logoalt Hacker News

reactordevyesterday at 11:09 AM3 repliesview on HN

The trick here was providing the firmware source code so it could see your vulnerabilities.


Replies

peteeyesterday at 11:24 AM

What would be the difficulty level for it to just read the machine code; are these models heavily relying on human language for clues?

show 4 replies
pjc50yesterday at 11:16 AM

That's a pretty big gimme!

russdillyesterday at 5:17 PM

It's not a far step from having the firmware binaries and doing analysis with ghidra, etc.