{ "@context":[ "https://www.w3.org/ns/activitystreams", {"Hashtag":"as:Hashtag"} ], "published":"2024-07-02T00:28:43.188Z", "attributedTo":"https://gopinath.org/actors/rahul", "replies":"https://gopinath.org/objects/9feu29yUukc/replies", "to":["https://www.w3.org/ns/activitystreams#Public"], "cc":["https://gopinath.org/actors/rahul/followers"], "content":"
I have posted about a related issue before, but it seems that it is time to take a harder look at using CVEs as the touchstone for effectiveness of security tools. It has become far too easy to produce CVEs (even high severity ones) because there is limited oversight in the whole process. If you are a security researcher wondering how to evaluate your tool, please consider using Mutation Analysis as the metric. It is a well researched technique that can reliably show how your tool performs, and provide you insights with where you can improve.
", "mediaType":"text/html", "attachment":[], "type":"Note", "id":"https://gopinath.org/objects/9feu29yUukc" }