LLM-generated passwords (generated directly by the LLM, rather than by an agent using a tool) appear strong, but are fundamentally insecure, because LLMs are designed to predict tokens – the opposite of securely and uniformly sampling random characters.
Why not do this…
Corect horse battery stapleMany password manager generators already do (use the “memorable” type).
The problem is that in this case, the LLM just naively auto-completes a password from what it knows a password to most likely look like.
It is possible to enable an LLM to call external tools and to provide it with instructions, so that it’s likely to auto-complete the tool call instead. Then you could have it call a tool to generate a correct horse battery staple, or a completely random password by e.g. calling the
pwgencommand on Linux.But yeah, that just isn’t what this article is about. It’s specifically about cases where an LLM is used without tool calls and therefore naively auto-completes the most likely password-like string.
I’m kinda interested how nany accounts you could log in with those strings :D
pls don’t spread my password around like that
Yes!
QuiltedNematoadNotepad486
LLM-generated passwords
This is akin to asking Karen from accounting to generate a password for you, and trusting that it will be a true random and secure password and that she won’t yap about it to everyone.
That statement is one of the painfully dumbest things I’ve read in my life, and I’ve read the bible.
Not again this horrible web design/engine whatever laggin/stuttering the way it almost induce a epileptic seizure in me.
Irregular ? Like my bowel movements ?




