[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"tag-ai-漏洞分析":3},{"tag":4,"articles":10},{"id":5,"name":6,"slug":7,"article_count":8,"description_zh":9,"description_en":9},"efbcc121-d961-4a8c-b460-5f70b04e7a5f","AI 漏洞分析","ai-漏洞分析",0,null,[11],{"id":12,"slug":13,"title":14,"summary":15,"category":16,"image_url":17,"cover_image":17,"language":18,"created_at":19},"a2527d1f-99c7-4f8b-86c3-26679b44ccce","copy-fail-human-ai-vulnerability-analysis-zh","Copy Fail 為何能挖出內核漏洞","Copy Fail 顯示，研究員先定攻擊面，再讓 AI 做語義掃描，能更快找出 Linux 內核邏輯漏洞。","research","https:\u002F\u002Fxxdpdyhzhpamafnrdkyq.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Fcovers\u002Finline-1779207839846-wn4h.png","zh","2026-05-19T16:23:35.825464+00:00"]