Charlie Stross on Nostr: It occurs to me that Ken Thompson's classic lecture "Reflections on Trusting Trust" ...
It occurs to me that Ken Thompson's classic lecture "Reflections on Trusting Trust" has a LOT to say about code generation using LLMs.
The Thompson self-propagating UNIX hack that he described was a lot like a prompt injection attack (the right parsed input could trigger an unexpected output via opaque-to-programmer intermediate steps).
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
https://mastodon.social/@gmh/114132067525074476
The Thompson self-propagating UNIX hack that he described was a lot like a prompt injection attack (the right parsed input could trigger an unexpected output via opaque-to-programmer intermediate steps).
https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
https://mastodon.social/@gmh/114132067525074476