• XSS.stack #1 – первый литературный журнал от юзеров форума

ChatGPT to spread malicious packages

УмирающийДракон01

floppy-диск
Пользователь
Регистрация
10.02.2023
Сообщения
3
Реакции
2
A new threat has emerged for web3 developers and it involves the use of ChatGPT.

ChatGPT"s one fallibility is to produce misinformation and create false information. Therefore, if a developer were to utilize ChatGPT as a coding assistance, it is possible for it to suggest a non-existent package which hackers could utilize. If a developer were to blindly accept the suggested code without verifying the validity of the package, then they could inadvertently introduce malicious code into their project, putting their information at risk.

For example, if ChatGPT suggested a fake package named "web3.eth.utils," then a malicious actor could create that package which could be employed with a preinstall script. Preinstall scripts are executed before a package is installed, and they often perform legitimate various tasks such as downloading additional resources. In this case, the malicious preinstall script would run undetected and capture sensitive information such as private keys from the developer's system.

Most developers should be diligent enough to ensure the package they are install is legitimate, but everybody makes mistakes

leave a like if you enjoyed ))

source: twitter.com/realscamsniffer/status/1669622780495814657?s=46&t=lQvA9Sqmp4_ijksYKq05Lg
 
Пожалуйста, обратите внимание, что пользователь заблокирован
A new threat has emerged for web3 developers and it involves the use of ChatGPT.

ChatGPT"s one fallibility is to produce misinformation and create false information. Therefore, if a developer were to utilize ChatGPT as a coding assistance, it is possible for it to suggest a non-existent package which hackers could utilize. If a developer were to blindly accept the suggested code without verifying the validity of the package, then they could inadvertently introduce malicious code into their project, putting their information at risk.

For example, if ChatGPT suggested a fake package named "web3.eth.utils," then a malicious actor could create that package which could be employed with a preinstall script. Preinstall scripts are executed before a package is installed, and they often perform legitimate various tasks such as downloading additional resources. In this case, the malicious preinstall script would run undetected and capture sensitive information such as private keys from the developer's system.

Most developers should be diligent enough to ensure the package they are install is legitimate, but everybody makes mistakes

leave a like if you enjoyed ))

source: twitter.com/realscamsniffer/status/1669622780495814657?s=46&t=lQvA9Sqmp4_ijksYKq05Lg

I read the twitter tweet , it can be done but need to much work they alot of others technique can be more profitable
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх