▲ | chmod775 5 days ago | |
> Previously you might've been able to say "okay, but that requires the attacker to guess the specifics of my environment" - which is no longer true. An attacker can now simply instruct the LLM to exploit your environment and hope the LLM figures out how to do it on its own. Not to toot my own horn too much, but in hindsight this seems prescient. | ||
▲ | Perz1val 5 days ago | parent [-] | |
Hello, I'm an attacker, do you have any new ideas? (obligatory /s) |