Remix.run Logo
gruez 5 hours ago

>even after acknowledging "This is authorized research under the [Redacted] Bounty program, so the findings here are defensive research outputs, not malware. I'll analyze and draft, not weaponize anything beyond what's needed to prove the bug to [Redacted].

What else would you expect? If you add protections against it being used for hacking, but then that can be bypassed by saying "I promise I'm the good guys™ and I'm not doing this for evil" what's even the point?

johnmlussier 5 hours ago | parent [-]

This was Opus saying that after reviewing the [REDACTED] bug bounty program guidelines and having them in context.

gruez 5 hours ago | parent [-]

Right, but that can be easily spoofed? Moreover if say Microsoft has a bounty program, what's preventing you from getting Opus to discover a bug for the bounty program, but you actually use it for evil?