Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. I wonder if this was made by AI or a shit programmer

I wonder if this was made by AI or a shit programmer

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
170 Posts 93 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C [email protected]

    Disabling index and making the names UUID would make the directory inviolable even if the address was publicly available.

    S This user is from outside of this forum
    S This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #51

    Security through obscurity never works.

    C 1 Reply Last reply
    16
    • S [email protected]

      Believe it or not a lot of hacking is more like this than you think.

      C This user is from outside of this forum
      C This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #52

      If I was a hacker, I would just get a job as a night cleaning person at corporate office buildings. And then just help myself to the fucking post-it notes with usernames and passwords on them.

      B 1 Reply Last reply
      12
      • F [email protected]

        Yeah, once you get the LLM's response you still have to go to the documentation to check whether it's telling the truth and the APIs it recommends are current. You're no better off than if you did an internet search and tried to figure out who's giving good advice, or just fumbled your own way through the docs in the first place.

        C This user is from outside of this forum
        C This user is from outside of this forum
        [email protected]
        wrote on last edited by [email protected]
        #53

        Youโ€™re no better off than if you did an internet search and tried to figure out whoโ€™s giving good advice, or just fumbled your own way through the docs in the first place.

        These have their own problems ime. Often the documentation (if it exists) won't tell you how to do something, or it's really buried, or inaccurate. Sometimes the person posting StackOverflow answers didn't actually try running their code, and it doesn't run without errors. There are a lot of situations where a LLM will somehow give you better answers than these options. It's inconsistent, and the reverse is true also, but the most efficient way to do it is to use all of these options situationally and as backups to each other.

        F 1 Reply Last reply
        1
        • T [email protected]

          This reminds me of how I showed a friend and her company how to get databases from BLS and it's basically all just text files with urls. "What API did you call? How did you scrape the data?"

          Nah man, it's just... there. As government data should be. They called it a hack.

          K This user is from outside of this forum
          K This user is from outside of this forum
          [email protected]
          wrote on last edited by [email protected]
          #54

          ah yes, the forbidden curl hack

          1 Reply Last reply
          29
          • A [email protected]

            who'd have thought that being shitty programmer was incredibly susceptible to security flaws and deeply unsafe instead of javascript

            witchfire@lemmy.worldW This user is from outside of this forum
            witchfire@lemmy.worldW This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #55

            No, it must be JavaScript that is the problem

            principal_skinner.jpg.exe

            cyrano@lemmy.dbzer0.comC 1 Reply Last reply
            12
            • witchfire@lemmy.worldW [email protected]

              No, it must be JavaScript that is the problem

              principal_skinner.jpg.exe

              cyrano@lemmy.dbzer0.comC This user is from outside of this forum
              cyrano@lemmy.dbzer0.comC This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #56

              Microsoft defender identified a malware in this executable.

              01189998819991197253@infosec.pub0 1 Reply Last reply
              7
              • F [email protected]

                Peak Vibe Coding results.

                F This user is from outside of this forum
                F This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #57

                while True:

                Jesus Christ

                F mobotsar@sh.itjust.worksM 2 Replies Last reply
                27
                • C [email protected]

                  If I was a hacker, I would just get a job as a night cleaning person at corporate office buildings. And then just help myself to the fucking post-it notes with usernames and passwords on them.

                  B This user is from outside of this forum
                  B This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #58

                  https://youtu.be/jgYYOUC10aM

                  1 Reply Last reply
                  4
                  • lena@gregtech.euL [email protected]

                    As much as I dislike JavaScript, it isn't responsible for this. The person (or AI) and their stupidity is.

                    L This user is from outside of this forum
                    L This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #59

                    When i tried making a website with gemini cli it did deadass use string interpolation for sql queries so everything is possible

                    D 1 Reply Last reply
                    10
                    • F [email protected]

                      while True:

                      Jesus Christ

                      F This user is from outside of this forum
                      F This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #60

                      You know that's not the Tea code, but the downloader, right?

                      F the_decryptor@aussie.zoneT 2 Replies Last reply
                      22
                      • W [email protected]

                        Sounds like a good case for brute forcing the filenames. Just do the proper thing and don't leave your cloud storage publicly accessible.

                        F This user is from outside of this forum
                        F This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #61

                        While proper security is better, you're not gonna brute force UUIDs.

                        01189998819991197253@infosec.pub0 1 Reply Last reply
                        21
                        • lena@gregtech.euL [email protected]
                          This post did not contain any content.
                          L This user is from outside of this forum
                          L This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #62

                          Securing the db is more of an ops thing.

                          1 Reply Last reply
                          8
                          • F [email protected]

                            You know that's not the Tea code, but the downloader, right?

                            F This user is from outside of this forum
                            F This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #63

                            Other reports state the Tea backend was Vibe Coded: https://www.ainvest.com/news/tea-app-data-breach-exposes-72-000-users-ai-generated-code-security-lapse-2507/

                            F 1 Reply Last reply
                            15
                            • F [email protected]

                              Other reports state the Tea backend was Vibe Coded: https://www.ainvest.com/news/tea-app-data-breach-exposes-72-000-users-ai-generated-code-security-lapse-2507/

                              F This user is from outside of this forum
                              F This user is from outside of this forum
                              [email protected]
                              wrote on last edited by [email protected]
                              #64

                              Sure, it might be, I'm not saying it isn't. All I'm saying is: the screenshot shows the code someone wrote to download the images. It's not part of the Tea codebase.

                              1 Reply Last reply
                              18
                              • 4 [email protected]

                                This has been the case for 40+ years. Humans are almost always the weakest link.

                                P This user is from outside of this forum
                                P This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #65

                                we built this shit. thus we are always to blame.

                                1 Reply Last reply
                                1
                                • C [email protected]

                                  Youโ€™re no better off than if you did an internet search and tried to figure out whoโ€™s giving good advice, or just fumbled your own way through the docs in the first place.

                                  These have their own problems ime. Often the documentation (if it exists) won't tell you how to do something, or it's really buried, or inaccurate. Sometimes the person posting StackOverflow answers didn't actually try running their code, and it doesn't run without errors. There are a lot of situations where a LLM will somehow give you better answers than these options. It's inconsistent, and the reverse is true also, but the most efficient way to do it is to use all of these options situationally and as backups to each other.

                                  F This user is from outside of this forum
                                  F This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by [email protected]
                                  #66

                                  Yes, it can be useful in leading you to look in the right place for more information, or orienting you with the basics when you're working with a technology that's new to you. But I think it wastes my time as often as not.

                                  C 1 Reply Last reply
                                  0
                                  • S [email protected]

                                    Believe it or not a lot of hacking is more like this than you think.

                                    D This user is from outside of this forum
                                    D This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #67

                                    Security by obscurity.

                                    vanilla_puddinfudge@infosec.pubV 1 Reply Last reply
                                    7
                                    • cyrano@lemmy.dbzer0.comC [email protected]

                                      Microsoft defender identified a malware in this executable.

                                      01189998819991197253@infosec.pub0 This user is from outside of this forum
                                      01189998819991197253@infosec.pub0 This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #68

                                      Wow. It actually identified something?

                                      W 1 Reply Last reply
                                      3
                                      • F [email protected]

                                        While proper security is better, you're not gonna brute force UUIDs.

                                        01189998819991197253@infosec.pub0 This user is from outside of this forum
                                        01189998819991197253@infosec.pub0 This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #69

                                        As long as you're not rate limited, you absolutely could.

                                        F C 2 Replies Last reply
                                        2
                                        • L [email protected]

                                          When i tried making a website with gemini cli it did deadass use string interpolation for sql queries so everything is possible

                                          D This user is from outside of this forum
                                          D This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #70

                                          Robert'); DROP TABLE Students; --

                                          cupcakezealot@piefed.blahaj.zoneC 1 Reply Last reply
                                          5
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups