**Title:** Stack-based Buffer Overflow in TELNET NEW_ENV Option Handling **Vulnerability Description:** **Summary:** A stack-based buffer overflow vulnerability exists in the `libcurl` TELNET handler. When `libcurl` connects to a malicious TELNET server, the server can trigger an overflow by sending a `NEW_ENVIRON SEND` request. This causes the client to construct a response that overwrites...
@Exagone313 @bagder The second one is funny in hindsight given today you can immediately tell from the wording it's just copied directly off of ChatGPT.
"Hello <user>,
Certainly! Let me elaborate on the concerns raised by the triager:
[...]
I hope this clarifies the concerns. If you have any further questions or need additional details, feel free to ask."
ChatGPT LOVES its "Certainly!" starter.
They didn't even bother writing a comprehensive LLM command not to use the default slop wording.
AI slop. Reported as abuse. Banned from the project.
unfathomably based. even that is more effort than they deserve.