logoalt Hacker News

wrxdtoday at 4:27 PM1 replyview on HN

The model is only generating tokens without touching the network at all, right? How would it send data away?


Replies

procaryotetoday at 4:31 PM

Theoretically, by taking the opportunity to inject an exfiltration mechanism if you ask it to write code for you

show 1 reply