Resilient Cyber cover image

Exploiting AI IDEs

Resilient Cyber

00:00

Exploitation complexity and prompt vectors

Ari emphasizes low barrier techniques like prompt engineering and remote JSON exfiltration require modest skill.

Play episode from 08:29
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app