| ▲ | concinds 3 hours ago | ||||||||||||||||||||||
These models demonstrably have good vulnerability research capabilities. I'm sure their marketing department is ecstatic but you guys are far more hype-based than what you're calling out. | |||||||||||||||||||||||
| ▲ | authnopuz 2 hours ago | parent | next [-] | ||||||||||||||||||||||
Good but not necessarily better that was is already pay-as-you-go available today. ref. https://www.flyingpenguin.com/the-boy-that-cried-mythos-veri... This AISLE benchmark is interesting in this matter: https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jag... And the recently discovered Copy Fail by Xint code is another proof that the gating is overblown: https://xint.io/blog/copy-fail-linux-distributions | |||||||||||||||||||||||
| ▲ | ZyanWu 3 hours ago | parent | prev [-] | ||||||||||||||||||||||
> demonstrably I'm not entirely up to date on each week's LLM hype train/scandal but last I heard there was no public access to it or public-trusted 3rd parties that can review model's capabilities | |||||||||||||||||||||||
| |||||||||||||||||||||||