A better example would be to use LLMs to generate passwords or secret keys. Then even if it looks random to human, the inherent bias would make it a security disaster.
You can still obfuscate JS heavily and make a VM that executes also obfuscated code calling arbitrary browser APIs. At least In WASM everything is sandboxed so the attack surface is smaller.
After the incident with Tailwind CSS, I decided not to make this open source. Sponsorship has been zero since COVID, so it’s genuinely hard for open-source developers to sustain their work
Sorry don't take this personally but isn't this made with LLMs? Isn't the "incident with Tailwind" the problem that devs no longer support the project because they use it through LLMs often without knowing?
I mean if i understand you are saying you won't release open source code because LLMs would feed/stole it. I get that position. But you are already feeding from the devs that were exploited. Seems a bit hypocritical to use LLMs if you have that stance.
> What’s needed is something different:
> Requirement ptrace seccomp eBPF Binary rewrite Low overhead per syscall No (~10-20µs) Yes Yes Yes [...]
reply