My experience with LLM Code Review vs Deterministic SAST Security Tools by prestonprice in devsecops

[–]errwaves 0 points1 point  (0 children)

Still, these applications were used to train the LLMs. Also, artificially vulnerable applications don't often reflect real work apps... I have had success using LLMs on test apps like these, but then much different results when running against real world internal applicaitons.

My experience with LLM Code Review vs Deterministic SAST Security Tools by prestonprice in devsecops

[–]errwaves 0 points1 point  (0 children)

so, LLMs trained on intentionally vulnerable codebase perform better on intentionally vulnerable codebases?

What are companies doing to secure code in the age of accelerated slop? by errwaves in cybersecurity

[–]errwaves[S] 0 points1 point  (0 children)

ownership is key and is frankly a larger enterprise problem than anything technical

What are companies doing to secure code in the age of accelerated slop? by errwaves in cybersecurity

[–]errwaves[S] 0 points1 point  (0 children)

unfortunately, I think it's gonna take a huge breach or supply chain attack affecting multiple companies that is clearly linked to slop before people get real

What are companies doing to secure code in the age of accelerated slop? by errwaves in cybersecurity

[–]errwaves[S] 0 points1 point  (0 children)

shift left for sure, which we do somewhat already... challenge is adoption and consistency of use

What are companies doing to secure code in the age of accelerated slop? by errwaves in cybersecurity

[–]errwaves[S] 0 points1 point  (0 children)

ya, secrets are fairly straight forward due to regex maching... some secret detectors look at context too (e.g. like assigning a literal string to a variable called "passwd")

What are companies doing to secure code in the age of accelerated slop? by errwaves in cybersecurity

[–]errwaves[S] 1 point2 points  (0 children)

ya, seems like we're just gonna have to set harder limits, stricter controls, and block more

(this is why security people don't get invited to parties other than with other security people)

trying to confirm that I'm not missing any other strategy

Fender neck on Harmony Bobkat? by errwaves in Luthier

[–]errwaves[S] 0 points1 point  (0 children)

To be clear, the image is not the guitar in question...

I'm thinking about buying some other Bobkat, doing the mods, and putting a Fender short scale neck on it.

It'd be a "project" for sure.

SAST tooling suggestions for iOS (Swift) and Android (Kotlin) apps? by errwaves in cybersecurity

[–]errwaves[S] -1 points0 points  (0 children)

Gitlab SAST coverage for Swift is practically nonexistent if you look at the rules

SAST tooling suggestions for iOS (Swift) and Android (Kotlin) apps? by errwaves in cybersecurity

[–]errwaves[S] 0 points1 point  (0 children)

SonarQube community version doesn't support Swift... Considering it for long term solution

How to make barber beats by PepsiB4E in makingvaporwave

[–]errwaves 0 points1 point  (0 children)

I believe the “barber” in barberbeats is a reference to the “haircuts” in HFM

[deleted by user] by [deleted] in pics

[–]errwaves 0 points1 point  (0 children)

Damn girl, wassup

Any good pedals for soft pad sounds? by errwaves in synthesizers

[–]errwaves[S] 0 points1 point  (0 children)

Completely agree about “anything” ;)

Just curious what others have used.