Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Tabnine introduces Code Provenance and Attribution feature that flags restrictively licensed code generated by AI assistants

    Tabnine introduces Code Provenance and Attribution feature that flags restrictively licensed code generated by AI assistants

    December 20, 2024

    The AI coding assistant provider Tabnine today announced a new feature, Code Provenance and Attribution, to protect companies from unintentionally adding restrictively licensed code into their codebase when using generative AI to write code. 

    The new feature checks AI-generated code against public GitHub repositories to find matches, and flags the license type of the original code from GitHub. 

    According to Tabnine, this new feature will help software development teams understand if the code generated by AI models meets their standards and requirements. 

    “State-of-the-art LLMs like Claude 3.5 Sonnet and GPT-4o have greatly improved the performance of generative AI applications, including AI code assistants. However, these LLMs are trained on vast amounts of data collected from all corners of the internet, including code that may have restrictions on how it can be used, introducing the risk of IP infringement. Since the copyright law for the use of AI-generated content is still unsettled, engineering teams at enterprises want to strike a balance: leveraging the performance gains that come from these powerful models while minimizing the likelihood of copyleft-licensed code getting in their codebase,” Tabnine wrote in a blog post. 

    Tabnine had already offered a license-compliant model trained only on permissively licensed code, but this new feature will enable users to leverage a variety of other models too, such as Anthropic’s Claude, OpenAI’s GPT-4o, and Cohere’s Command R+.

    The Code Provenance and Attribution capability also supports other development activities on top of code generation within Tabnine, including fixing code, generating test cases, and implementing Jira issues.

    The company is also working on expanding this capability to enable users to specify repos to check against, such as a competitor’s code. It will also add a censorship capability that removes matching code before the developer sees it. 

    Code Provenance and Attribution is currently available as a private preview for all Tabnine Enterprise customers. Tabnine will also host a webinar on January 9 at 11 AM ET / 8 AM PT to dive into the capability further. 

    The post Tabnine introduces Code Provenance and Attribution feature that flags restrictively licensed code generated by AI assistants appeared first on SD Times.

    Source: Read More 

    Hostinger
    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleOpenAI announces latest capabilities for developers
    Next Article Emotional intelligence in IT management: Impact, challenges, and cultural differences

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Petcube launches rechargeable smart water fountain at CES

    News & Updates

    Top 7 WordPress Plugins for 2024: Enhance Your Site’s Performance

    Development

    Meet, Learn, Dominate: 10 Cybersecurity Conferences You Need to Be At in 2025

    Development

    Horns&Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads

    Development

    Highlights

    CVE-2025-39595 – Quentn WP SQL Injection

    April 20, 2025

    CVE ID : CVE-2025-39595

    Published : April 17, 2025, 4:15 p.m. | 3 days, 10 hours ago

    Description : Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’) vulnerability in Quentn.com GmbH Quentn WP allows SQL Injection. This issue affects Quentn WP: from n/a through 1.2.8.

    Severity: 9.3 | CRITICAL

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    5 BCDR Oversights That Leave You Exposed to Ransomware

    November 15, 2024

    Understanding Perceptible Information for Clear and Consistent Feedback in Universal Design – 2

    April 25, 2024

    Baidu AI Presents an End-to-End Self-Reasoning Framework to Improve the Reliability and Traceability of RAG Systems

    July 31, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.