[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"tag-autonomous-exploitation":3},{"tag":4,"articles":10},{"id":5,"name":6,"slug":7,"article_count":8,"description_zh":9,"description_en":9},"774fd958-73f6-4779-bf74-c7ea65b8c484","autonomous exploitation","autonomous-exploitation",0,null,[11],{"id":12,"slug":13,"title":14,"summary":15,"category":16,"image_url":17,"cover_image":17,"language":18,"created_at":19},"902b314d-316c-48aa-9a2a-e4d16f32d2ac","browser-exploit-benchmarks-prove-ai-security-here-zh","為什麼瀏覽器 exploit 基準已證明 AI 安全威脅就在眼前","Claude Mythos 與 GPT-5.5 的 benchmark 結果顯示，自主瀏覽器漏洞利用已是現實能力，不是未來威脅。","research","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1779019382261-mfmw.png","zh","2026-05-17T08:03:21.360298+00:00"]