WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2026 Poal.co

216

I have been tinkering with "AI" to reverse engineer an Android app that requires a remote server to work. It is shockingly going far better than I would have expected....

Archive: https://archive.today/t1prr

From the post:

>For the last two years, technologists have ominously predicted that AI coding agents will be responsible for a deluge of security vulnerabilities. They were right! Just, not for the reasons they thought. Within the next few months, coding agents will drastically alter both the practice and the economics of exploit development. Frontier model improvement won’t be a slow burn, but rather a step function. Substantial amounts of high-impact vulnerability research (maybe even most of it) will happen simply by pointing an agent at a source tree and typing “find me zero days”.

I have been tinkering with "AI" to reverse engineer an Android app that requires a remote server to work. It is shockingly going far better than I would have expected.... Archive: https://archive.today/t1prr From the post: >>For the last two years, technologists have ominously predicted that AI coding agents will be responsible for a deluge of security vulnerabilities. They were right! Just, not for the reasons they thought. Within the next few months, coding agents will drastically alter both the practice and the economics of exploit development. Frontier model improvement won’t be a slow burn, but rather a step function. Substantial amounts of high-impact vulnerability research (maybe even most of it) will happen simply by pointing an agent at a source tree and typing “find me zero days”.

Be the first to comment!