@Fuego New exploit class?
@Fuego Wouldn't shock me. Lots of optimizations fall into a general pattern of short-circuiting what a system's been told to do with something else that provides the same output in less time through side effects. Those side effects have predictable impacts on the system that are invisible to the software, and thus can be leveraged to permit operations the software can't prevent.
@literorrery even apart from those side effects, optimizations are using some extra information to make these short circuit decisions so you can always infer the information. Further, you can sometimes control the short circuit if you can influence the extra information.
@Fuego So, what you're saying is that there are multiple avenues for an attacker to exploit the concept of optimization, because optimization represents the system interacting with stuff outside the software's control while reporting to the software that everything is normal. And any gap between what a system does and what it reports it did is a potential vector. And that's how we get Twitch Plays Amazon, or whatever the next TASBot masterpiece is.
@literorrery @Fuego I think this honestly holds true in systems design as a whole