"Instead of overwhelming the LLM with multiple whole files, it requests only the relevant portions of the code," Protect AI said. "It automatically searches the project files for files that are likely to be the first to handle user input. Then it ingests that entire file and responds with all the potential vulnerabilities."
You are viewing a single comment's thread from: