Discussion about this post

User's avatar
ToxSec's avatar

ā€˜The workflow is straightforward: measure where your judge disagrees with the expert, fix those gaps, and confirm on data the judge has never seen.’

excellent takeaway here. i’ve been trying to see how llm judges work with security tools. they have some strengths but a strong jailbreak can hit both the product and the judge

Meenakshi NavamaniAvadaiappan's avatar

Thanks for the step by step processing walkthrough for the good 😊

5 more comments...

No posts

Ready for more?