Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The article talks on and on about what document to craft to fool an AI, but how does he gain access to the target's database? How can he randomly inject data into some AI bots sources?

Like why does it even matter what kind of page to craft when some company's AI bot source database is wide open? I simply don't understand this kind of post, they do lots of effort to suggest that this is a super big scary vulnerability but actually the "vulnerability" is:

> Each [automated pipeline into your knowledge base] is a potential injection path.

In other words, the tldr of this article is

- if your knowledge base is compromised

- then your knowledge base is compromised!!!!



Insider threat. Every fucking large business has disgruntled employees, like Meta right now after finding out about Zuck's plan to flatten all roles to ICs


How is that different from "People with access to your CMS can put terrible lies on your company website"? The vulnerability is still "people who have access to things have access to things" but written maximally sciencey to hide the fact that there's no vulnerability.


You're right, it's not a vulnerability, it's a flaw of the transformer that makes it unsuitable for what it is peddled to do.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: