This article only rehashes primary sources that have already been submitted to HN (including the original researcher’s). The story itself is almost a month old now, and this article reveals nothing new.
The researcher who first reported the vuln has their writeup at https://adnanthekhan.com/posts/clinejection/
Previous HN discussions of the orginal source: https://news.ycombinator.com/item?id=47064933
But neither of the previous HN submissions reached the front page. The benefit of this article is that it got to the front page and so raised awareness.
The original vuln report link is helpful, thanks.
Thats what the second chance pool is for
The guidelines talk about primary sources and story about a story submisisons https://news.ycombinator.com/newsguidelines.html
Creating a new URL with effectively the same info but further removed from the primary source is not good HN etiquette.
Plus this is just content marketing for the ai security startup who posted it. Theyve added nothing, but get a link to their product on the front page ¯\_(ツ)_/¯
It was content marketing, but tbf the explanation (to me) was of sufficiently high quality and clearly written, with the sales part right at the end.
Have to agree, at least through most of what I read it felt well written and didn't feel sales-pitch-y.
Unfortunately it's kind of random what makes it to the front page. If HN had a mechanism to ensure only primary sources make it, automatically replacing secondary sources that somehow rank highly, I'd be all for that, but we don't have that.
Instead HN has human moderators, who often make changes in response to these kinds of things being pointed out. Which is quite a luxury these days!
>, and this article reveals nothing new
>Thats what the second chance pool is for
>Creating a new URL with effectively the same info but further removed from the primary source is not good HN etiquette.
I'm going to respectfully disagree with all the above and thank the submitter for this article. It is sufficiently different from the primary source and did add new information (meta commentary) that I like. The title is also catchier which may explain its rise to the front page. (Because more of us recognize "Github" than "Cline").
The original source is fine but it gets deep into the weeds of the various config files. That's all wonderful but that actually isn't what I need.
On the other hand, this thread's article is more meta commentary of generalized lessons, more "case study" or "executive briefing" style. That's the right level for me at the moment.
If I was a hacker trying to re-create this exploit -- or a coding a monitoring tool that tries to prevent these kinds of attacks, I would prefer the original article's very detailed info.
On the other hand, if I just want some highlights that raises my awareness of "AI tricking AI", this article that's a level removed from the original is better for that purpose. Sometimes, the derived article is better because it presents information in a different way for a different purpose/audience. A "second chance pool" doesn't help a lot of us because it still doesn't change the article to a shorter meta commentary type of article that we prefer.
The thread's article consolidated several sources into a digestible format and had the etiquette of citations that linked backed to the primary source urls.
100%. Original source was posted 3 times and never gained traction because it is not written for the general audience.
> Plus this is just content marketing for the ai security startup who posted it. Theyve added nothing, but get a link to their product on the front page ¯\_(ツ)_/¯
This. I want to support original researchers websites and discussions linking to that rather than AI startup which tries to report the same which ends up on front page.
Today I realized that I inherently trust .ai domains less than other domains. It always feel like you have to mentally prepare your mind that the likelihood of being conned is higher.