logoalt Hacker News

embedding-shapetoday at 4:33 PM2 repliesview on HN

Guess that kind of depends on your definition of "source", I personally wouldn't really agree with you here.


Replies

baqtoday at 4:35 PM

absolutely agree with you if we're talking about clean room reverse engineering; but in the context of finding vulnerabilities it's a completely different story

raddantoday at 8:21 PM

I mean-- to an LLM is there really any difference between the actual source and disassembled source? Informative names and comments probably help them too, but it's not clear that they're necessary.