Open dennych0u opened 1 year ago
Can this model be used to detect logic vulnerabilities in code, such as unauthorized access vulnerabilities, Horizontal Escalation Vulnerabilities, etc.
If you have labeled data to fine-tune model, the model can be used to detect.
Can this model be used to detect logic vulnerabilities in code, such as unauthorized access vulnerabilities, Horizontal Escalation Vulnerabilities, etc.