Neither of those is large enough scale for people to try to take advantage of the algorithm.
Come to think of it, in both cases, people could still use it for learning the algorithms in general. Knowing how Wikia Search worked would teach you a thing or two about search engine optimization, and knowing the specific vulnerabilities ClamAV protects against can tell you what you can take advantage of. It would be impossible to trace either of these effects back to the source, so we can’t be sure it hasn’t happened.
knowing the specific vulnerabilities ClamAV protects against can tell you what you can take advantage of.
In this vein, you can do even better with binary updates for vulnerabilities (such as Windows Update). They can be automatically rewritten into exploits: “Automatic Patch-Based Exploit Generation” (LtU).
Neither of those is large enough scale for people to try to take advantage of the algorithm.
Come to think of it, in both cases, people could still use it for learning the algorithms in general. Knowing how Wikia Search worked would teach you a thing or two about search engine optimization, and knowing the specific vulnerabilities ClamAV protects against can tell you what you can take advantage of. It would be impossible to trace either of these effects back to the source, so we can’t be sure it hasn’t happened.
In this vein, you can do even better with binary updates for vulnerabilities (such as Windows Update). They can be automatically rewritten into exploits: “Automatic Patch-Based Exploit Generation” (LtU).