AI Is Breaking the Two Vulnerability Cultures: Coordinated Disclosure vs. Linux's "Bugs Are Bugs"

Jeff Kaufman's post "AI Is Breaking Two Vulnerability Cultures" examines the tension between coordinated disclosure and Linux's "bugs are bugs" approach, accelerated by AI. The Copy Fail vulnerability (reported May 2026) illustrates the breakdown: Hyunwoo Kim followed standard Linux procedure — privately sharing with a closed list of security engineers while fixing quietly in the open. But someone noticed the diff, realized the security implications, and went public immediately, ending the embargo.
The Two Cultures
- Coordinated disclosure: Report privately, give maintainers ~90 days to fix. Goal: patch before public knows. But with AI-assisted scanning, independent rediscovery is common — in this case, just 9 hours after Kim's report, Kuan-Ting Chen independently found the same bug.
- Linux "bugs are bugs": Fix fast without drawing attention. The argument: if the kernel does something wrong, someone may weaponize it. But as AI gets good at finding vulnerabilities, the signal-to-noise ratio of commits rises, making examination more attractive and cheaper.
Why AI Changes Everything
Kaufman tested three AI models on the fix (f4c50a403): Gemini 3.1 Pro, ChatGPT-Thinking 5.5, and Claude Opus 4.7 all identified it as a security patch instantly. Even with just the diff (no context), Gemini was sure, GPT probable, Claude probable. This means embargoes — even short ones — are increasingly fragile: defenders can use AI too, but attackers can scan commits faster.
Kaufman suggests very short embargoes (and shortening further over time) as a pragmatic response, leveraging AI to accelerate defenders. Long embargoes create a false sense of non-urgency and limit who can work on fixes.
Read the full post for deeper analysis and the specific prompt Kaufman used for testing.
📖 Read the full source: HN AI Agents
👀 See Also

Smart Bash Permission Hook for Claude Code Prevents Compound Command Bypass
A Python PreToolUse hook addresses a security gap in Claude Code's permission system where compound bash commands could bypass allow/deny patterns. The script decomposes commands into sub-commands and checks each individually against existing permission rules.

Critical RCE vulnerability in protobuf.js library
A critical remote code execution vulnerability in protobuf.js versions 8.0.0/7.5.4 and lower allows JavaScript code execution through malicious schemas. Patches are available in versions 8.0.1 and 7.5.5.

Bitwarden Agent Access SDK integrates with OneCLI for secure credential injection
Bitwarden's new Agent Access SDK enables AI agents to access credentials from Bitwarden's vault with human approval, while OneCLI acts as a gateway that injects credentials at the network layer without exposing raw values to agents.

AI Agent Guardrails Decay Over Time Without Active Maintenance
AI agent guardrails degrade over time as system prompts accumulate updates, model versions change, and new tools are added, often resulting in contradictory or ignored safety rules that require regular review and testing.