Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://nerdculture.de/@bonkers" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>bonkers</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@nixCraft" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nixCraft</span></a></span> +1</p><p>Because <em>noone in their right mind</em> will shove <a href="https://infosec.space/tags/VibeCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VibeCode</span></a>|d <a href="https://infosec.space/tags/AIslop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AIslop</span></a> into <a href="https://infosec.space/tags/CriticalInfrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CriticalInfrastructure</span></a>!</p><ul><li>I'd rather expect <span class="h-card" translate="no"><a href="https://infosec.space/@OS1337" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OS1337</span></a></span> to be used in some sensitive setups because it's simple and auditable and thus may be permitted as an emergency/recovery boot solution to <em>'reimage'</em> a system with a factory system image...</li></ul>