Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ AI Hallucinated a Dependency. So a Cybersecurity Researcher Built It as Proof-of-Concept Malware

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š AI Hallucinated a Dependency. So a Cybersecurity Researcher Built It as Proof-of-Concept Malware


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: it.slashdot.org

"Several big businesses have published source code that incorporates a software package previously hallucinated by generative AI," the Register reported Thursday "Not only that but someone, having spotted this reoccurring hallucination, had turned that made-up dependency into a real one, which was subsequently downloaded and installed thousands of times by developers as a result of the AI's bad advice, we've learned." If the package was laced with actual malware, rather than being a benign test, the results could have been disastrous. According to Bar Lanyado, security researcher at Lasso Security, one of the businesses fooled by AI into incorporating the package is Alibaba, which at the time of writing still includes a pip command to download the Python package huggingface-cli in its GraphTranslator installation instructions. There is a legit huggingface-cli, installed using pip install -U "huggingface_hub[cli]". But the huggingface-cli distributed via the Python Package Index (PyPI) and required by Alibaba's GraphTranslator โ€” installed using pip install huggingface-cli โ€” is fake, imagined by AI and turned real by Lanyado as an experiment. He created huggingface-cli in December after seeing it repeatedly hallucinated by generative AI; by February this year, Alibaba was referring to it in GraphTranslator's README instructions rather than the real Hugging Face CLI tool... huggingface-cli received more than 15,000 authentic downloads in the three months it has been available... "In addition, we conducted a search on GitHub to determine whether this package was utilized within other companies' repositories," Lanyado said in the write-up for his experiment. "Our findings revealed that several large companies either use or recommend this package in their repositories...." Lanyado also said that there was a Hugging Face-owned project that incorporated the fake huggingface-cli, but that was removed after he alerted the biz. "With GPT-4, 24.2 percent of question responses produced hallucinated packages, of which 19.6 percent were repetitive, according to Lanyado..." Thanks to long-time Slashdot reader schneidafunk for sharing the article.

Read more of this story at Slashdot.

...



๐Ÿ“Œ Bing 'Hallucinated' the Winner of the Super Bowl Four Days Before it Happened


๐Ÿ“ˆ 31.88 Punkte

๐Ÿ“Œ The Hallucinated Rows Incident


๐Ÿ“ˆ 31.88 Punkte

๐Ÿ“Œ AI Hallucinated Packages Fool Unsuspecting Developers


๐Ÿ“ˆ 31.88 Punkte

๐Ÿ“Œ Dependency (Supply Chain) Analysis & Remediation - Dependabot / Snyk / Fossa / Jfrog Xray / OWASP Dependency Check


๐Ÿ“ˆ 31.36 Punkte

๐Ÿ“Œ Samsung says the only cure for tech dependency is more tech dependency


๐Ÿ“ˆ 31.36 Punkte

๐Ÿ“Œ La soluciรณn definitiva: (Dependency injection, Dependency inversion, Inversion of control y Hexagonal architecture)


๐Ÿ“ˆ 31.36 Punkte

๐Ÿ“Œ ๐ŸGoodbye Dependency Hell: Discover Pipx, the Python Package Manager that Solves Dependency Conflicts


๐Ÿ“ˆ 31.36 Punkte

๐Ÿ“Œ Kryptowรคhrungen: Das unterscheidet Proof-of-Work und Proof-of-Stake


๐Ÿ“ˆ 25.56 Punkte

๐Ÿ“Œ WHAT IS THE DIFFERENCE BETWEEN PROOF OF WORK AND PROOF OF STAKE?


๐Ÿ“ˆ 25.56 Punkte

๐Ÿ“Œ Researcher Cracks 'Hacker-Proof' Crypto Wallet


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ Researcher Develops Explosion-Proof Lithium Metal Battery With 2X Power of Lithium-Ion


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ Researcher Cracks 'Hacker-Proof' Crypto Wallet


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ How I Built an Anonymous Voting System on the Ethereum Blockchain Using Zero-Knowledge Proof


๐Ÿ“ˆ 23.08 Punkte

๐Ÿ“Œ How we ran a Unix-like OS (Xv6) on our home-built CPU with our home-built C compiler


๐Ÿ“ˆ 20.6 Punkte

๐Ÿ“Œ If Android were to be built today, which parts of it could be built with mainstream GNU/Linux components? (i.e.: glibc and not bionic)


๐Ÿ“ˆ 20.6 Punkte

๐Ÿ“Œ Will Cybersecurity Remain Recession-Proof in 2023?


๐Ÿ“ˆ 18.03 Punkte

๐Ÿ“Œ Future Proof Your Business from Cybersecurity Threats


๐Ÿ“ˆ 18.03 Punkte

๐Ÿ“Œ Data-backed insights for future-proof cybersecurity strategies


๐Ÿ“ˆ 18.03 Punkte

๐Ÿ“Œ Your Mac is not malware-proof: a look at the threats and defenses


๐Ÿ“ˆ 17.39 Punkte

๐Ÿ“Œ New malware found using Google Drive as its command and control server with proof


๐Ÿ“ˆ 17.39 Punkte

๐Ÿ“Œ Malicious proof-of-concepts are exposing GitHub users to malware and more


๐Ÿ“ˆ 17.39 Punkte

๐Ÿ“Œ What Does It Take To Be a Cybersecurity Researcher?


๐Ÿ“ˆ 16.94 Punkte

๐Ÿ“Œ Researcher Finds Vulnerabilities in Products of 10 Cybersecurity Vendors


๐Ÿ“ˆ 16.94 Punkte

๐Ÿ“Œ The cybersecurity researcher Dan Kaminsky has died


๐Ÿ“ˆ 16.94 Punkte

๐Ÿ“Œ WikiLeaks Turkish AKP Email Dumps Contain Malware; Researcher


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ Malware Authors Rename Ransomware After Emsisoftโ€™ Security Researcher


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ WikiLeaks Turkish AKP Email Dumps Contain Malware; Researcher


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ WikiLeaks Turkish AKP Email Dumps Contain Malware; Researcher


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ Malware Authors Rename Ransomware After Emsisoftโ€™ Security Researcher


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ WikiLeaks Turkish AKP Email Dumps Contain Malware; Researcher


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ Keynote address: One man's anti-malware researcher is...


๐Ÿ“ˆ 16.3 Punkte

๐Ÿ“Œ WannaCry researcher denies creating banking malware at court hearing


๐Ÿ“ˆ 16.3 Punkte











matomo