๐๐๐๐๐
196 posts


@encrypted @collectpure we are in a cave the government shares with us
maybe a good start lol
English

Weโre hiring engineers at @collectpure
Series A, $ 650M+ processed
building infrastructure for high value assets starting with precious metals and rare coins
team of 11 including 2 engineers - high ownership
youโll be working on:
- orderbooks and matching systems
- payments, ledgers, reconciliation
- postgres scaling and data integrity
weโre going deeper into:
- custody and asset infrastructure
- ledger systems, auditability, immutability
- systems handling real customer assets
youโll work directly on core systems and ship quickly
looking for people with speed, taste, and high agency
LA or remote
if this sounds interesting or if someone comes to mind please reach out
English

@jeffannaraj @collectpure We wanna build a Fort Knox competitor
English
๐๐๐๐๐ retweetet

@garrytan its indexed and updated 5 days ago and the readme has nothing that mentions e2e testing or automation and you want google (a search engine) to know what you need ๐ญ

English
๐๐๐๐๐ retweetet

Are you looking to join a marketplace startup?
We've added new roles at marketplaces like @Instacart @Hipcamp @OpenRouter @collectpure that are hiring to our jobs board.
everythingmarketplaces.com/marketplace-joโฆ
English
๐๐๐๐๐ retweetet

@yvtweets i have trust issues and need to see the code changes in real time
English
๐๐๐๐๐ retweetet

@infosec_au @SLCyberSec @hash_kitten @assetnote Back in may I emailed their responsible disclosure email with a firewall bypass I found and I got a response a day later asking me to onboard to HackerOne so I can submit it but the bypass had been patched ๐คฃ
English

@SLCyberSec @hash_kitten @assetnote This has been silently patched now ๐ซ There's probably more WAF bypasses out there.
English

Vercel is questioning whether or not a WAF bypass is possible... Pushed an update that uses a payload from @SLCyberSec research team (specifically @hash_kitten). Payload has been running for @assetnote customers for last 18h. github.com/assetnote/reacโฆ use --vercel-waf-bypass flag

Guillermo Rauch@rauchg
@infosec_au @assetnote DMโd you. You have a working repro for bypassing Cloudflare but not Vercel. Would love to correct the record or see the evidence.
English

the other common entrepreneurial red pill is building sneaker bots
Troy Kirwin@tkexpress11
if I meet a founder ages 17-25 there is a 50% chance they cut their teeth running Minecraft servers at 10
English

I think remote browsers still doesn't solve this problem. A layer needs to be built to prevent the agents from doing unprompted tasks local or remote, a stolen session is still a stolen session even if its not all of them. Aside from that companies like Cloudflare are trying to build prompt injections / a labyrinth to mess with agents which will waste compute and time. If something isn't built many people will bankrupt themselves getting reversed ddosed by cloudflare
English

@guohao_li @browserbase the difference with local vs remote browsers is that with remote browsers you have to explicitly give it those cookies or access
English

tl;dr: letting a model control your local browser is dangerous. anyone can prompt injection and steal your cookies.
you need a remote browser thatโs isolated and intentionally given access. thatโs why weโre building @browserbase
Anthropic@AnthropicAI
Weโve developed Claude for Chrome, where Claude works directly in your browser and takes actions on your behalf. Weโre releasing it at first as a research preview to 1,000 users, so we can gather real-world insights on how itโs used.
English
















