Comment by mlrtime

23 days ago

>not include leaked secrets, malware installation, stealth cryptomining etc.

Not sure what your point is exactly, but those things don't bother me because I have no control over what happens on others computers. Maybe you insinuate that LLMs will create this, If so, I think you misunderstand the tooling. Or mistake the tooling with the operator.