42
submitted 4 months ago by ylai@lemmy.ml to c/ai_infosec@infosec.pub
top 3 comments
sorted by: hot top controversial new old
[-] Syd@lemm.ee 7 points 4 months ago

So could a bad actor train llms to inject malware into code in a way that wouldn't be easily caught?

[-] autotldr@lemmings.world 3 points 4 months ago

This is the best summary I could come up with:


In-depth Several big businesses have published source code that incorporates a software package previously hallucinated by generative AI.

Not only that but someone, having spotted this reoccurring hallucination, had turned that made-up dependency into a real one, which was subsequently downloaded and installed thousands of times by developers as a result of the AI's bad advice, we've learned.

He created huggingface-cli in December after seeing it repeatedly hallucinated by generative AI; by February this year, Alibaba was referring to it in GraphTranslator's README instructions rather than the real Hugging Face CLI tool.

Last year, through security firm Vulcan Cyber, Lanyado published research detailing how one might pose a coding question to an AI model like ChatGPT and receive an answer that recommends the use of a software library, package, or framework that doesn't exist.

The willingness of AI models to confidently cite non-existent court cases is now well known and has caused no small amount of embarrassment among attorneys unaware of this tendency.

As Lanyado noted previously, a miscreant might use an AI-invented name for a malicious package uploaded to some repository in the hope others might download the malware.


The original article contains 1,143 words, the summary contains 190 words. Saved 83%. I'm a bot and I'm open source!

this post was submitted on 28 Mar 2024
42 points (100.0% liked)

AI Infosec

768 readers
1 users here now

Infosec news and articles related to AI.

founded 1 year ago
MODERATORS