Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I agree, I tried RE using multiple tools connected to MCP and a agent, it was tasked to recreate what the source code might have looked like from a binary and what possible vulnerabilities there could be. It did a incredible job when I compared it to the actual source.
 help



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: