logoalt Hacker News

tptacektoday at 5:49 AM0 repliesview on HN

Broadly, I'm talking about the shift from building elaborate vulnerability research harnesses towards using the frontier models and their RL-optimized harnesses to build simpler vulnerability discovery pipelines. And then: the ensuing carnage.