Security-Report-Volume-And-Triage-Capacity
Sources: 1 • Confidence: Medium • Updated: 2026-04-13 03:34
Key takeaways
- Kernel security list report volume increased from roughly 2–3 reports per week two years ago to about 10 reports per week over the last year.
- Duplicate kernel security reports are now occurring daily, which Willy Tarreau says did not happen before.
- Most recent kernel security list reports are correct, and the increased volume has required bringing in additional maintainers to help.
- Willy Tarreau attributes the increase in kernel security list reports primarily to AI-generated low-quality submissions rather than a change in underlying security reality.
Sections
Security-Report-Volume-And-Triage-Capacity
- Kernel security list report volume increased from roughly 2–3 reports per week two years ago to about 10 reports per week over the last year.
- Most recent kernel security list reports are correct, and the increased volume has required bringing in additional maintainers to help.
Ai-Mediated-Noise-And-Parallelized-Reporting
- Duplicate kernel security reports are now occurring daily, which Willy Tarreau says did not happen before.
- Willy Tarreau attributes the increase in kernel security list reports primarily to AI-generated low-quality submissions rather than a change in underlying security reality.
Signal-Still-High-Despite-Increased-Noise
- Most recent kernel security list reports are correct, and the increased volume has required bringing in additional maintainers to help.
Unknowns
- What fraction of kernel security list reports are invalid, low-quality-but-correct, duplicates, or novel-and-actionable, and how has that composition changed over time?
- What objective criteria are used to label submissions as AI-generated, and what share of the increased volume meets those criteria?
- How much additional maintainer capacity was added (headcount or hours), and did backlog/response time improve, worsen, or stay stable after resourcing changes?
- Are duplicates concentrated in specific bug classes, subsystems, or toolchains, and are there identifiable root causes for repeated rediscovery?
- Is the observed increase specific to the kernel security list, or is it mirrored in other security disclosure channels and projects?