I believe what they're referring to is the training of models on open source code, which is then used to generate closed source code. The break in connection you mention makes it *not* legally infringement, but now code derived from open source is closed source. Because of the untested nature of the situation, it's unclear how it would unfold, likely hinging on how the request was formed. We have similar precedent with reverse engineering, but the non sentient tool doing it makes it complicated.