Remix.run Logo
empiko 3 hours ago

In my opinion, the trifecta can be reduced further to a simple statement: an attacker who can input into your LLM can control all its resources.