Research2026-05-06
From SFT to RL: Demystifying the Post-Training Pipeline for LLM-based Vulnerability Detection
Source: Arxiv CS.AI
arXiv:2602.14012v2 Announce Type: replace-cross Abstract: The integration of LLMs into vulnerability detection (VD) has shifted the field toward more interpretable and context-aware analysis. While post-training techniques have shown promise in general coding tasks, their systematic application to...
arxivpapers