no code implementations • 25 Oct 2023 • Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai
Moreover, our study identifies weaknesses in existing models' ability to repair vulnerable code, even when provided with vulnerability information.