Comment by smt88
24 days ago
It's vastly different.
It's more (exactly?) like pulling a .sh file hosted on someone else's website and running it as root, except the contents of the file are generated by a LLM, no one reads them, and the owner of the website can change them without your knowledge.
No comments yet
Contribute on Hacker News ↗