cs.AI, cs.CR, cs.SE

From SFT to RL: Demystifying the Post-Training Pipeline for LLM-based Vulnerability Detection

arXiv:2602.14012v2 Announce Type: replace-cross
Abstract: The integration of LLMs into vulnerability detection (VD) has shifted the field toward more interpretable and context-aware analysis. While post-training techniques have shown promise in genera…