@kurtseifried @joshbressers so i read the paper and like.
Idk what to think of it but it is one of the crappiest piece of research i have seen in a long time. What the heck is "succesful exploit" from their pov?
Also these are exploit that a script can already exploit. Can someone explain to me what is the scary part here?
At best i can expect pseudo ddos from people trying to reproduce it with hundreds of shit llms
Also that cost analysis is impressively bad. We know llm cost are far bigger