Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Exactly, from technical perspective it's a nothing story.

I think that one thing it points to is how technology can discover novel iterations on a system. Imagine if this was a system modeled around a network and the agent was trying to figure out how to get from the outside to read a specific system asset. With the right (read: very detailed) modeling you could create a pentesting agent.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: