logoalt Hacker News

bredrenyesterday at 6:15 PM1 replyview on HN

The article positions the smaller models as capable under expert orchestration, which to be any kind of comparable must include validation.


Replies

Aurornisyesterday at 6:19 PM

Calling it “expert orchestration” is misleading when they were pointing it at the vulnerable functions and giving it hints about what to look for because they already knew the vulnerability.

show 1 reply