Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As a corollary, it might also increase the surface of upstream supply-chain attacks (patched or not)

The package import thing seems like a red herring



It's going to be fun if someone finds a security vulnerability in a commonly-emitted-by-LLMs code pattern. That'll be a lot harder to remediate than "Update dependency xyz"


> if someone finds a security vulnerability in a commonly-emitted-by-LLMs code pattern

how do you distinguish this from injecting a vulnerable dependency to a dependency list?


You can more easily check for known-vulnerable dependencies


Right, but if you can embed bad packages in LLMs, you can surely embed any kind of vulnerability imaginable.


I'm not thinking about deliberately embedded vulnerabilities, just accidental/emergent ones. The modern equivalent of devs copy-pasting stackoverflow answers that happen to contain SQL injection vulns.


Does the distinction make any difference?


Yes, you'd take different actions to avoid each.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: