𝖊𝖛𝖆𝖉𝖊

191 posts

𝖊𝖛𝖆𝖉𝖊 banner
𝖊𝖛𝖆𝖉𝖊

𝖊𝖛𝖆𝖉𝖊

@encrypted

🇲🇽

Inscrit le Aralık 2018
139 Abonnements3.8K Abonnés
yv
yv@yvtweets·
@encrypted just move to tui like the rest of us
English
1
0
1
36
𝖊𝖛𝖆𝖉𝖊 retweeté
mert
mert@mert·
the dev for gold is god btw
English
256
250
3.3K
325K
Bennett
Bennett@b_nnett·
how do I get an agent to automatically handle my Linear issues and create PR’s?
English
3
0
4
547
shubs
shubs@infosec_au·
Vercel is questioning whether or not a WAF bypass is possible... Pushed an update that uses a payload from @SLCyberSec research team (specifically @hash_kitten). Payload has been running for @assetnote customers for last 18h. github.com/assetnote/reac… use --vercel-waf-bypass flag
shubs tweet media
Guillermo Rauch@rauchg

@infosec_au @assetnote DM’d you. You have a working repro for bypassing Cloudflare but not Vercel. Would love to correct the record or see the evidence.

English
14
91
962
238.6K
Paul Klein IV
Paul Klein IV@pk_iv·
Today we're announcing an unlikely partnership. We believe that agents need reliable, responsible web access. That's why we're partnering with Cloudflare in support of Web Bot Auth and Signed Agents, a new standard to allow good bots to authenticate themselves. Details 👇
Paul Klein IV tweet media
English
78
57
722
137.4K
𝖊𝖛𝖆𝖉𝖊
𝖊𝖛𝖆𝖉𝖊@encrypted·
I think remote browsers still doesn't solve this problem. A layer needs to be built to prevent the agents from doing unprompted tasks local or remote, a stolen session is still a stolen session even if its not all of them. Aside from that companies like Cloudflare are trying to build prompt injections / a labyrinth to mess with agents which will waste compute and time. If something isn't built many people will bankrupt themselves getting reversed ddosed by cloudflare
English
0
0
2
91
Paul Klein IV
Paul Klein IV@pk_iv·
@guohao_li @browserbase the difference with local vs remote browsers is that with remote browsers you have to explicitly give it those cookies or access
English
4
0
6
2.2K
Paul Klein IV
Paul Klein IV@pk_iv·
tl;dr: letting a model control your local browser is dangerous. anyone can prompt injection and steal your cookies. you need a remote browser that’s isolated and intentionally given access. that’s why we’re building @browserbase
Anthropic@AnthropicAI

We’ve developed Claude for Chrome, where Claude works directly in your browser and takes actions on your behalf. We’re releasing it at first as a research preview to 1,000 users, so we can gather real-world insights on how it’s used.

English
47
14
496
96.1K
Rohan Patra
Rohan Patra@rohanpatraxyz·
Maybe this why they're transitioning to CLI
Rohan Patra tweet media
English
4
0
9
840
𝖊𝖛𝖆𝖉𝖊
𝖊𝖛𝖆𝖉𝖊@encrypted·
Looking forward to going nonverbal at the function with my fellow sneaker twitter autists today
𝖊𝖛𝖆𝖉𝖊 tweet media
English
0
1
23
7.9K
𝖊𝖛𝖆𝖉𝖊
𝖊𝖛𝖆𝖉𝖊@encrypted·
Didn’t supreme do this? I remember seeing someone do a waterfall for the assets on the html page as part of the flow. Ever since I seen that I always added a handler for it and have ran into a few non sneaker sites that would set cookies on the first favicon request which was too obvious 😂
English
0
0
0
193
jason
jason@jasondev0·
@sleepy__dev any sneaker site could have done this and it'd be so hard to tell 😭
English
2
0
14
2.9K
sleepy
sleepy@sleepy__dev·
I was managing the queue for a big sneaker store in EU. Wanted to share how I managed to block Cybersole from getting valid sessions. I would simply check if the client ever requested the website favicon.ico file, no full request bot ever requests the favicon, also the session validity was never returned in any API endpoint, meaning they could never guessed if the session was valid. Yes, this simple method worked, felt like sharing after a couple years because I still think to this day it is very funny.
sleepy tweet media
English
14
7
269
36.1K