logoalt Hacker News

procaryoteyesterday at 4:31 PM1 replyview on HN

Theoretically, by taking the opportunity to inject an exfiltration mechanism if you ask it to write code for you


Replies

kgyesterday at 5:04 PM

Lots of people I know run models in "yolo" mode or the equivalent as well, which means it could just invoke curl or telnet to exfiltrate data.