Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Privacy & Online Earning»EFF’s Policy on LLM-Assisted Contributions to Our Open-Source Projects
    Privacy & Online Earning

    EFF’s Policy on LLM-Assisted Contributions to Our Open-Source Projects

    adminBy adminFebruary 20, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    EFF’s Policy on LLM-Assisted Contributions to Our Open-Source Projects
    Share
    Facebook Twitter LinkedIn Pinterest Email

    We recently introduced a policy governing large language model (LLM) assisted contributions to EFF’s open-source projects. At EFF, we strive to produce high quality software tools, rather than simply generating more lines of code in less time. We now explicitly require that contributors understand the code they submit to us and that comments and documentation be authored by a human.

    LLMs excel at producing code that looks mostly human generated, but can often have underlying bugs that can be replicated at scale. This makes LLM-generated code exhausting to review, especially with smaller, less resourced teams. LLMs make it easy for well-intentioned people to submit code that may suffer from hallucination, omission, exaggeration, or misrepresentation.

    It is with this in mind that we introduce a new policy on submitting LLM-assisted contributions to our open-source projects. We want to ensure that our maintainers spend their time reviewing well thought out submissions. We do not completely outright ban LLMs, as their use has become so pervasive a blanket ban is impractical to enforce.

    Banning a tool is against our general ethos, but this class of tools comes with an ecosystem of problems. This includes issues with code reviews turning into code refactors for our maintainers if the contributor doesn’t understand the code they submitted. Or the sheer scale of contributions that could come in as AI generated code but is only marginally useful or potentially unreviewable. By disclosing when you use LLM tools, you help us spend our time wisely.

    EFF has described how extending copyright is an impractical solution to the problem of AI generated content, but it is worth mentioning that these tools raise privacy, censorship, ethical, and climatic concerns for many. These issues are largely a continuation of tech companies’ harmful practices that led us to this point. LLM generated code isn’t written on a clean slate, but born out of a climate of companies speedrunning their profits over people. We are once again in “just trust us” territory of Big Tech being obtuse about the power it wields. We are strong  advocates of using tools to innovate and come up with new ideas. However, we ask you to come to our projects knowing how to use them safely.

    Contributions EFFs LLMAssisted opensource policy projects
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAndroid System WebView 145.0.7632.79 APK Download by Google LLC
    Next Article INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
    admin
    • Website

    Related Posts

    8 Best Robo-Advisors of March 2026

    March 4, 2026

    EFF to Third Circuit: Electronic Device Searches at the Border Require a Warrant

    March 4, 2026

    March 2026 (earn up to $3,000)

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Apple March Event Live Blog: MacBook Neo, iPhone 17e, M5 Macs, and More

    March 4, 2026

    VMware Aria Operations Vulnerability Exploited in the Wild

    March 4, 2026

    From SEO volume to brand fame

    March 4, 2026

    CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    March 4, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (592)
    • Privacy & Online Earning (88)
    • SEO & Digital Marketing (372)
    • Tech Tools & Mobile / Apps (728)
    • WiFi / Internet & Networking (106)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Apple March Event Live Blog: MacBook Neo, iPhone 17e, M5 Macs, and More

    March 4, 2026

    VMware Aria Operations Vulnerability Exploited in the Wild

    March 4, 2026

    From SEO volume to brand fame

    March 4, 2026
    Most Popular
    • Apple March Event Live Blog: MacBook Neo, iPhone 17e, M5 Macs, and More
    • VMware Aria Operations Vulnerability Exploited in the Wild
    • From SEO volume to brand fame
    • CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
    • Why Atlas & Comet Are Unlikely To Win The AI Browser War
    • Avatar: Realms Collide 1.4.815 APK Download by Tilting Point
    • AMD accelerates telecom network AI
    • Why workforce identity is still a vulnerability, and what to do about it
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.