Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Coding with LLMs and agents is a generational opportunity to throw the last few decades of hard won lessons on secure coding and appsec out the window.

Coding with LLMs and agents is a generational opportunity to throw the last few decades of hard won lessons on secure coding and appsec out the window.

Scheduled Pinned Locked Moved Uncategorized
2 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • timb_machine@infosec.exchangeT This user is from outside of this forum
    timb_machine@infosec.exchangeT This user is from outside of this forum
    timb_machine@infosec.exchange
    wrote last edited by
    #1

    Coding with LLMs and agents is a generational opportunity to throw the last few decades of hard won lessons on secure coding and appsec out the window. Definitely something that trust and safety teams, threat actors and possibly even your parents are seizing on with glee when they bypass all of your policies and procedures around installing new software, data governance, validated designs, code reviews, principles of least privilege and regular security assessments. Best of luck.

    buherator@infosec.placeB 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • timb_machine@infosec.exchangeT timb_machine@infosec.exchange

      Coding with LLMs and agents is a generational opportunity to throw the last few decades of hard won lessons on secure coding and appsec out the window. Definitely something that trust and safety teams, threat actors and possibly even your parents are seizing on with glee when they bypass all of your policies and procedures around installing new software, data governance, validated designs, code reviews, principles of least privilege and regular security assessments. Best of luck.

      buherator@infosec.placeB This user is from outside of this forum
      buherator@infosec.placeB This user is from outside of this forum
      buherator@infosec.place
      wrote last edited by
      #2
      @timb_machine I'm even more concerned that we forget about basic maintainability too...
      1 Reply Last reply
      0
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups