Readit News logoReadit News

Dead Comment

Dead Comment

mattigames commented on Everything that's wrong with Google Search in one image   bitbytebit.substack.com/p... · Posted by u/recroad
peab · 5 months ago
they didn't - hence the ads
mattigames · 5 months ago
But like always they didn't stop once they were a bit profitable with a few ads, instead they got greedier and greedier and made their product worse once they captured most of the market, I have wonder if there can exist some variant of capitalism that punishes becoming a bit too greedy, like a soft ceiling (tied to the minimum wage) over which most of the profits go to taxes, and a hard one where all profits over that go to taxes plus mandatory social work by its owners/executives.
mattigames commented on Getting AI to work in complex codebases   github.com/humanlayer/adv... · Posted by u/dhorthy
scuff3d · 5 months ago
I will never understand why anyone wants to go through all this. I don't believe for a second this is more productive than regular coding with a little help from the LLM.
mattigames · 5 months ago
There is a chunk of devs using AI that do it not because they believe it makes them more productive in the present but because it might do so in the near future thanks to advances on AI tech/models, and then some do it because they think it might be required from them to do it this way by their bosses at some point in the future, so they can show preparedness and give the impression of being up to date with how the field evolves, even if at the end it turns out it doesn't speed up things that much.
mattigames commented on From MCP to shell: MCP auth flaws enable RCE in Claude Code, Gemini CLI and more   verialabs.com/blog/from-m... · Posted by u/stuxf
eranation · 5 months ago
With my limited understanding of LLMs and MCPs (and please correct me if I'm wrong), even without having to exploit an XSS vulnerability as described in the post (sorry for being slightly off topic), I believe MCPs (and any tool calls protocol) suffer from a fundamental issue, a token is a token, hence prompt injection is probably impossible to 100% protect against. The main root cause of any injection attack is the duality of input, we use bytes, (and in many cases in the form of a string) to convey both commands and data, "rm -rf /" can be an input in a document about dangerous commands, or a command passed to a shell command executor by a tool call. To mitigate such injection attacks, in most programming language there are ways to clearly separate data from commands, in the most basic way, via deterministic lexical structure (double quotes) or or escaping / sanitizing user input, denly-list of dangerous keywords (e.g. "eval", "javascript:", "__proto__") or dedicated DSLs for building commands that pass user input separately (Stored procedures, HTML builders, shell command builders). The solution to the vulnerability in the post is one of them (sanitizing user input / deny-list)

But even if LLMs will have a fundamental hard separation between "untrusted 3rd party user input" (data) and "instructions by the 1st party user that you should act upon" (commands) because LLMs are expected to analyze the data using the same inference models as interpreting commands, there is no separate handling of "data" input vs "command" input to the best of my understanding, therefore this is a fundamentally an unsolvable problem. We can put guardrails, give MCPs least privilege permissions, but even with that confused deputy attacks can and will happen. Just like a human can be fooled by a fake text from the CEO asking them to help them reset their password as they are locked out before an important presentation to a customer, and there is no single process that can 100% prevent all such phishing attempts, I don't believe there will be a 100% solution to prevent prompt injection attacks (only mitigated to become statistically improbable or computationally hard, which might be good enough)

Is this a well known take and I'm just exposing my ignorance?

EDIT: my apologies if this is a bit off topic, yes, it's not directly related to the XSS attack in the OP post, but I'm past the window of deleting it.

mattigames · 5 months ago
Aside from being offtopic or not I want to add that it is indeed well known https://news.ycombinator.com/item?id=41649832
mattigames commented on Meta’s live demo fails; “AI” recording plays before the actor takes the steps   reddit.com/r/LivestreamFa... · Posted by u/personjerry
mattigames · 5 months ago
That sounds a bit too much like "this is good for Bitcoin"
mattigames commented on "Your" vs. "My" in user interfaces   adamsilver.io/blog/your-v... · Posted by u/Twixes
Lammy · 5 months ago
> Similarly, a support agent might tell you to “Go to your cases” over webchat or a phone call. This is confusing if the UI says “My cases”.

Simpsons did it https://www.youtube.com/watch?v=vihwYGENbFg

mattigames · 5 months ago
When spoken it helps to tell the user "my cases" in a monotonic voice (and/or slightly lower tone), which hints that is just a verbatim label (the reason this works is because it mimics how a lot of people sound when reading aloud).
mattigames commented on Spotify users ask for a setting to hide AI generated contents but they refuse   community.spotify.com/t5/... · Posted by u/mattigames
crazygringo · 5 months ago
Spotify has probably thousands of feature requests that have been up on their forums for years, that they haven't given an official response to.

That's just how product forums work.

mattigames · 5 months ago
Unlikely that is the case with this particular feature, its a feature request with near 2000 upvotes and more than 340 comments, plus a very hot topic in recent months.

u/mattigames

KarmaCake day2194January 26, 2018View Original