UNSECURITY: Information Security Podcast cover image

ChatGPT, Mobile Malware, Super Mario Malware

UNSECURITY: Information Security Podcast

00:00

The Inherent Risks of Chat GPT

Researchers were able to elicit code responses from chat GPT and they learned that chat GPT would sometimes make up repositories or dependencies that actually didn't exist. And so as a result of that, we can see a possible exploit path here. It's pretty safe to assume those repository names that are used in those hallucination responses will be repeated to other people's similar responses.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app