logoalt Hacker News

hellcowtoday at 5:53 PM1 replyview on HN

It seems feasible to use a small/cheap model to flag possible vulnerabilities, and then use a more expensive model to do a second-pass to confirm those, rather than on every file. Could dramatically reduce the total cost and speed up the process.


Replies

conceptiontoday at 6:00 PM

Does it? I don’t see quality from small models being high enough to be able to effectively scour a code based like this.