Imagine if hackers find out about throwing lots of GPU and CPU power to aggressively search the exploitable surface area of a program or try and crack passwords or something. And it might even learn about the program and look for weird novel paths through the code. Terrifying