[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"tag-openssl":3},{"tag":4,"articles":10},{"id":5,"name":6,"slug":7,"article_count":8,"description_zh":9,"description_en":9},"c39a7eca-8304-435f-9a73-00ff73ad833b","OpenSSL","openssl",0,null,[11],{"id":12,"slug":13,"title":14,"summary":15,"category":16,"image_url":17,"cover_image":17,"language":18,"created_at":19},"7a5a2d84-bd79-4604-876c-80486c6c691e","llm-agents-real-vulnerability-hunters-en","Why LLM agents are becoming real vulnerability hunters","LLM agents are now useful for finding real software vulnerabilities, not just writing code.","research","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778591449286-zcf5.png","en","2026-05-12T13:10:28.214423+00:00"]