←back to thread

146 points jakozaur | 1 comments | | HN request time: 0.275s | source
1. mbesto ◴[] No.45671417[source]
> Attacker plants malicious prompt in likely-to-be-consumed content.

Is the author implying that some random joe hacker writes a blog with the content. Then a <insert any LLM training set> picks up this content thinking its real/valid. A developer within a firm then asks to write something using said LLM references the information from that blog and now there is a security error?

Possible? Technically sure. Plausible? That's ummm a stretch.