Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, and these tools are already being used defensively, e.g. in Google Big Sleep

https://projectzero.google/2024/10/from-naptime-to-big-sleep...

List of vulnerabilities found so far:

https://issuetracker.google.com/savedsearches/7155917



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: