Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AwrmqJDKu53KfzorIm by [email protected]
More posts by [email protected]
Post #AwrgZTsvNRlf7hrf60 by [email protected]
0 likes, 1 repeats
Companies are touting new AI-based vulnerability detection tools by citing resu…
Post #AwrgrajWeaW5Zl6VrE by [email protected]
0 likes, 1 repeats
@dangoodin replace your human programmers with AI driven vibe coding. Replace y…
Post #AwrmqJDKu53KfzorIm by [email protected]
0 likes, 1 repeats
@dangoodin my personal “baloney detector” for evaluating security scanners …
Post #Awrnxoh6MMC8I7syR6 by [email protected]
0 likes, 1 repeats
@dangoodin to reframe their real world test slightly, recall rate was only 0.26…
Post #Awrta8V5fUYIUiMJzU by [email protected]
0 likes, 1 repeats
@0xF21D @dangoodin supplementing might make sense. Replacement? Not yet, and ma…
Post #AwtcezKdsG3kbO7TrE by [email protected]
0 likes, 1 repeats
@mweiss @dangoodin not with our current trash fire LLMs that require us to boil…
Post #Aww2xrF1AKNs8T4Dfk by [email protected]
0 likes, 0 repeats
@dangoodin penetrate and patch AND "basnessometers" will not secure #…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.