Smarter mitigation:
ubuntu@primary:~$ rm /*
rm: cannot remove '/bin': Permission denied
rm: cannot remove '/boot': Is a directory
rm: cannot remove '/dev': Is a directory
rm: cannot remove '/etc': Is a directory
rm: cannot remove '/home': Is a directory
rm: cannot remove '/lib': Permission denied
rm: cannot remove '/lost+found': Is a directory
rm: cannot remove '/media': Is a directory
rm: cannot remove '/mnt': Is a directory
rm: cannot remove '/opt': Is a directory
rm: cannot remove '/proc': Is a directory
rm: cannot remove '/root': Is a directory
rm: cannot remove '/run': Is a directory
rm: cannot remove '/sbin': Permission denied
rm: cannot remove '/snap': Is a directory
rm: cannot remove '/srv': Is a directory
rm: cannot remove '/sys': Is a directory
rm: cannot remove '/tmp': Is a directory
rm: cannot remove '/usr': Is a directory
rm: cannot remove '/var': Is a directory
Permissions, as it turns out, are a thing.
In Windows, it might not be trivial to prevent the main user of the machine to delete everything in the root of a file system... don't know, I'm about 25 years out of date in my Windows knowledge- however, every LLM tool I've worked with has strong sandboxing because it's well known that LLMs can be fucking psychotic.
If you bypass that sandbox, you've just let a fucking toddler with bizarrely impressive code generation skills have direct authenticated access to your computer. What follows is predictable, and on you.