← Back to context

Comment by itissid

9 days ago

even if it is isolated, like no network or host access. Like say the malicious prompt created a wasm tool that patched your project code to leak information like adding a logger.warning. but LOG_LEVEL was set to error or whatever that prevented this from surfacing during testing or dev/beta.

Again running on that was container that code does not reveal anything. But then another isolated wasm tool was responsible to build the binary and ship it to prod.

Shotgunned all over prod logs are spotted by a log watcher within minutes of deploy. Whew... right?

But you are already screwed.