Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. I wonder if this was made by AI or a shit programmer

I wonder if this was made by AI or a shit programmer

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
170 Posts 93 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S [email protected]

    Believe it or not a lot of hacking is more like this than you think.

    4 This user is from outside of this forum
    4 This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #35

    I think that’s less about “hacking” and more about modern day devs being overworked by their hot-shit team lead and clueless PMs and creating “temporary” solutions that become permanent in the long run.

    This bucket was probably something they set up early in the dev cycle so they could iterate components without needing to implement an auth system first and then got rushed into releasing before it could be fixed. That’s almost always how this stuff happens; whether it’s a core element or a rushed DR test.

    1 Reply Last reply
    22
    • hoshikarakitaridia@lemmy.worldH [email protected]

      Social engineering is probably 95% of modern attack vectors. And that's not even unexpected, some highly regarded computer scientists and security researchers concluded this more than a decade ago.

      4 This user is from outside of this forum
      4 This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #36

      This has been the case for 40+ years. Humans are almost always the weakest link.

      P 1 Reply Last reply
      6
      • lena@gregtech.euL [email protected]
        This post did not contain any content.
        C This user is from outside of this forum
        C This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #37

        Disabling index and making the names UUID would make the directory inviolable even if the address was publicly available.

        W S V 3 Replies Last reply
        17
        • lena@gregtech.euL [email protected]
          This post did not contain any content.
          metacolon@lemmy.blahaj.zoneM This user is from outside of this forum
          metacolon@lemmy.blahaj.zoneM This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #38

          Does anyone have a source for this?

          2 1 Reply Last reply
          4
          • lena@gregtech.euL [email protected]

            It's a public firebase bucket

            L This user is from outside of this forum
            L This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #39

            That should be criminally negligent.

            1 Reply Last reply
            15
            • lena@gregtech.euL [email protected]
              This post did not contain any content.
              F This user is from outside of this forum
              F This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #40

              Peak Vibe Coding results.

              F 1 Reply Last reply
              66
              • rayquetzalcoatl@lemmy.worldR [email protected]

                Bananas as a Service 🙂

                cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
                cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #41

                bananas in pyjamas

                1 Reply Last reply
                4
                • metacolon@lemmy.blahaj.zoneM [email protected]

                  Does anyone have a source for this?

                  2 This user is from outside of this forum
                  2 This user is from outside of this forum
                  [email protected]
                  wrote on last edited by [email protected]
                  #42

                  The original article is paywalled (I mean, registration-walled?), this summary is not

                  404 Media reported that 4chan users claimed to be sharing personal data and selfies from Tea after discovering an exposed database.

                  1 Reply Last reply
                  7
                  • J [email protected]

                    What was the BASE_URL here? I’m guessing that’s like a profile page or something?

                    So then you still first have to get a URL to each profile? Or is this like a feed URL?

                    P This user is from outside of this forum
                    P This user is from outside of this forum
                    [email protected]
                    wrote on last edited by [email protected]
                    #43

                    Possibly from the decompiled APK. 404media reported that they found the same URL as the posted one in the APK (archive link).

                    1 Reply Last reply
                    4
                    • lena@gregtech.euL [email protected]
                      This post did not contain any content.
                      cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
                      cupcakezealot@piefed.blahaj.zoneC This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #44

                      who'd have thought that javascript and client side programming was incredibly susceptible to security flaws and deeply unsafe

                      lena@gregtech.euL A 2 Replies Last reply
                      23
                      • cupcakezealot@piefed.blahaj.zoneC [email protected]

                        who'd have thought that javascript and client side programming was incredibly susceptible to security flaws and deeply unsafe

                        lena@gregtech.euL This user is from outside of this forum
                        lena@gregtech.euL This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #45

                        As much as I dislike JavaScript, it isn't responsible for this. The person (or AI) and their stupidity is.

                        L cupcakezealot@piefed.blahaj.zoneC 2 Replies Last reply
                        48
                        • kayohtie@pawb.socialK [email protected]

                          whether it's telling the truth

                          "whether the output is correct or a mishmash"

                          "Truth" implies understanding that these don't have, and because of the underlying method the models use to generate plausible-looking responses based on training data, there is no "truth" or "lying" because they don't actually "know" any of it.

                          I know this comes off probably as super pedantic, and it definitely is at least a little pedantic, but the anthropomorphism shown towards these things is half the reason they're trusted.

                          That and how much ChatGPT flatters people.

                          F This user is from outside of this forum
                          F This user is from outside of this forum
                          [email protected]
                          wrote on last edited by [email protected]
                          #46

                          Yeah, it has no notion of being truthful. But we do, so I was bringing in a human perspective there. We know what it says may be true or false, and it's natural for us to call the former "telling the truth", but as you say we need to be careful not to impute to the LLM any intention to tell the truth, any awareness of telling the truth, or any intention or awareness at all. All it's doing is math that spits out words according to patterns in the training material.

                          kayohtie@pawb.socialK 1 Reply Last reply
                          0
                          • cupcakezealot@piefed.blahaj.zoneC [email protected]

                            who'd have thought that javascript and client side programming was incredibly susceptible to security flaws and deeply unsafe

                            A This user is from outside of this forum
                            A This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #47

                            who'd have thought that being shitty programmer was incredibly susceptible to security flaws and deeply unsafe instead of javascript

                            witchfire@lemmy.worldW 1 Reply Last reply
                            24
                            • C [email protected]

                              Disabling index and making the names UUID would make the directory inviolable even if the address was publicly available.

                              W This user is from outside of this forum
                              W This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #48

                              Sounds like a good case for brute forcing the filenames. Just do the proper thing and don't leave your cloud storage publicly accessible.

                              F C 2 Replies Last reply
                              17
                              • I This user is from outside of this forum
                                I This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #49

                                Sounds like a good time

                                1 Reply Last reply
                                0
                                • hoshikarakitaridia@lemmy.worldH [email protected]

                                  Social engineering is probably 95% of modern attack vectors. And that's not even unexpected, some highly regarded computer scientists and security researchers concluded this more than a decade ago.

                                  C This user is from outside of this forum
                                  C This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #50

                                  The percentage is closer to 75% than 95%.

                                  1 Reply Last reply
                                  0
                                  • C [email protected]

                                    Disabling index and making the names UUID would make the directory inviolable even if the address was publicly available.

                                    S This user is from outside of this forum
                                    S This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #51

                                    Security through obscurity never works.

                                    C 1 Reply Last reply
                                    16
                                    • S [email protected]

                                      Believe it or not a lot of hacking is more like this than you think.

                                      C This user is from outside of this forum
                                      C This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #52

                                      If I was a hacker, I would just get a job as a night cleaning person at corporate office buildings. And then just help myself to the fucking post-it notes with usernames and passwords on them.

                                      B 1 Reply Last reply
                                      12
                                      • F [email protected]

                                        Yeah, once you get the LLM's response you still have to go to the documentation to check whether it's telling the truth and the APIs it recommends are current. You're no better off than if you did an internet search and tried to figure out who's giving good advice, or just fumbled your own way through the docs in the first place.

                                        C This user is from outside of this forum
                                        C This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by [email protected]
                                        #53

                                        You’re no better off than if you did an internet search and tried to figure out who’s giving good advice, or just fumbled your own way through the docs in the first place.

                                        These have their own problems ime. Often the documentation (if it exists) won't tell you how to do something, or it's really buried, or inaccurate. Sometimes the person posting StackOverflow answers didn't actually try running their code, and it doesn't run without errors. There are a lot of situations where a LLM will somehow give you better answers than these options. It's inconsistent, and the reverse is true also, but the most efficient way to do it is to use all of these options situationally and as backups to each other.

                                        F 1 Reply Last reply
                                        1
                                        • T [email protected]

                                          This reminds me of how I showed a friend and her company how to get databases from BLS and it's basically all just text files with urls. "What API did you call? How did you scrape the data?"

                                          Nah man, it's just... there. As government data should be. They called it a hack.

                                          K This user is from outside of this forum
                                          K This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by [email protected]
                                          #54

                                          ah yes, the forbidden curl hack

                                          1 Reply Last reply
                                          29
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups