Spaces:
Sleeping
Sleeping
Update blog/blog.md
Browse files- blog/blog.md +3 -3
blog/blog.md
CHANGED
|
@@ -10,11 +10,11 @@ Glasswing is aimed at securing critical software with Claude Mythos Preview, a f
|
|
| 10 |
|
| 11 |
Large operating systems, browsers, banks, and cloud providers may get access to frontier cybersecurity models and expensive scanning pipelines. Smaller teams, solo developers, open-source maintainers, indie hackers, and "vibe coders" are also shipping real software. Their code handles invoices, accounts, uploads, profiles, subscriptions, internal dashboards, and customer data. They face the same class of vulnerabilities, but they do not have the same budget, security staff, or model access.
|
| 12 |
|
| 13 |
-
So I built **CyberSecurity_OWASP** around
|
| 14 |
|
| 15 |
-
> If frontier models can scale vulnerability discovery, small RL-trained defenders should scale vulnerability prevention.
|
| 16 |
|
| 17 |
-
The goal is
|
| 18 |
|
| 19 |
## Why OWASP A01?
|
| 20 |
|
|
|
|
| 10 |
|
| 11 |
Large operating systems, browsers, banks, and cloud providers may get access to frontier cybersecurity models and expensive scanning pipelines. Smaller teams, solo developers, open-source maintainers, indie hackers, and "vibe coders" are also shipping real software. Their code handles invoices, accounts, uploads, profiles, subscriptions, internal dashboards, and customer data. They face the same class of vulnerabilities, but they do not have the same budget, security staff, or model access.
|
| 12 |
|
| 13 |
+
So I built **CyberSecurity_OWASP** around that idea:
|
| 14 |
|
| 15 |
+
> If frontier models can scale vulnerability discovery, small RL-trained defenders should scale **vulnerability prevention**.
|
| 16 |
|
| 17 |
+
The goal is an OpenEnv environment where a small open model ( in this case **Gemma 4 E2B**) can learn an actual defensive workflow: inspect an application, understand the intended authorization policy, discover a broken access control bug, patch the code, and preserve legitimate behavior.
|
| 18 |
|
| 19 |
## Why OWASP A01?
|
| 20 |
|