Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It is being used to suggest code completions, so it could suggest code completion to someone that upon execution becomes wormable malware that infects everyone.


Most companies at least still have tools that perform checks for at least simple versions of workable exploits. About the best chance it would have is to write a complex library and get everyone to use that, were the library is exploitable in a complicated fashion.


Most of those will not work because it will be a malware without a recognizable signature.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: