Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'm also interested in the details on how this works in practice. I know that there was a front page post a few weeks ago about how Cursor worked, and there was a short blurb about how sets of security prompts told the LLM to not do things like hard code API keys, but nothing on the training side.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: