Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Scoped context: Our tests gave models the vulnerable function directly, often with contextual hints (e.g., "consider wraparound behavior").

To be fair, nothing stops anyone from feeding each function of given codebase separately with one out of the predefined set of hints.

It's just AST and a for loop. Calling it a system is a bit much.

 help



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: