Most active commenters

    ←back to thread

    Claude Sonnet will ship in Xcode

    (developer.apple.com)
    485 points zora_goron | 12 comments | | HN request time: 0s | source | bottom
    Show context
    breadwinner ◴[] No.45059612[source]
    It seems every IDE now has AI built-in. That's a problem if you're working on highly confidential code. You never know when the AI is going to upload code snippets to the server for analysis.
    replies(13): >>45059623 #>>45059634 #>>45059661 #>>45059894 #>>45059943 #>>45060054 #>>45060064 #>>45060101 #>>45060121 #>>45060510 #>>45060668 #>>45061092 #>>45061687 #
    tcoff91 ◴[] No.45059634[source]
    Neovim and Emacs don’t have it built in. Use open source tools.
    replies(1): >>45060072 #
    1. simonh ◴[] No.45060072[source]
    They both support it via plugins. Xcode doesn’t enable it by default, you need to enable it and sign into an account. It’s not really all that different.
    replies(2): >>45060175 #>>45070755 #
    2. OsrsNeedsf2P ◴[] No.45060206[source]
    If you're worried about someone accessing your unlocked computer to install LLMs, you might need to rethink your security model.
    replies(1): >>45060255 #
    3. renewiltord ◴[] No.45060255{3}[source]
    They could install anything. Including Claude Code and then run it in background as agent to exfiltrate data. I'm a security professional. This is unacceptable
    replies(1): >>45060306 #
    4. eddyg ◴[] No.45060293[source]
    You should install LuLu if you’re that concerned. There are far more nefarious ways of “getting your data”.

    https://objective-see.org/products/lulu.html

    5. BalinKing ◴[] No.45060306{4}[source]
    I think the parent commenter was pointing out that, instead of installing Claude Code, they could just install actual malware. It's like that phrase Raymond Chen always uses: "you're already on the other side of the airtight hatchway."
    replies(1): >>45060468 #
    6. whatevermom ◴[] No.45060399[source]
    Yes. I am so worried as well. This is why I installed an AI to double-check if the password I entered is correct when logging in. Fight fire with fire
    7. TheDong ◴[] No.45060401[source]
    What commonly gets installed in those cases is actual malware, a RAT (Remote Admin Tool) that lets the attacker later run commands on your laptop (kinda like an OpenSSH server, but also punching a hole through nat and with a server that they can broadcast commands broadly to the entire fleet).

    If the attacker wants to use AI to assist in looking for valuables on your machine, they won't install AI on your machine, they'll use the remote shell software to pop a shell session, and ask AI they're running on one of their machines to look around in the shell for anything sensitive.

    If an attacker has access to your unlocked computer, it is already game over, and LLM tools is quite far down the list of dangerous software they could install.

    Maybe we should ban common RAT software first, like `ssh` and `TeamViewer`.

    replies(2): >>45060474 #>>45060523 #
    8. renewiltord ◴[] No.45060468{5}[source]
    Yes but Claude Code could install malware when I'm not paying attention. And when I remove with MalwareBytes it will return because LLMs are not AGI.
    replies(1): >>45064514 #
    9. TheDong ◴[] No.45060509{4}[source]
    You know, I should have realized this was a troll account with the previous comment.

    I guess that's on me for being oblivious enough that it took this obvious of a comment for me to be sure you're intentionally trolling. Nice work.

    10. jumploops ◴[] No.45060523{3}[source]
    > They won’t install AI on your machine

    Actually they’ll just the AI you already have on your machine[0]

    In this attack, the malware would use Claude Code (with your credentials) to scan your own machine.

    Much easier than running the inference themselves!

    [0]https://semgrep.dev/blog/2025/security-alert-nx-compromised-...

    11. BalinKing ◴[] No.45064514{6}[source]
    Isn't the general advice that if malware has been installed specifically due to physical access, then the entire machine should be considered permanently compromised? That is to say, if someone has access to your unlocked machine, I've heard that it's way too late for MalwareBytes to be reliable....
    12. tcoff91 ◴[] No.45070755[source]
    That seems perfectly fine and noncontroversial then. Good on Apple for doing it that way.