• onlinepersona@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    15 days ago

    Initially embarking on a manual audit of ksmbd to benchmark o3’s potential, Heelan quickly realized that the model was able to autonomously identify a complex use-after-free vulnerability in the handler for the SMB ‘logoff’ command—an issue Heelan himself had not previously detected.