top | item 40437190 (no title) benwaffle | 1 year ago > The biggest issue for me is that it increases the attack surfaceWhat's your threat model? discuss order hn newest sangnoir|1 year ago > What's your threat model?Why do you ask, will you help with designing a mitigation plan?I'll humor you: It's a turnkey gadget for sniffing/exfiltrating the output of any open iTerm2 shell. dcow|1 year ago Because you’re already using other software that has LLM integration. What specifically about this iterm2 impl makes the threat more real?? load replies (2)
sangnoir|1 year ago > What's your threat model?Why do you ask, will you help with designing a mitigation plan?I'll humor you: It's a turnkey gadget for sniffing/exfiltrating the output of any open iTerm2 shell. dcow|1 year ago Because you’re already using other software that has LLM integration. What specifically about this iterm2 impl makes the threat more real?? load replies (2)
dcow|1 year ago Because you’re already using other software that has LLM integration. What specifically about this iterm2 impl makes the threat more real?? load replies (2)
sangnoir|1 year ago
Why do you ask, will you help with designing a mitigation plan?
I'll humor you: It's a turnkey gadget for sniffing/exfiltrating the output of any open iTerm2 shell.
dcow|1 year ago