this post was submitted on 18 May 2026
428 points (98.6% liked)
Technology
84816 readers
3910 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
they should make another mailing list for ai generated reports that they totally read, and ban anyone who submits slop to the main one. not sure how feasible it is since spammers will just generate new emails, but at least they would have something clear to point out the malicious intent.
It would likely create more work and just result in two unmanageable mailing lists. Doubling the problem.
Sounds like the perfect solution!
the point being the mail list for ai slop is there just so it doesnt clog the actual one and anyone who breaks that can be blacklisted as malicious actor.
The problem isn't that AI is maliciously spamming the mailing list, it's that AI is able to find and report real or potential security vulnerabilities at rates that no human organization can process fast enough. Open source browsers and Linux have been slammed lately with vulnerabilities found by Mythos.
Aah.. that is indeed a problem since the threats have to be dealt with fast once they are reported since they are now basically public..
If a public tool can find a CVE in minutes to hours, it doesn't matter if some of the people using signed an NDA.
All it takes is someone how isn't going to report it to also find and exploit it
So the exploitation window doesn't start when it is reported it started at when the tool could have found it
llm sure have made world more shitty place..
I mean the alternitive, in this case, was security through obscurity, in which these exploits existed, could be reversed for years, and no one else would know .