[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"tag-vulnerability-discovery":3},{"tag":4,"articles":10},{"id":5,"name":6,"slug":7,"article_count":8,"description_zh":9,"description_en":9},"d8921fac-19f6-4b59-802d-59ecd65afdbb","vulnerability discovery","vulnerability-discovery",1,null,[11,20],{"id":12,"slug":13,"title":14,"summary":15,"category":16,"image_url":17,"cover_image":17,"language":18,"created_at":19},"7a5a2d84-bd79-4604-876c-80486c6c691e","llm-agents-real-vulnerability-hunters-en","Why LLM agents are becoming real vulnerability hunters","LLM agents are now useful for finding real software vulnerabilities, not just writing code.","research","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1778591449286-zcf5.png","en","2026-05-12T13:10:28.214423+00:00",{"id":21,"slug":22,"title":23,"summary":24,"category":25,"image_url":26,"cover_image":26,"language":18,"created_at":27},"c1fac97f-de34-4254-b62e-eddcab4b6ef3","openai-limits-gpt-54-cyber-trusted-firms-en","OpenAI Limits GPT-5.4-Cyber to Trusted Firms","OpenAI is limiting GPT-5.4-Cyber to vetted partners as it pushes AI deeper into security testing and dual-use risk management.","model-release","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1776297833412-wlma.png","2026-04-16T00:03:29.403078+00:00"]