logoalt Hacker News

tptacekyesterday at 8:21 PM1 replyview on HN

Everybody agrees that idiots were spamming curl with random just-plausible-enough-seeming output from old models.


Replies

tomjakubowskiyesterday at 8:32 PM

It sounds like what makes the pipeline in the article effective is the second stage, which takes in the vulnerability reports produced by the first level and confirms or rejects them. The article doesn't say what the rejection rate is there.

I don't think the spammers would think to write the second layer, they would most likely pipe the first layer (a more naive version of it too, probably) directly to the issue feed.

show 1 reply