Latest version: v1.5.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
An implementation of GPT-4 that recognizes which commands it must run to fulfill an instruction, using a graph. Create new commands easily by describing them using natural language and coding the functions corresponding to the commands.
No known vulnerabilities found
Has known vulnerabilities