42 points | by luu 3 days ago
3 comments
> unauthorized compliance with non-owners, disclosure of sensitive information, execution of destructive system-level actions, denial-of-service conditions, uncontrolled resource consumption, identity spoofing vulnerabilities, cross-agent propagation of unsafe practices, and partial system takeover
Then you slowly reveal they're all humans.
I mean all of in the space already know this but I suppose its important to be showcasing the problems of systems of agents
> unauthorized compliance with non-owners, disclosure of sensitive information, execution of destructive system-level actions, denial-of-service conditions, uncontrolled resource consumption, identity spoofing vulnerabilities, cross-agent propagation of unsafe practices, and partial system takeover
Then you slowly reveal they're all humans.
I mean all of in the space already know this but I suppose its important to be showcasing the problems of systems of agents