/2026 at 4:06:15 PM
A bug existing or not for a person is a statement about that person's knowledge of the bug.Is your assertion that, since you specifically didn't know about the bugs that nobody, not in Russia or anywhere else did?
Obviously if bugs are out there existing in software and you don't know about them, or the CVE system doesn't know about them, or whatever ... this does not preclude bad guys from knowing about them. In the era of agents, knowing the bug exists is equivalent to having a PoC, so the distinction completely collapses.
by ctoth
5/15/2026 at 5:12:53 PM
Arguably, the transition goes from - this bug exists but vendors ignore it because only criminals and intelligence agencies know about it to, this bug is publicly embarassing lets fix it right away.Sweeping things under the rug is how we get insecurity. Sunshine is the best disinfectant.
by bawolff
5/15/2026 at 3:05:49 PM
> Imagine somebody finding a flaw in a mathematical proof and everybody being sad because a beautiful proof got invalidated rather than being glad future work won't build on flawed assumptions.Is this supposed to be hard to imagine? I can completely imagine this, especially if the mathematician is a celebrity in their field.
by ambicapter
5/15/2026 at 2:57:31 PM
In theory, the vulnerability was always there, and it's better to find out than not find out.In practice, how much effort it is to find vulnerabilities matters a lot. We're in a time where things that used to be quite hard are now easy and the rate of discovery will change.
This rate of discovery matters a lot -- for OSS maintainer burnout if nothing else.
by salsakran
5/15/2026 at 3:43:43 PM
It matters in a positive sense; it's a thing that enables you to make some predictions about the state of the world tomorrow. It does not matter in a normative sense; OSS maintainer burnout is strictly a less important concern than software security, which is an externality of software development.by tptacek
5/15/2026 at 3:51:32 PM
> OSS maintainer burnout is strictly a less important concern than software security,Burnout means that no more fixes come - ever - and that things sit vulnerable until everyone relying on that tool takes the time to build and switch to a replacement.
Maintainer burnout is perhaps the single biggest threat to the ecosystem right now.
by Arainach
5/15/2026 at 3:54:16 PM
That can't possibly be an argument for forbearing security vulnerabilities in software. It's an argument for prioritizing hypothetical flaws over real ones.by tptacek
5/15/2026 at 5:20:12 PM
If these flaws are so important, users of open source (business or individual) need to pay up - literally. Pay the maintainers enough to justify spending the time on these things, including the opportunity cost of not working at other software jobs during that time.Pay each maintainer an absolute minimum of $200K a year or shut up and do the work yourself - in a fork if necessary.
by Arainach
5/16/2026 at 6:06:44 AM
This comment should not be greyed out. I feel that we all forget this far too much. You've exaggerated it somewhat.There is no right to demand someone does something for free, and we have gotten dependent on people doing things for free. We don't have to pay people but if we don't want to, then we have to be willing to do it ourselves. Otherwise it could go away at any moment and we have no recourse.
by chadgpt3
5/15/2026 at 4:06:01 PM
Stated differently -- the way OSS software is currently maintained and users are conditioned to behave, there is a capacity problem if the rate of discovery surges too sharply.And if the capacity is overshot (which I believe is happening as we speak), users end up in extended states of being insecure.
I'm also one of the unwashed rabble who believes there is a large practical difference between a vulnerability that exists but isn't found and one that is widely known and exploitable.
by salsakran
5/15/2026 at 4:18:15 PM
There's two fallacious arguments encoded here. The first is obvious, that we should prioritize hypothetical future vulnerabilities and fixes over ones we know exist today. The second is subtler and more insidious: it's the idea that the goal of software is to ensure every package and project is viable, that everyone who wants to deploy it should be able to do so. The risks this attitude pose to users, ordinary people who have no agency over which software packages you use to serve their needs, are a pure externality. The idea that a project serving real human users might opt to compromise availability rather than putting people at risk is never even broached.by tptacek
5/16/2026 at 4:39:25 PM
If the maintainers burn out, nobody's going to be making your software secure.by 48terry
5/16/2026 at 4:43:54 PM
Then people will stop using that software.by tptacek
5/16/2026 at 5:52:02 PM
This is so far outside of reality that I can't believe I'm even commenting on it.If you believe people don't use software that is unmaintained and hilariously out of date I genuinely don't know what world you live in or how to deliver the bad news to you.
by 48terry
5/16/2026 at 6:31:01 PM
Oh, I agree that today there's a general expectation that externalized security doesn't matter and someone will always come around to rescue you (and your unmaintained dependency) from disaster. I'm just saying: infinite free bugs is likely to disrupt that equilibrium.by tptacek
5/15/2026 at 7:37:52 PM
> I cannot wrap my mind around why people think finding vulnerabilities is bad. The code already was broken before somebody published the vulnerability. The difference now only is that you know about this.I don't think anyone is saying that here.
I think the net result is "wow, we're going to end up a lot more secure in several months, but things are going to feel sucky because stuff just got A) way easier for the average bad guy, and B) way busier on the fixing side."
I think it's likely we end up with an equilibrium with a lower rate of bug discovery than we're used to, but we need to experience an above average rate for a long while first...
by mlyle
5/15/2026 at 5:24:55 PM
> The code already was broken before somebody published the vulnerability. The difference now only is that you know about this.The philosophy in this subthread may be too deep for me.
Me and the Jedi at the ends of the bell curve are just thinking "It's bad when your attackers know your code is vulnerable"
by ajross
5/17/2026 at 2:31:19 AM
as a jedi you’re surely wise enough to understand that closed source has just as many vulnerabilities if not more.open source will get fixed while closed will not.
by toofy
5/16/2026 at 3:22:53 PM
Humans are famously rational and ego-less.by nbf_1995
5/15/2026 at 2:07:29 PM
The vulnerability looks like a failure on the dev team's part.The patching cycle can become a problem for certain operations / industries.
Everybody hates the work, and security is often seen as a barrier and a cost center, not a driver or revenue.
by esseph
5/15/2026 at 1:46:18 PM
> I cannot wrap my mind around why people think finding vulnerabilities is bad. The code already was broken before somebody published the vulnerability. The difference now only is that you know about this.Try binge-watching old Star Trek episodes, to see how Spock deals with the illogical 99.9% of humanity?
by bell-cot