• Phoenix3875@lemmy.world
    link
    fedilink
    arrow-up
    91
    arrow-down
    9
    ·
    1 day ago

    You do understand this is more akin to white hat testing, right?

    Those who want to exploit this will do it anyway, except they won’t publish the result. By making the exploit public, the risk will be known if not mitigated.

    • unepelle@mander.xyz
      link
      fedilink
      arrow-up
      24
      ·
      edit-2
      1 day ago

      I’m admittedly not knowledgeable in White Hat Hacking, but are you supposed to publicize the vulnerability, release a shortcut to exploit it telling people to ‘enjoy’, or even call the vulnerability handy ?

      • teft@piefed.social
        link
        fedilink
        English
        arrow-up
        15
        arrow-down
        2
        ·
        1 day ago

        Responsible disclosure is what a white hat does. You report the bug to whomever is the party responsible for patching and give them time to fix it.

        • PlexSheep@infosec.pub
          link
          fedilink
          arrow-up
          11
          ·
          1 day ago

          That sort of depends on the situation. Responsible disclosure is for if there is some relevant security hole that is an actual risk to businesses and people, while this here is just “haha look LLMs can now better pretend to write good text if you tell it to”. That’s not really responsible disclosurable. It’s not even specific to one singular product.

      • FooBarrington@lemmy.world
        link
        fedilink
        arrow-up
        11
        arrow-down
        3
        ·
        1 day ago

        Considering the “vulnerability” here is on the level of “don’t use password as your password” - yeah, releasing it all is exactly the right step.