no code implementations • 8 Feb 2023 • Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz
We evaluate the effectiveness of our approach by examining code language models in generating high-risk security weaknesses.
Code Generation