illusionist@lemmy.zip to Programmer Humor@lemmy.ml · 4 days agoChild labour with 10 years of experience, 'AI-native' accepting 250k lines of Cursor codelemmy.mlimagemessage-square198fedilinkarrow-up1761arrow-down114 cross-posted to: programmer_humor@programming.dev
arrow-up1747arrow-down1imageChild labour with 10 years of experience, 'AI-native' accepting 250k lines of Cursor codelemmy.mlillusionist@lemmy.zip to Programmer Humor@lemmy.ml · 4 days agomessage-square198fedilink cross-posted to: programmer_humor@programming.dev
minus-squareWhostosay@sh.itjust.workslinkfedilinkarrow-up45·4 days agoThese MFs don’t even pay developers, what makes you think you’re going to hire an actual pentester
minus-squarebountygiver [any]@lemmy.mllinkfedilinkEnglisharrow-up26·edit-24 days agoThe secret is to sell the vulnerabilities in the black market Or perform some huge insider trading with all the meetings details you stole.
minus-square9point6@lemmy.worldlinkfedilinkarrow-up14·4 days agoI guess it depends how legally I want to go about it—there’s always someone that will pay for the exploit details
minus-squareWhostosay@sh.itjust.workslinkfedilinkarrow-up9·4 days agoHell yeah fuck yeah send it brother, just be careful and don’t go after the little guys
minus-squarebountygiver [any]@lemmy.mllinkfedilinkEnglisharrow-up5·4 days agoAt this point, those who rely on LLM to be a magic bullet deserves it.
These MFs don’t even pay developers, what makes you think you’re going to hire an actual pentester
The secret is to sell the vulnerabilities in the black market
Or perform some huge insider trading with all the meetings details you stole.
Bro you have the wrong name
deleted by creator
I guess it depends how legally I want to go about it—there’s always someone that will pay for the exploit details
Hell yeah fuck yeah send it brother, just be careful and don’t go after the little guys
At this point, those who rely on LLM to be a magic bullet deserves it.