logoalt Hacker News

MangoToupeyesterday at 4:59 PM1 replyview on HN

> if someone finds a security vulnerability in a commonly-emitted-by-LLMs code pattern

how do you distinguish this from injecting a vulnerable dependency to a dependency list?


Replies

Retr0idyesterday at 6:36 PM

You can more easily check for known-vulnerable dependencies

show 1 reply