logoalt Hacker News

nicceyesterday at 9:19 PM2 repliesview on HN

One interesting thing is that this makes closed source code even greater asset for the defenders. Attacker cannot spend tokens for it, but defenders can spend tokens for hardening based on source code, while attacker is stuck with blackbox testing.


Replies

watusernameyesterday at 10:39 PM

You would be surprised how adept SOTA models are at reverse engineering with IDA/Ghidra or even plain old objdump. Opus basically knows IDAPython on the back of its hand.

show 1 reply
j2kunyesterday at 9:36 PM

Decompilation is quite good these days as well