• catdog@lemmy.ml
    link
    fedilink
    arrow-up
    8
    ·
    3 hours ago

    I can think of several ways: log analysis, methodology analysis, analysis of code comments writing style/errors, keeping the vulnerability in and finding home calls, human intelligence.