A few months ago I had this realization that agents have become really good at identifying bugs in code, especially security vulnerabilities. They are relentless in analyzing code and you can spin up multiple of them to go through source code quickly.
https://x.com/wunderwuzzi23/status/2021046801630101595
It is an emerging capability that many security researchers and bug bounty hunters have observed over the last few months.
Gadi Evron posted about the upcoming AI Vulnerability Cataclysm last year to help raise awareness.
...read more at embracethered.com
pull down to refresh
related posts
What really matters in this, imho:
I suggest you try it on one of your firmware codebases. You'll have fun.
https://twiiit.com/wunderwuzzi23/status/2021046801630101595
The title riffs on Linus Law ("given enough eyeballs, all bugs are shallow") but there is an important difference nobody talks about. Human auditors bring domain context -- they know which code paths handle real money. Agents right now are great at pattern-matching known vulnerability classes (buffer overflows, reentrancy) but terrible at finding logic bugs that require understanding the business intent.
The real unlock is not "more agents" -- it is agents combined with formal specifications. Trail of Bits published research showing LLM-generated invariants fed into symbolic execution tools caught bugs that neither approach found alone. That is the actual force multiplier.
Firmware is a great call though. The attack surface is massive and the auditor pool is tiny.