Thanks to WikiLeaks, antivirus vendors will soon be able to figure out if you have been hacked by the CIA.On Tuesday, WikiLeaks dumped a trove of 8,700 documents that allegedly detail the CIA\u2019s secret hacking operations, including spying tools designed for mobile phones, PCs and smart TVs.WikiLeaks has redacted the actual source code from the files to prevent the distribution of cyber weapons, it said. Nevertheless, the document dump -- if real -- still exposes some of the techniques that the CIA has allegedly been using.Among those techniques are ways to bypass antivirus software from vendors including Avira, Bitdefender and Comodo, according to some of the leaked documents.The CIA's playbook out in the openThe documents even include some snippets of code that antivirus vendors can use to detect whether a hacking attempt may have come from the CIA, said Jake Williams, founder of security company Rendition InfoSec.\u201cIn the documents, they (the CIA) mention specific code snippets used in operational tools,\u201d Williams said. Antivirus vendors can use this to look at their customers\u2019 networks for any traces of past intrusions.That might be a big blow to the CIA\u2019s surveillance operations. Now anyone, including foreign governments, can use the WikiLeaks dump to figure out if the CIA ever targeted them, according to Williams.\u201cI would bet my bank account that the hackers of the CIA have spent all day trying to remove their tools from high value networks,\u201d he said.WikiLeaks hasn\u2019t said who supplied the secret documents. But the anonymous source is hoping to spark debate over whether the CIA abused its authority by developing so many hacking tools without public oversight, WikiLeaks said. \u00a0"There is an extreme proliferation risk in the development of cyber 'weapons',\u201d WikiLeaks founder Julian Assange added in a statement.But some security researchers believe WikiLeaks is trying to mislead the public by exaggerating the CIA's hacking capabilities. \u201cThe press is getting taken for a ride today,\u201d said Will Strafach, CEO of Sudo Security Group who studies vulnerabilities in Apple\u2019s iOS.How real are the risks?Although WikiLeaks has said the CIA documents show the agency can hack iPhones and Android smartphones for spying purposes, consumers shouldn\u2019t necessarily be concerned, he said.That\u2019s because the dumped documents mostly mention exploits for iOS that appear to already be publicly known and have been patched.\u201cI have not found anything here that could be a danger to anyone running iOS 10 or above,\u201d Strafach said.Earlier news headlines and a tweet from WikiLeaks on Tuesday also suggested that the CIA hacking tools can bypass the encryption on messaging apps such as WhatsApp and Signal. But there\u2019s no evidence that the CIA ever cracked the encryption, only that the agency developed exploits and malware to take over devices.\u201cThe CIA\/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,\u201d tweeted Open Whisper Systems, which developed the encryption used in the apps.Journalists and security researchers are still looking over the dumped documents. But it doesn\u2019t appear the hacking tools equate to mass surveillance, said Robert Graham, CEO of security firm Errata Security. \u00a0One hacking tool, code-named Weeping Angel, allegedly involves turning a Samsung smart TV into a monitoring device. But the tool seems to only work if a CIA agent can physically install it on the TV. \u00a0\u201cWhen we look at the tools, they really give off the impression that they are used locally,\u201d Graham said. \u201cThat some CIA agent has to walk in. It\u2019s not remote hacking.\u201dQuestions over vulnerabilitiesStill, some privacy advocates are worried by the WikiLeaks document dump. They say it confirms that the U.S. government has known about key vulnerabilities in tech products, but decides to develop hacking tools around them, rather than help vendors patch them.A document in the dump shows that CIA exploits for Apple\u2019s iOS were allegedly purchased from the U.S. National Security Agency, British intelligence or bought from third-party providers.\u00a0The key danger is that malicious groups, such as foreign government hackers, might discover the vulnerabilities too -- putting everyday users in harm's way.\u201cAs these leaks show, we're all made less safe by the CIA's decision to keep -- rather than ensure the patching of -- vulnerabilities,\u201d wrote Cindy Cohn, executive director of privacy advocate, the Electronic Frontier Foundation."Even spy agencies like the CIA have a responsibility to protect the security and privacy of Americans," she said.But others aren't so sure the document dump really shows that the CIA has been stockpiling information about vulnerabilities."It is difficult to tell this from the info we have at this point," Ari Schwartz, a former White House senior director for cybersecurity, said in an email. "Questions that I would have are:\u00a0 Are they really previously unknown?"