logoalt Hacker News

samtheprogramtoday at 5:02 PM1 replyview on HN

As mentioned elsewhere, while this writeup is about exploiting the RCE, Claude was separately used to find and document this specific RCE.


Replies

jdurbantoday at 5:16 PM

that makes the second point stronger then - if the same model can find, document and exploit a kernel vulnerability, the question of what it introduces when writing production code becomes harder to dismiss. the capability is symmetric. the visibility isn't.