this post was submitted on 16 May 2026
65 points (92.2% liked)

Ye Power Trippin' Bastards

1766 readers
123 users here now

This is a community in the spirit of "Am I The Asshole" where people can post their own bans from lemmy or reddit or whatever and get some feedback from others whether the ban was justified or not.

Sometimes one just wants to be able to challenge the arguments some mod made and this could be the place for that.


Posting Guidelines

All posts should follow this basic structure:

  1. Which mods/admins were being Power Tripping Bastards?
  2. What sanction did they impose (e.g. community ban, instance ban, removed comment)?
  3. Provide a screenshot of the relevant modlog entry (don’t de-obfuscate mod names).
  4. Provide a screenshot and explanation of the cause of the sanction (e.g. the post/comment that was removed, or got you banned).
  5. Explain why you think its unfair and how you would like the situation to be remedied.

Rules


Expect to receive feedback about your posts, they might even be negative.

Make sure you follow this instance's code of conduct. In other words we won't allow bellyaching about being sanctioned for hate speech or bigotry.

YPTB matrix channel: For real-time discussions about bastards or to appeal mod actions in YPTB itself.


Some acronyms you might see.


Relevant comms

founded 2 years ago
MODERATORS
 
  1. Which mods/admins were being Power Tripping Bastards?

Snoopy

  1. What sanction did they impose (e.g. community ban, instance ban, removed comment)?

Community ban

  1. Provide a screenshot of the relevant modlog entry (don't de-obfuscate mod names).

  1. Provide a screenshot and explanation of the cause of the sanction (e.g. the post/ comment that was removed, or got you banned).

I woke up to suddenly being banned with a dm that was misgendering me. It appears the real reason I was banned was due to fact I was critical of Piefed's recent actions.

Snoopy has no evidence that “I personally released the exploits into the wild" It was actually @yogthos@lemmy.ml who did the deed. I'm not technically enough to be pull it off, nor do I want to.

  1. Explain why you think it’s unfair and how you would like the situation to be remedied.

Hopefully unbanned and unblocked.

you are viewing a single comment's thread
view the rest of the comments
[–] alapakala@quokk.au 9 points 1 day ago* (last edited 1 day ago) (2 children)

but responsible disclosure usually involves informing the dev first, giving them a period of time to push out a patch and then publicly disclosing for the community to learn from.

This, assumes the vendor acts in good faith, which, as we have seen in the past few days, it hasn't been the case. Public disclosure was the appropriate course here, so it allows forks like Pievolution & PyLova the awareness to also take action on their derivative vulnerabilities.

Also good to report it to mitre and give it a CVE number.

I believe @yogthos@lemmy.ml purposely did not, to exemplify amateurs now have access to tools they should not, and WILL forgo proper standardized communication channels to disclose issues like these in the future. Unless you believe Mitre & CVE reporting will be taught in grade schools, this threat model is pretty realistic of what we should now come to expect. Not everyone is privileged enough to afford security courses, and standardized education.

[–] TechLich@lemmy.world 3 points 13 hours ago (1 children)

This, assumes the vendor acts in good faith

Responsible disclosure does not assume the vendor acts in good faith. Usually the disclosure period is around 90 days before the vulnerability is released, fixed or not (although this is negotiable with a good faith vendor).

Forks etc. could have been informed privately first too if possible.

amateurs now have access to tools they should not, and WILL forgo proper standardized communication channels to disclose issues

This is not a good argument. Undisclosed zero days in the wild have always been part of the threat model. Amateurs with LLMs or not, a large percentage of vulnerabilities are not disclosed responsibly and are only fixed after damage has been done. Putting people and their personal information at risk because you want to make a point about the dangers of zero days (which everyone is already aware of) is woefully unethical.

Not everyone is privileged enough to afford security courses, and standardized education.

That doesn't mean we should abandon these things. The vendor can report the CVE too. Or anyone else with an interest in it. It doesn't have to be the untrained amateur grey hat asking Claude for vulns. A malicious threat actor exploiting a system doesn't report it either. The community benefits from skilled people handling things properly. Pretending that it doesn't because most people don't have those skills is silly.

[–] alapakala@quokk.au 0 points 4 hours ago* (last edited 4 hours ago)

Responsible disclosure does not assume the vendor acts in good faith.

You’ve never been sued then.

Putting people and their personal information at risk because you want to make a point about the dangers of zero days (which everyone is already aware of) is woefully unethical.
Undisclosed zero days in the wild have always been part of the threat model.
a large percentage of vulnerabilities are not disclosed responsibly and are only fixed after damage has been done.
This is not a good argument.

Hopefully I don't need to demonstrate how this also isn't an argument that doesn't hold itself.

The community benefits from skilled people handling things properly.
A [skilled] malicious threat actor exploiting a system doesn’t report it either.

And unskilled people now have access to skilled tools that doesn't handle things properly…. It's not an argument people’s personal information is already at risk. It's an argument that the tools people now have access do not properly handle things. Maybe teach the people that developed claude mythos how to Mitre & CVE responsibly ╮(︶▽︶)╭

[–] yogthos@lemmy.ml 5 points 1 day ago (1 children)

As far as I know, piefed doesn't even have a cve process for submitting vulnerabilities. And I'd like to note that the two vulnerabilities I disclosed only affect the server admin in a sense that they allow the attacker to post content to the server and snoop around on available endpoints, but they don't expose any user information.

[–] TechLich@lemmy.world 1 points 12 hours ago (1 children)

They don't need to have one.

You can report it here: https://cveform.mitre.org/

Use the CNA-LR since I don't think they have a CNA.

You were probably trying to do the right thing disclosing, just know that there is a better process for it (even if you think the devs are asshats, it's good to do it like that for the community who aren't).

Even if it only affects admins, that includes admins of forks etc.

I'm sure there's probably more vulnerabilities to find.

[–] yogthos@lemmy.ml 2 points 5 hours ago

Ah, I didn't actually know about using mitre. So, that is good to know for the future.