B (132:33)
Okay, what we've been expecting has happened and it's every bit as bad as we worried it would be. Last Tuesday, Checkpoint Research published their analysis of a newly discovered malware which they named Void Link. Their research was titled Void Link. Evidence that the era of advanced AI generated malware has begun. What we all knew had come or was coming has arrived. Checkpoint summarized this news with five key points. They wrote, checkpoint Research believes a new era of AI generated malware has begun. Voidlink stands as the first evidently documented case of this era as a truly advanced malware framework authored almost entirely by artificial intelligence, likely under the direction of a single individual. Second, until now, solid evidence of AI generated malware has primarily been linked to inexperienced threat actors, as in the case of Funk Sec, or to malware that largely mirrored the functionality of existing open source malware tools. Void Link is the first evidence based case that shows how dangerous AI can become in the hands of more capable malware developers. Third, operational security OPSEC failures by the Void Link developer exposed development artifacts. These materials provided clear evidence that the malware was produced predominantly through AI driven development, reaching a first functional implant in under one week. Fourth, this case highlights the dangers of how AI could enable a single actor to plan, build and iterate complex systems at A pace that previously required coordinated teams, ultimately normalizing high complexity attacks that previously would only originate from high resource threat actors. And finally, from a methodology perspective, the actor used the model beyond coding, adopting an approach called Spec Driven Development SDD first tasking it to generate a structured multi team development plan with Sprint schedules, specifications and deliverables. That documentation was then repurposed and as the execution blueprint, which the model likely followed to implement, iterate and test the malware end to end. Okay, so we've been rejoicing over the surprising jump in CLAUDE code's ability to operate. For example, it has, you know, has made it. CLAUDE has made enabling endtoend creation of applications possible. You know, as they say, everybody's doing it. Unfortunately, we've known that everyone would eventually include malware authors. That's now happened and it's as bad as we worried it would be. I'm not going to examine this particular instance in depth because what's the point? There will be another one tomorrow and the day after or, you know, an hour from now. This is clearly the beginning of an entirely new problem domain. Nevertheless, Checkpoint's introduction is worth sharing, they wrote. When we first encountered voidlink, we were struck by its level of maturity, high functionality, efficient architecture and flexible dynamic operating model. Employing technologies like EBPF and LKM rootkits and dedicated modules for cloud enumeration and post exploitation in container environments. This unusual piece of malware seemed to be a larger development effort by an advanced actor. As we continued tracing it and tracking it, we watched it evolve in near real time, rapidly transforming from what appeared to be a functional development build into a comprehensive modular framework. Over time, additional components were introduced, command and control infrastructure was established, and the project accelerated toward a full fledged operational platform. In parallel, we monitored the actors supporting infrastructure and identified multiple operational security failures. These missteps exposed substantial portions of Void Link's internal materials, including documentation, source code and project components. The leaks also contain detailed planning artifacts, Sprints, design ideas and timelines for three distinct internal teams they have in quotes because it was all AI teams spanning more than 30 weeks of of planned development. At face value, this level of structure suggested a well resourced organization investing heavily in engineering and operationalization. However, the Sprint timeline did not align with our observations. We had directly witnessed the malware's capabilities expanding far faster than the documentation suggested. Deeper investigation revealed clear artifacts in indicating that the development plan itself was generated and orchestrated by an AI model and that it was likely used as the blueprint to build, execute and test the framework. Because AI produced documentation is typically I'm sorry, but because AI produced documentation is typically thorough, many of these artifacts were were timestamped and unusually revealing. They show how in less than a week, a single individual likely drove Void Link from concept to a working, evolving reality. As this narrative comes into focus, it turns long discussed concerns about AI enabled malware from theory into practice. Voidlink, implemented to a notably high engineering standard, demonstrates how rapidly sophisticated offensive capability can be produced and how dangerous AI becomes when placed in the wrong hands. The general approach to developing Void Link can be described as Spec Driven development sdd. In this workflow, a developer begins by specifying what they're building, then creates a plan, breaks that plan into tasks, and only then allows an agent to begin implementing it. Artifacts from Void Link's development environment suggest that the developer followed a similar pattern, first defining the project based on general guidelines and an existing code base, then having the AI translate those guidelines into an architecture and build a plan across three separate teams paired with strict coding guidelines and constraints, and only afterward running the agent to execute the implementation. Void Link's development likely began in late November 2025. And remember, we're in the end of January when its developer turned to Trey T R A E Solo, an AI assistant embedded in Trey, an AI centric ide. While we do not have access to the full conversation history, Trey again T R A E if anyone wants to Google it automatically produces helper files that preserve key portions of the original guidance provided to the model. Those tray generated files appear to have been copied alongside the source code and into the Threat Actors server and later surfaced due to an exposed open directory. This leakage gave us unusually direct visibility into the project's earliest directives. In this case, Trey generated a Chinese language instruction document. These directives offer a rare window into voidlink's early stage planning and the baseline requirements that set the project in motion. Okay, so Trey spelled T R A E is a creation of ByteDance, the famous Beijing based creator of TikTok. It's been around since last February, so it's relatively new and it's been maturing rapidly. What makes Trey appealing is that it's an IDE, an integrated development environment centric solution. Trey's documentation explains writing Trey IDE is your powerful AI powered code editor from ByteDance, featuring Claude 3.5 and GPT4 and Deep SEQ integration. By the way, that's back in February. It's updated now. It's designed to be your coding companion, offering AI assisted features like code completion, intelligent suggestions, and agent Based Programming Capabilities Capabilities when developing with Trey IDE, you can collaborate with AI to boost your productivity. Tray IDE provides essential IDE functionality including code editing, project management, extension management, version control, and more. It supports seamless migration from VS Code and Cursor by importing your existing configurations. During coding. You can engage in real time conversations with the AI Assistant for help, including code explanations, documentation generation, and error repair. The interface is fully optimized for both English and Chinese users. The AI Assistant understands your code context and provides intelligent code suggestions in real time within the editor. Simply describe your requirements to the AI assistant in natural language and it will generate appropriate code snippets or autonomously write project level code and cross file code. Tell the assistant what kind of program you want to develop and it will provide relevant code or automatically create necessary files based on your description. With support for multiple programming languages and a rich plugin ecosystem, Tray IDE helps you build complete projects efficiently. So I want to give everyone a sense for for what's happening in this segment of the world, so here's an independent review posting made last May, three months after Trey's released to the world. The guy wrote Meet Trey AI, a free AI coding agent with model context protocol mcp. He wrote AI code assistants are flooding the market, but most still feel like chatbots taped to an editor. Tray IDE takes a different route. It ships an integrated development environment with a built in agent framework that parses your entire code base, talks to outside tools through the model context protocol, and crucially cost nothing to install if you're still paying for a $20 monthly subscription. Trey AI is an AI coding agent that offers local first setup and a zero dollar price tag, making it worth a test drive. So what is Trey? Trey AI is a free AI coding agent with model context protocol that offers itself as a collaborative partner for software engineers. It's designed to fit into a developer's existing coding environment, not as a replacement but as an intelligent AI assistant. Trey provides budget relief. The main editor and completion model are free, removing the time item or the line item that has kept many finance and ops leaders from greenlighting AI pair programming pilots Agentic Workflow Instead of a single do everything helper, Trey lets you spin up specialist agents, one for refactoring, another for writing tests, a third for documentation, with each AI agent getting its own prompt tools and guardrails. Enterprise style data rules without enterprise pricing code stays on your machine. Any Any files briefly sent for indexing are wiped after embeddings are created. Regional Hosting US Singapore Malaysia, etc keeps government teams calm about residency. What does Trey II bring to the table? Working Together Trey's development environment is built to work with existing developer setups. The goal is to improve how developers and AI can cooperate for better outcomes and faster project creation. Direct AI Communication Developers can talk to Trey using straightforward language and simple instructions, and they can delegate work, facilitating a more interactive relationship between humans and AI. Custom AI Assistants Trey offers a flexible system for setting up specialized AI agents. It comes with a standard agent called Builder for everyday tasks. Past that, developers can create their own group of AI helpers, each with specific tools, skills, and ways of working, so the AI can be adjusted to fit precise project requirements. Connecting to other tools Trey can link up with different external applications. Currently, it uses a system known as Model Context Protocol, which allows its AI agents to gather information from outside resources to better complete the tasks they're given. Understanding Project Details Trey gains a good grasp of a project's specifics by looking at code repositories, information from online searches, and documents provided by users. Developers can also set up custom rules to fine tune the AI's behavior, making sure it handles tasks exactly as intended and smart code suggestions as developers type. Trey offers intelligent code completions as it can anticipate what the developer is trying to write and automatically fill in code segments, helping speed up the writing process. The idea is to make the interaction feel natural, allowing developers to assign tasks or ask for help using simple commands. This approach could fundamentally change team dynamics, making AI less of a tool and more of a team member. And so, in conclusion, he adds, the arrival of free, capable AI coding agents like Trey AI isn't just another tech trend. It shows a maturing of AI into a practical aid for a highly skilled and often costly workforce. Its mix of free pricing, configurable agents, and tight privacy controls offers a low risk way to explore agentic coding without rewriting procurement rules. For CTOs and engineering managers, the math is straightforward. Swap a paid copilot for a free locally hosted agent system and redirect budget to GPU credits or headcount. While AI won't be replacing entire development teams anytime soon, tools that augment their abilities, especially free ones, are certainly are certainly worth trying if your roadmap includes AI assistant development, but your finance team keeps asking for ROI Proof Trey may be the simplest yes, you can give for the entire quarter. Okay, so I don't mean to suggest that this Trey IDE centric AI coding system is in any way, you know, super special. Quite the contrary, in fact. I'm sure the world is already being flooded with similar and similarly powerful AI based solutions. I just wanted to share a sample of the tool that happened to be picked by the chain, the Chinese language speaker who created this particular void link malware. As is always the case for these sorts of things, my interest in sharing this on the pad on the podcast is, you know, giving this event, you know, the news that this event brings some context and as I said at the top of the show, unfortunately today I truly fear that the worst that the news is worse than bad and I am unable to find a silver lining here. We're all familiar with the notion of asymmetric warfare, sometimes referred to as guerrilla war. The use of malware to any malware to penetrate, infect, exfiltrate and encrypt an enterprise's resources is inherently asymmetric. One loneliness malicious hacker hiding somewhere, anywhere on the Internet, perhaps literally in his mother's basement, is able to single handedly attack and significantly negatively impact the national economy of the United Kingdom in one well placed attack on Jaguar Land Rover. It's the very definition of asymmetry. The problem with this emergence of AI and its expected application to the empowerment of all forms of coding is that I believe history and the evidence suggests that the bad guys will be gaining a far greater advantage from their malicious application of AI to create malware. Then the good guys will be gaining through their use of it to do what it's not at all clear what the good guys can do that isn't already being done. In other words, I cannot see how the benefit from the application of AI to both sides is in any way even close to being symmetric. I believe that AI's value is extremely asymmetric here and that the asymmetric battle that's being waged for the past decade, that's been waged for the past decade is about to become far more asymmetric. In years past we've observed that hacker talent encompasses a wide range from the so called script kiddies at the low end to the elite hackers at the high end. And we know that this also takes a pyramid shape with a great many lower end wannabe hackers at the bottom and a much more rarefied few at the top of the pile. Recently we've seen that the followers of this podcast have already been been employing AI to create successful solutions that they would never have been able to create otherwise. And you, Leo, as a lifelong coder, could have written your news feed reader from scratch the old fashioned way.