| ▲ | gilrain 5 hours ago | ||||||||||||||||||||||
Automated vulnerability discovery via LLM. | |||||||||||||||||||||||
| ▲ | ryandrake 3 hours ago | parent | next [-] | ||||||||||||||||||||||
Anyone care to share which models and which prompts actually lead to finding these kinds of vulnerabilities? Or the narrowing-down workflow that can get an LLM to discover them? Surely just telling claude "Find all vulnerabilities in this project LOL" isn't enough? I hope? | |||||||||||||||||||||||
| |||||||||||||||||||||||
| ▲ | pixl97 5 hours ago | parent | prev [-] | ||||||||||||||||||||||
Everyone was talking about how Mythos was overblown marketing, and while it may be, they missed the forest for the trees. Capabilities have been escalating for a year now and we're at the point of widespread impact. I don't suspect we'll see a slowdown for a long time. | |||||||||||||||||||||||