logoalt Hacker News

robot_jesusyesterday at 6:50 PM0 repliesview on HN

The "Four lessons" that came out of running this work at scale made me chuckle. Three of the four were essentially identical and entirely obvious. In short: specific, narrow requests work better than "find vulnerabilities." Well, d'uh.

But, I did think the adversarial review (while not novel at all and talked about much in HN circles) is interesting and distinct, at least. I need to put this to work in more of workflows. I think it could be beneficial for non-coding tasks, too.

https://blog.cloudflare.com/cyber-frontier-models/#what-a-ha...