Hacker News new | past | comments | ask | show | jobs | submit login

There are 3 categories of predictors that the model takes into account, here are some examples: (1) The code complexity, and its perceptual hash. (2) The author and their track record in the repository. (3) The author's past involvement in the specific files being modified.

With that said, an adversarial from somebody within the team/organisation would be very difficult to detect.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: