You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One question I have is around why AI is needed for analyzing a strict schema like IAM policies. Hypothetically, we should be able to build rules to check for the vulns that this project detects. Personally, having some details around why AI was chosen for this problem space would be appreciated in the README. Some edge cases that security engineers doing analysis would miss would be awesome.
The text was updated successfully, but these errors were encountered:
Thanks for sharing this interesting project!
One question I have is around why AI is needed for analyzing a strict schema like IAM policies. Hypothetically, we should be able to build rules to check for the vulns that this project detects. Personally, having some details around why AI was chosen for this problem space would be appreciated in the README. Some edge cases that security engineers doing analysis would miss would be awesome.
The text was updated successfully, but these errors were encountered: