Remix.run Logo
warkdarrior 2 hours ago

> In some cases, I am asking: "Why is this program or functionality an attack surface? Why can someone on the internet write to this system?"

With the help of LLMs, every software not in a vault has an attack surface. LLMs are quite good at finding different, non-obvious paths, and you can easily test their exploit candidates.