top | item 43757417

(no title)

isjustintime | 10 months ago

I'm also interested in the details on how this works in practice. I know that there was a front page post a few weeks ago about how Cursor worked, and there was a short blurb about how sets of security prompts told the LLM to not do things like hard code API keys, but nothing on the training side.

discuss

order

No comments yet.