Model Comparison 50% sign agreement
Model Editorial Structural Class Conf SETL Theme
deepseek/deepseek-v3.2-20251201 +0.23 -0.10 Mild positive 0.06 0.27 Privacy & Security
@cf/meta/llama-4-scout-17b-16e-instruct lite +0.24 ND Mild positive 0.80 0.00 Cybersecurity
@cf/meta/llama-3.3-70b-instruct-fp8-fast lite +0.20 ND Mild positive 0.80 0.00 Digital Security
claude-haiku-4-5-20251001 +0.01 +0.20 Neutral 0.23 0.39 Privacy & Data Security
claude-haiku-4-5 lite +0.44 ND Moderate positive 0.82 0.00 User data protection breach
Section deepseek/deepseek-v3.2-20251201 @cf/meta/llama-4-scout-17b-16e-instruct lite @cf/meta/llama-3.3-70b-instruct-fp8-fast lite claude-haiku-4-5-20251001 claude-haiku-4-5 lite
Preamble ND ND ND -0.10 ND
Article 1 ND ND ND -0.10 ND
Article 2 ND ND ND ND ND
Article 3 0.08 ND ND -0.20 ND
Article 4 ND ND ND ND ND
Article 5 ND ND ND ND ND
Article 6 ND ND ND -0.10 ND
Article 7 ND ND ND ND ND
Article 8 ND ND ND -0.30 ND
Article 9 ND ND ND ND ND
Article 10 ND ND ND ND ND
Article 11 ND ND ND ND ND
Article 12 0.04 ND ND 0.40 ND
Article 13 ND ND ND ND ND
Article 14 ND ND ND ND ND
Article 15 ND ND ND ND ND
Article 16 ND ND ND -0.10 ND
Article 17 ND ND ND ND ND
Article 18 ND ND ND ND ND
Article 19 0.19 ND ND 0.38 ND
Article 20 ND ND ND ND ND
Article 21 ND ND ND ND ND
Article 22 ND ND ND -0.10 ND
Article 23 ND ND ND -0.10 ND
Article 24 ND ND ND ND ND
Article 25 ND ND ND ND ND
Article 26 0.08 ND ND -0.20 ND
Article 27 ND ND ND -0.10 ND
Article 28 ND ND ND 0.30 ND
Article 29 ND ND ND 0.20 ND
Article 30 ND ND ND 0.20 ND
+0.01 Vibe coded Lovable-hosted app littered with basic flaws exposed 18K users (www.theregister.com S:+0.20 )
137 points by nottorp 2 days ago | 35 comments on HN | Neutral Editorial · v3.7 · 2026-02-28 12:12:55 0
Summary Privacy & Data Security Advocates
The article reports on a security vulnerability in an AI-generated educational app that exposed personal data of 18,697 users, including minors. The coverage advocates for stronger privacy protections (Article 12) and platform accountability (Article 28-29), while documenting failures in remedy access (Article 8) and exercising robust freedom of expression (Article 19) through multi-perspective reporting.
Article Heatmap
Preamble: -0.10 — Preamble P Article 1: -0.10 — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: -0.20 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: -0.10 — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: -0.30 — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.40 — Privacy 12 Article 13: ND — Freedom of Movement Article 13: No Data — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: -0.10 — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.38 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: -0.10 — Social Security 22 Article 23: -0.10 — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: -0.20 — Education 26 Article 27: -0.10 — Cultural Participation 27 Article 28: +0.30 — Social & International Order 28 Article 29: +0.20 — Duties to Community 29 Article 30: +0.20 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.01 Structural Mean +0.20
Weighted Mean +0.06 Unweighted Mean +0.01
Max +0.40 Article 12 Min -0.30 Article 8
Signal 15 No Data 16
Volatility 0.22 (Medium)
Negative 10 Channels E: 0.6 S: 0.4
SETL +0.39 Editorial-dominant
FW Ratio 59% 24 facts · 17 inferences
Evidence 23% coverage
2H 6M 7L 16 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: -0.10 (2 articles) Security: -0.20 (1 articles) Legal: -0.20 (2 articles) Privacy & Movement: 0.40 (1 articles) Personal: -0.10 (1 articles) Expression: 0.38 (1 articles) Economic & Social: -0.10 (2 articles) Cultural: -0.15 (2 articles) Order & Duties: 0.23 (3 articles)
HN Discussion 7 top-level · 10 replies
carlgreene 2026-02-27 17:40 UTC link
The hardest part about this stuff is that as a user, you don't necessarily know if an app is vibe-coded or not. Previously, you were able to have _some_ reasonable expectation of security in that trained engineers were the ones building these things out, but that's no longer the case.

There's a lot of cool stuff being built, but also as a user, it's a scary time to be trying new things.

ch4s3 2026-02-27 17:50 UTC link
I've been thinking a bit about how to do security well with my generated code. I've been using tools that check deps for CVEs, static tools that check for sql injection and similar problems, and baking some security requirements into the specs I hand claude. I can't tell yet if this is better than what I did before or just theater. It seems like in this case you'd need/want to specify some tests around access.

I'm interested to hear how other people approach this.

julianlam 2026-02-27 17:56 UTC link
> One example of this was a malformed authentication function. The AI that vibe-coded the Supabase backend, which uses remote procedure calls, implemented it with flawed access control logic, essentially blocking authenticated users and allowing access to unauthenticated users.

Actually sounds like a typical mistake a human developer would make. Forget a `!` or get confused for a second about whether you want true or false returned, and the logic flips.

The difference is a human is more likely to actually test the output of the change.

firefoxd 2026-02-27 17:59 UTC link
Lovable is marketed to non developers, so their core users wouldn't understand a security flow if it flashed red. A lot of my non dev friends were posting their cool new apps they built on LinkedIn last year [0]. Several were made on lovable. It's not on their users to understand these flaws

The apps all look the same with a different color palette, and makes for an engaging AI post on LinkedIn. Now they are mostly abandoned, waiting for the subscription to expire... and their personal data to get exposed I guess

[0]: https://idiallo.com/blog/my-non-programmer-friends-built-app...

melecas 2026-02-27 18:07 UTC link
Vibe coding democratized shipping without democratizing the accountability. The 18,000 users absorbed the downside of a risk they didn't know they were taking.
recursivedoubts 2026-02-27 19:04 UTC link
I continue to maintain that the best metaphor for the current situation in software development is "The Sorcerers Apprentice" in Fantasia:

https://www.youtube.com/watch?v=m-W8vUXRfxU

aitchnyu 2026-02-27 19:10 UTC link
One dev of a Lovable competitor pointed me to the rules thats supposed to ensure queries are limited to that user's data. This seems like "pretty please?" to my amateur eyes.

https://github.com/dyad-sh/dyad/blob/de2cc2b48f2c8bfa401608c...

yoyohello13 2026-02-27 17:46 UTC link
Yeah, my trust for new open source projects is in the toilet. Hopefully we will eventually start taking security seriously again after the vibe code gold rush.
ctoth 2026-02-27 17:46 UTC link
I'm sorry, what?

> Previously, you were able to have _some_ reasonable expectation of security in that trained engineers were the ones building these things

When was this? What world? Did I skip worldlines? Is this a new Universe?

The world I remember is that anybody could write a program and put it on the Internet. Is this not the world you remember?

Further, when those engineers were "trained" ... were there no data breaches before 2022?

ctoth 2026-02-27 17:53 UTC link
Same way you handle preserving any other property you want to preserve while "vibecoding" -- ensure tests capture it, ensure the tests can't be skipped. It really is this simple.
s_ting765 2026-02-27 18:00 UTC link
Ask the LLM to create for you a POC for the vulnerability you have in mind. Last time I did this I had to repeatedly make a promise to the LLM that it was for educational purposes as it assumed this information is "dangerous".
alfiedotwtf 2026-02-27 18:02 UTC link
Developers with decades of experience still make basic security holes. The general public are screwed once they start hosting their own apps and serving on the Internet.
andersmurphy 2026-02-27 18:34 UTC link
With the power of LLMs anyone can make and sell foot guns.
shimman 2026-02-27 18:45 UTC link
I don't think you know what democracy means, democracy means that users can reject poorly made apps. If you can't reject or destroy something, it's not a democratic process.

Having someone dump shitty wares onto the public is only democracy if you think being held unaccountable as democratic.

627467 2026-02-27 19:08 UTC link
The frequency with which I see contemporary apps updating (sometimes multiple times a day) says there's a change in culture that also makes professionals prone to mistakes.

I get that we'll never ship a perfect release, but if you have to push fixes once a day it seems you've lost perspective.

Vibe coding slopiness is more acceptable now because we've lowered our standards

adampunk 2026-02-27 20:26 UTC link
So the problem I'm having is I don't know what I'm doing vis a vis security, so I can't audit my own understanding by just sitting in a chair, but here's what I've been doing.

I'm building a desktop app that has has authentication needs because we need to connect our internal agents and also allow the user to connect theirs. We pay for our agents, the user pays for theirs (or pays us to use ours etc.). These are, relatively speaking, VERY SIMPLE PROBLEMS, nevertheless agents are happy to consume and leak secrets, or break things in much stranger ways, like hooking the wrong agent up to the wrong auth which would have charged a user for our API calls. That seemed very unlikely to me until I saw it.

So far what has "worked" (made me feel less anxious, aside from the niggling worry that this is theater) is: 1. Having a really strong and correct understanding of our data flows. That's not about security per se so at least that I can be ok at it. This allows me to... 2. Be aggressive and paranoid about not doing it at all, if it can be helped. Where I actually handle authentication is as minimal as possible (one should have some reasonable way to prove that to yourself). Done right the space is small enough to reason about.

How do I do 1 & 2 while not knowing anything? Painfully and slowly and by reading. The web agents are good if you're honest about your level of knowledge and you ask for help in terms of sources to read. It's much more effective than googling. Ask, read what the agents say, press them for good recommendations for YOU to read, not anyone. Then go out and read those sources. Have I learned enough to supervise a frontier model? No. Absolutely not. Am I doing it anyway? Yes.

general_reveal 2026-02-27 22:47 UTC link
The hardest part about this stuff is that as a user, you don't necessarily know if an app is vibe-coded or not

Hah. Advert of the year. Can’t really tell the difference anymore huh …

Editorial Channel
What the content says
+0.50
Article 19 Freedom of Expression
High Advocacy Practice
Editorial
+0.50
SETL
+0.39

The article exercises and advocates for freedom of expression and information by reporting on a security incident with multiple perspectives. Direct quotes from the researcher, journalist reporting, and company response demonstrate open discourse.

+0.40
Article 12 Privacy
High Advocacy Framing
Editorial
+0.40
SETL
ND

The article extensively documents and advocates for privacy rights by exposing a major data breach. It demonstrates how platform failures enabled unauthorized access to personal information, framing privacy as a critical right requiring protection and accountability.

+0.30
Article 28 Social & International Order
Medium Advocacy
Editorial
+0.30
SETL
ND

The article advocates for a social and international order where security responsibility is built into platform structures. Khan argues Lovable should take responsibility for apps it hosts, and the article frames this as necessary for establishing accountable systems.

+0.20
Article 29 Duties to Community
Medium Advocacy
Editorial
+0.20
SETL
ND

The article frames security responsibility as mutual duty between platforms and users. Khan argues Lovable should take responsibility; Lovable counters that users have duty to implement recommendations. The article presents this tension over duties.

+0.20
Article 30 No Destruction of Rights
Medium Advocacy
Editorial
+0.20
SETL
ND

The article advocates against systems and practices that would destroy or undermine users' fundamental rights. It argues platforms should prevent vulnerabilities that enable rights destruction through unauthorized data access.

-0.10
Preamble Preamble
Low Framing
Editorial
-0.10
SETL
ND

The article documents a breach of the human dignity and security the Preamble calls for, but does not explicitly engage with the foundational values of the UDHR.

-0.10
Article 1 Freedom, Equality, Brotherhood
Low Framing
Editorial
-0.10
SETL
ND

The article documents unequal vulnerability: some users (with exposed PII) lack the protection others enjoy. Does not explicitly frame this as equal rights violation.

-0.10
Article 6 Legal Personhood
Low Framing
Editorial
-0.10
SETL
ND

The article acknowledges users' identities were exposed (870 with full PII, plus email addresses) but does not frame this as a violation of the right to recognition as a person.

-0.10
Article 16 Marriage & Family
Low Framing
Editorial
-0.10
SETL
ND

The article identifies that minors from K-12 institutions were on the exposed platform, acknowledging implications for children, but does not explicitly frame data exposure as a violation of family/child protection rights.

-0.10
Article 22 Social Security
Low Framing
Editorial
-0.10
SETL
ND

The article acknowledges the educational context of affected users (exam platform for teachers and students) but does not frame data exposure as a violation of economic/social/cultural rights to education.

-0.10
Article 23 Work & Equal Pay
Low Framing
Editorial
-0.10
SETL
ND

The article implicitly addresses developer rights by noting the vulnerability was AI-generated, but does not explicitly frame security responsibility as affecting workers' right to favorable working conditions.

-0.10
Article 27 Cultural Participation
Low Framing
Editorial
-0.10
SETL
ND

The article discusses AI/code generation and platform accessibility but does not explicitly frame security vulnerabilities as impeding the right to participate in cultural/scientific life or share in scientific progress.

-0.20
Article 3 Life, Liberty, Security
Medium Framing
Editorial
-0.20
SETL
ND

The article describes a vulnerability that directly threatened user security—unauthenticated attackers could access records, delete accounts, modify grades—but frames this primarily as a technical/responsibility issue rather than a security rights violation.

-0.20
Article 26 Education
Medium Framing
Editorial
-0.20
SETL
ND

The article identifies the affected platform as educational and notes minors were affected, acknowledging educational context. However, it does not explicitly frame data exposure in an educational platform as a violation of the right to participate in cultural life and enjoy scientific benefits.

-0.30
Article 8 Right to Remedy
Medium Framing
Editorial
-0.30
SETL
ND

The article documents a failure of effective remedy: Khan reported vulnerabilities via support and 'his ticket was reportedly closed without response.' This demonstrates inadequate access to remedial mechanisms for affected users.

ND
Article 2 Non-Discrimination

Not engaged in this article.

ND
Article 4 No Slavery

Not engaged in this article.

ND
Article 5 No Torture

Not engaged in this article.

ND
Article 7 Equality Before Law

Not engaged in this article.

ND
Article 9 No Arbitrary Detention

Not engaged in this article.

ND
Article 10 Fair Hearing

Not engaged in this article.

ND
Article 11 Presumption of Innocence

Not engaged in this article.

ND
Article 13 Freedom of Movement

Not engaged in this article.

ND
Article 14 Asylum

Not engaged in this article.

ND
Article 15 Nationality

Not engaged in this article.

ND
Article 17 Property

Not engaged in this article.

ND
Article 18 Freedom of Thought

Not engaged in this article.

ND
Article 20 Assembly & Association

Not engaged in this article.

ND
Article 21 Political Participation

Not engaged in this article.

ND
Article 24 Rest & Leisure

Not engaged in this article.

ND
Article 25 Standard of Living

Not engaged in this article.

Structural Channel
What the site does
+0.20
Article 19 Freedom of Expression
High Advocacy Practice
Structural
+0.20
Context Modifier
ND
SETL
+0.39

The Register's editorial structure—including both critical reporting and company response—supports freedom of expression and open information flow.

ND
Preamble Preamble
Low Framing

Not applicable to news article editorial content.

ND
Article 1 Freedom, Equality, Brotherhood
Low Framing

Not applicable.

ND
Article 2 Non-Discrimination

Not applicable.

ND
Article 3 Life, Liberty, Security
Medium Framing

Not applicable.

ND
Article 4 No Slavery

Not applicable.

ND
Article 5 No Torture

Not applicable.

ND
Article 6 Legal Personhood
Low Framing

Not applicable.

ND
Article 7 Equality Before Law

Not applicable.

ND
Article 8 Right to Remedy
Medium Framing

Not applicable to editorial article structure.

ND
Article 9 No Arbitrary Detention

Not applicable.

ND
Article 10 Fair Hearing

Not applicable.

ND
Article 11 Presumption of Innocence

Not applicable.

ND
Article 12 Privacy
High Advocacy Framing

Not applicable.

ND
Article 13 Freedom of Movement

Not applicable.

ND
Article 14 Asylum

Not applicable.

ND
Article 15 Nationality

Not applicable.

ND
Article 16 Marriage & Family
Low Framing

Not applicable.

ND
Article 17 Property

Not applicable.

ND
Article 18 Freedom of Thought

Not applicable.

ND
Article 20 Assembly & Association

Not applicable.

ND
Article 21 Political Participation

Not applicable.

ND
Article 22 Social Security
Low Framing

Not applicable.

ND
Article 23 Work & Equal Pay
Low Framing

Not applicable.

ND
Article 24 Rest & Leisure

Not applicable.

ND
Article 25 Standard of Living

Not applicable.

ND
Article 26 Education
Medium Framing

Not applicable.

ND
Article 27 Cultural Participation
Low Framing

Not applicable.

ND
Article 28 Social & International Order
Medium Advocacy

Not applicable.

ND
Article 29 Duties to Community
Medium Advocacy

Not applicable.

ND
Article 30 No Destruction of Rights
Medium Advocacy

Not applicable.

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.73 medium claims
Sources
0.8
Evidence
0.8
Uncertainty
0.6
Purpose
0.8
Propaganda Flags
2 manipulative rhetoric techniques found
2 techniques detected
loaded language
Phrases like 'riddled with vulnerabilities,' 'spewing glitzy-looking apps laden with vulnerabilities,' and 'vibe-coding' (used derisively) carry editorial framing rather than neutral reporting.
causal oversimplification
The article simplifies the responsibility question by focusing on Lovable's role, though the CISO's counterpoint (developers must implement recommendations, external code involved, database not Lovable-hosted) complicates causation.
Emotional Tone
Emotional character: positive/negative, intensity, authority
measured
Valence
-0.5
Arousal
0.6
Dominance
0.6
Transparency
Does the content identify its author and disclose interests?
0.50
✓ Author
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.44 mixed
Reader Agency
0.4
Stakeholder Voice
Whose perspectives are represented in this content?
0.50 3 perspectives
Speaks: individualscorporation
About: individualschildrenworkersgovernment
Temporal Framing
Is this content looking backward, at the present, or forward?
present immediate
Geographic Scope
What geographic area does this content cover?
national
United States
Complexity
How accessible is this content to a general audience?
technical high jargon domain specific
Longitudinal 183 HN snapshots · 25 evals
+1 0 −1 HN
Audit Trail 45 entries
2026-03-02 10:44 eval_success Evaluated: Mild positive (0.10) - -
2026-03-02 10:44 eval Evaluated by deepseek-v3.2: +0.10 (Mild positive) 9,118 tokens +0.13
2026-03-02 02:46 eval_success Evaluated: Neutral (-0.03) - -
2026-03-02 02:46 eval Evaluated by deepseek-v3.2: -0.03 (Neutral) 9,855 tokens -0.16
2026-03-01 15:37 eval_success Evaluated: Mild positive (0.12) - -
2026-03-01 15:37 eval Evaluated by deepseek-v3.2: +0.12 (Mild positive) 9,191 tokens
2026-02-28 15:39 eval_success Lite evaluated: Mild positive (0.24) - -
2026-02-28 15:39 eval Evaluated by llama-4-scout-wai: +0.24 (Mild positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 15:39 model_divergence Cross-model spread 0.38 exceeds threshold (4 models) - -
2026-02-28 15:27 eval_success Lite evaluated: Mild positive (0.20) - -
2026-02-28 15:27 model_divergence Cross-model spread 0.38 exceeds threshold (3 models) - -
2026-02-28 15:27 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 12:12 model_divergence Cross-model spread 0.38 exceeds threshold (2 models) - -
2026-02-28 12:12 eval Evaluated by claude-haiku-4-5-20251001: +0.06 (Neutral)
2026-02-28 08:54 eval_success Light evaluated: Mild positive (0.24) - -
2026-02-28 08:54 eval Evaluated by llama-4-scout-wai: +0.24 (Mild positive) -0.16
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 08:54 rater_validation_warn Light validation warnings for model llama-4-scout-wai: 0W 1R - -
2026-02-28 08:50 eval_success Light evaluated: Mild positive (0.20) - -
2026-02-28 08:50 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 08:50 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 08:50 eval_success Light evaluated: Mild positive (0.20) - -
2026-02-28 08:50 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 08:50 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 05:52 eval_success Light evaluated: Mild positive (0.20) - -
2026-02-28 05:52 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 05:52 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 05:35 eval_success Light evaluated: Mild positive (0.20) - -
2026-02-28 05:35 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 05:35 rater_validation_warn Light validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 05:19 eval Evaluated by claude-haiku-4-5: +0.44 (Moderate positive)
2026-02-28 04:16 eval_success Light evaluated: Moderate positive (0.40) - -
2026-02-28 04:16 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 02:49 eval_success Light evaluated: Moderate positive (0.40) - -
2026-02-28 02:49 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 02:30 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 02:30 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 02:17 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 01:46 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 01:39 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 01:28 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 01:27 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive) 0.00
reasoning
Exposing app vulnerabilities
2026-02-28 01:23 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 01:09 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive) 0.00
reasoning
ED, slightly positive lean on cybersecurity
2026-02-28 01:09 eval Evaluated by llama-3.3-70b-wai: +0.20 (Mild positive)
reasoning
Exposing app vulnerabilities
2026-02-28 00:58 eval Evaluated by llama-4-scout-wai: +0.40 (Moderate positive)
reasoning
ED, slightly positive lean on cybersecurity