Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think it's great.

If the LLM takes it upon itself to download malware, the user is protected.



Wait for next step, when the target is actually the LLM.


Wait for the next step, when the lawyers collectively decide that the crook that designed the payload is innocent, and you, the one who copy-pasted it into the LLM for analysis, are the real villain.


Or you are the target, and your LLM is poisoned to work against you with some kind of global directive.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: