Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. I wonder if this was made by AI or a shit programmer

I wonder if this was made by AI or a shit programmer

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
170 Posts 93 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • lena@gregtech.euL This user is from outside of this forum
    lena@gregtech.euL This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1
    This post did not contain any content.
    skip0110@lemmy.zipS D S I rhaedas@fedia.ioR 25 Replies Last reply
    863
    • lena@gregtech.euL [email protected]
      This post did not contain any content.
      skip0110@lemmy.zipS This user is from outside of this forum
      skip0110@lemmy.zipS This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      AI just enables the shit programmers to create a greater volume of shit

      A H 2 Replies Last reply
      148
      • lena@gregtech.euL [email protected]
        This post did not contain any content.
        D This user is from outside of this forum
        D This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        I wonder if their data is poisoned by below average Dev. I mean if your test subjects are met or below Dev and mad Ethel lost 20% efficiency imagine what you can do to good dev

        T 1 Reply Last reply
        4
        • lena@gregtech.euL [email protected]
          This post did not contain any content.
          S This user is from outside of this forum
          S This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          Believe it or not a lot of hacking is more like this than you think.

          hoshikarakitaridia@lemmy.worldH M M 4 C 6 Replies Last reply
          282
          • lena@gregtech.euL [email protected]
            This post did not contain any content.
            I This user is from outside of this forum
            I This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            I remember when a senior developer where i worked was tired of connecting to the servers to check its configuration, so they added a public facing rest endpoint that just dumped the entire active config, including credentials and secrets

            That was a smaller slip-up than exposing a database like that (he just forgot that the config contained secrets) but still funny that it happened

            P 1 Reply Last reply
            77
            • skip0110@lemmy.zipS [email protected]

              AI just enables the shit programmers to create a greater volume of shit

              A This user is from outside of this forum
              A This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              I'll tape this to my office door.

              1 Reply Last reply
              29
              • D [email protected]

                I wonder if their data is poisoned by below average Dev. I mean if your test subjects are met or below Dev and mad Ethel lost 20% efficiency imagine what you can do to good dev

                T This user is from outside of this forum
                T This user is from outside of this forum
                [email protected]
                wrote on last edited by [email protected]
                #7

                Not below average dev necessarily, but when posting code examples on the internet people often try to get a point across. Like how do I solve X? Here is code that solves X perfectly, the rest of the code is total crap, ignore that and focus on the X part. Because it's just an example, it doesn't really matter. But when it's used to train an LLM it's all just code. It doesn't know which parts are important and which aren't.

                And this becomes worse when small little bits of code are included in things like tutorials. That means it's copy pasted all over the place, on forums, social media, stackoverflow etc. So it's weighted way more heavily. And the part where the tutorial said: "Warning, this code is really bad and insecure, it's just an example to show this one thing" gets lost in the shuffle.

                Same thing when an often used pattern when using a framework gets replaced by new code where the framework does a little bit more so the same pattern isn't needed anymore. The LLM will just continue with the old pattern, even though there's often a good reason it got replaced (for example security issues). And if the new and old version aren't compatible with each other, you are in for a world of hurt trying to use an LLM.

                And now with AI slop flooding all of these places where they used to get their data, it just becomes worse and worse.

                These are just some of the issues why using an LLM for coding is probably a really bad idea.

                D F 2 Replies Last reply
                10
                • S [email protected]

                  Believe it or not a lot of hacking is more like this than you think.

                  hoshikarakitaridia@lemmy.worldH This user is from outside of this forum
                  hoshikarakitaridia@lemmy.worldH This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  Social engineering is probably 95% of modern attack vectors. And that's not even unexpected, some highly regarded computer scientists and security researchers concluded this more than a decade ago.

                  spankmonkey@lemmy.worldS Q 4 C 4 Replies Last reply
                  103
                  • hoshikarakitaridia@lemmy.worldH [email protected]

                    Social engineering is probably 95% of modern attack vectors. And that's not even unexpected, some highly regarded computer scientists and security researchers concluded this more than a decade ago.

                    spankmonkey@lemmy.worldS This user is from outside of this forum
                    spankmonkey@lemmy.worldS This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #9

                    When the technical side reaches a certain level of security, the humans become the weakest link.

                    1 Reply Last reply
                    61
                    • S [email protected]

                      Believe it or not a lot of hacking is more like this than you think.

                      M This user is from outside of this forum
                      M This user is from outside of this forum
                      [email protected]
                      wrote on last edited by [email protected]
                      #10

                      Many years ago, I discovered that my then-employer’s “home built” e-commerce system had all user and admin passwords displayed in plaintext at home/admin/passwords.

                      When I brought this to the attention of leadership, they called the “developer” in and he said “oh, well, that’s IP locked, so no one on the web can access it!” When I pulled it up on my phone, he insisted my phone was on the work WiFi, despite it being clearly verifiable that was not the case. (The same work WiFi that had an open public connection, which is the one my phone would have been on, if it were on it…)

                      He did fix that, but many other issues remained. Eventually a new COO hired someone competent as his ‘backup’, replaced our website and finally suggested he pursue other employment opportunities before he could no longer voluntarily pursue them. (There was concern he might sabotage.)

                      1 Reply Last reply
                      33
                      • lena@gregtech.euL [email protected]
                        This post did not contain any content.
                        rhaedas@fedia.ioR This user is from outside of this forum
                        rhaedas@fedia.ioR This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #11

                        Even the best models fine tuned for coding still have training that was based on both good and bad examples of programming from humans. And since it's not AGI but using probability to generate the code, you're going to get crap programming logic dependent on how often such things were used and suggested by humans to other humans. Googling for an answer on how to code something pulls up all sorts of answers from many sources, but reading through them, many are terrible. An LLM doesn't know that, it just knows that humans liked some answers better than others, so GIGO.

                        N 1 Reply Last reply
                        12
                        • rhaedas@fedia.ioR [email protected]

                          Even the best models fine tuned for coding still have training that was based on both good and bad examples of programming from humans. And since it's not AGI but using probability to generate the code, you're going to get crap programming logic dependent on how often such things were used and suggested by humans to other humans. Googling for an answer on how to code something pulls up all sorts of answers from many sources, but reading through them, many are terrible. An LLM doesn't know that, it just knows that humans liked some answers better than others, so GIGO.

                          N This user is from outside of this forum
                          N This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #12

                          Gorilla In Gorilla Out?

                          rayquetzalcoatl@lemmy.worldR 1 Reply Last reply
                          7
                          • N [email protected]

                            Gorilla In Gorilla Out?

                            rayquetzalcoatl@lemmy.worldR This user is from outside of this forum
                            rayquetzalcoatl@lemmy.worldR This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #13

                            Fantastic for building BaaS apps

                            J 1 Reply Last reply
                            3
                            • rhaedas@fedia.ioR This user is from outside of this forum
                              rhaedas@fedia.ioR This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #14

                              Giraffe In Giraffe Out

                              J 1 Reply Last reply
                              6
                              • lemjukes@sopuli.xyzL This user is from outside of this forum
                                lemjukes@sopuli.xyzL This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #15

                                BIG Gorilla in BIG Gorilla out?

                                1 Reply Last reply
                                1
                                • hoshikarakitaridia@lemmy.worldH [email protected]

                                  Social engineering is probably 95% of modern attack vectors. And that's not even unexpected, some highly regarded computer scientists and security researchers concluded this more than a decade ago.

                                  Q This user is from outside of this forum
                                  Q This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by [email protected]
                                  #16

                                  I work in security and I kinda doubt this. There are plenty of issues just like what is outlined here that would be much easier to exploit than social engineering. Social engineering costs a lot more than GET /secrets.json.

                                  There is good reason to be concerned about both, but 95% sounds way off and makes it sound like companies should allocate significantly more time to defend against social engineering, when they should first try to ensure social engineering is the easiest way to exploit their system. I can tell you from about a decade of experience that it typically isn't.

                                  K 1 Reply Last reply
                                  19
                                  • lena@gregtech.euL [email protected]
                                    This post did not contain any content.
                                    Q This user is from outside of this forum
                                    Q This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by [email protected]
                                    #17

                                    Not a big fan of the wording here. Plenty of skilled programmers make dumb mistakes. There should always be systems in place to ensure these dumb mistakes don't make it to production. Especially when related to sensitive information. Where was the threat model and the system in place to enforce it? The idea that these problems are caused by "shit programmers" misses the real issue: there was either no system or an insufficient system to test features and define security requirements.

                                    P R 2 Replies Last reply
                                    3
                                    • rayquetzalcoatl@lemmy.worldR [email protected]

                                      Fantastic for building BaaS apps

                                      J This user is from outside of this forum
                                      J This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #18

                                      Bullshit as a Service?

                                      rayquetzalcoatl@lemmy.worldR 1 Reply Last reply
                                      5
                                      • rhaedas@fedia.ioR [email protected]

                                        Giraffe In Giraffe Out

                                        J This user is from outside of this forum
                                        J This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #19

                                        Gorilla In Giraffe Out

                                        That would be the real trick.

                                        1 Reply Last reply
                                        13
                                        • J [email protected]

                                          Bullshit as a Service?

                                          rayquetzalcoatl@lemmy.worldR This user is from outside of this forum
                                          rayquetzalcoatl@lemmy.worldR This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #20

                                          Bananas as a Service 🙂

                                          cupcakezealot@piefed.blahaj.zoneC 1 Reply Last reply
                                          5
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups