Humanlearning commited on
Commit
b0a3f92
·
verified ·
1 Parent(s): 9852074

Update blog/blog.md

Browse files
Files changed (1) hide show
  1. blog/blog.md +3 -3
blog/blog.md CHANGED
@@ -10,11 +10,11 @@ Glasswing is aimed at securing critical software with Claude Mythos Preview, a f
10
 
11
  Large operating systems, browsers, banks, and cloud providers may get access to frontier cybersecurity models and expensive scanning pipelines. Smaller teams, solo developers, open-source maintainers, indie hackers, and "vibe coders" are also shipping real software. Their code handles invoices, accounts, uploads, profiles, subscriptions, internal dashboards, and customer data. They face the same class of vulnerabilities, but they do not have the same budget, security staff, or model access.
12
 
13
- So I built **CyberSecurity_OWASP** around a different idea:
14
 
15
- > If frontier models can scale vulnerability discovery, small RL-trained defenders should scale vulnerability prevention.
16
 
17
- The goal is not another benchmark where an LLM answers security trivia. The goal is an OpenEnv environment where a small open model can learn an actual defensive workflow: inspect an application, understand the intended authorization policy, discover a broken access control bug, patch the code, and preserve legitimate behavior.
18
 
19
  ## Why OWASP A01?
20
 
 
10
 
11
  Large operating systems, browsers, banks, and cloud providers may get access to frontier cybersecurity models and expensive scanning pipelines. Smaller teams, solo developers, open-source maintainers, indie hackers, and "vibe coders" are also shipping real software. Their code handles invoices, accounts, uploads, profiles, subscriptions, internal dashboards, and customer data. They face the same class of vulnerabilities, but they do not have the same budget, security staff, or model access.
12
 
13
+ So I built **CyberSecurity_OWASP** around that idea:
14
 
15
+ > If frontier models can scale vulnerability discovery, small RL-trained defenders should scale **vulnerability prevention**.
16
 
17
+ The goal is an OpenEnv environment where a small open model ( in this case **Gemma 4 E2B**) can learn an actual defensive workflow: inspect an application, understand the intended authorization policy, discover a broken access control bug, patch the code, and preserve legitimate behavior.
18
 
19
  ## Why OWASP A01?
20