"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis cover image

Exploitable by Default: Vulnerabilities in GPT-4 APIs and “Superhuman” Go AIs with Adam Gleave of Far.ai

"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis

CHAPTER

Exploring the Threat of Malicious Code in AI Code Generation

This chapter delves into the risks posed by malicious code in AI-generated outputs, highlighting how attackers can manipulate data to insert harmful URLs. The discussion emphasizes the need for vigilance in scrutinizing AI-generated code to prevent potential security breaches and backdoors.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner