| ▲ | embedding-shape 4 hours ago | |
Guess that kind of depends on your definition of "source", I personally wouldn't really agree with you here. | ||
| ▲ | baq 4 hours ago | parent | next [-] | |
absolutely agree with you if we're talking about clean room reverse engineering; but in the context of finding vulnerabilities it's a completely different story | ||
| ▲ | raddan 30 minutes ago | parent | prev [-] | |
I mean-- to an LLM is there really any difference between the actual source and disassembled source? Informative names and comments probably help them too, but it's not clear that they're necessary. | ||