
Jeremiah Agthe
17K posts

Jeremiah Agthe
@Serial_Builder
ai agents || need a custom agent? → https://t.co/b1mFjFZVCH Automating your work that you can focus to make more money 💰


the PITCH DECKS💰 that raised billions are now public. Study them before your next raise: 1️⃣ 26 pitch decks that raised $400M in 2026 → thevccorner.com/p/26-pitch-dec… 2️⃣ Anthropic's 2022 pitch deck just leaked: 10 slides, no product, now worth $380B → thevccorner.com/p/anthropic-20… 3️⃣ 16 unicorn pitch decks: the actual slides before the billions → thevccorner.com/p/unicorn-pitc… 4️⃣ Peter Thiel only explained once how to raise money. Here it is → thevccorner.com/p/peter-thiel-… 5️⃣ SpaceX: how to build and pitch the most ambitious company of our time → thevccorner.com/p/spacex-strat… 6️⃣ Synthesia turned down Adobe's $3B offer. Here's the 18-slide deck that raised $180M → thevccorner.com/p/inside-synth… 7️⃣ How Brex raised $57M and rebuilt startup banking → thevccorner.com/p/how-brex-rai… 8️⃣ 50 real pitch decks from startups that raised $380M+ → thevccorner.com/p/50-real-star… 9️⃣ 200+ pitch decks that raised over $50 billion → thevccorner.com/p/200-startup-… 🔟 153 startups fundraising right now with their actual decks → thevccorner.com/p/153-startups… Bookmark this. The best founders study what worked before they pitch. How much does a pitch deck actually matter vs the founder behind it?

Okay, @gdb is team CLI all the way. @garrytan thinks MCPs suck. So we hit the streets of SF to see if the city agreed. We posed a simple question: MCP or CLI? - Basically everyone under the age of 35 said CLI - One person said MCP was as bloated as Java - & unsurprisingly, numerous people told us to touch grass Final score- MCP: 3 vs CLI: 17 SF has spoken, and @composio listened. Our universal CLI is now live! Drop your best CLI vs MCP hot take in the comments and we'll send the best ones some very sick gear 👀 Link to try our CLI in the next thread ⬇️

If you use GitHub (especially if you pay for it!!) consider doing this *immediately* Settings -> Privacy -> Disallow GitHub to train their models on your code. GitHub opted *everyone* into training. No matter if you pay for the service (like I do). WTH github.com/settings/copil…

> “we have a bot problem” > “we want to protect children” > *looks inside* > mass surveillance


And after voting that out too... 🇪🇺 ChatControl is back with a vengeance The Conservatives (EPP) are attempting to force a new vote TODAY (March 26) seeking to reverse the European Parliament's NO on indiscriminate scanning of ALL your private messages, emails and photos This is a direct attack on democracy and blatant disregard for your right to privacy If you're European contact your representatives now, with this handy form: #contact-tool" target="_blank" rel="nofollow noopener">fightchatcontrol.eu/?foo=bar#conta…
If not, please share this tweet so more people see it and we can block the vote It's crazy they keep just bringing back whatever they want until it's passed! Obviously now we see the European Commission is controlled by powerful evil lobbying groups 👺
Cuddling is the ultimate biohack Humans give off infrared energy which structures the water in your cells, boosts metabolism, improves cognitive function and your gut microbiome Cuddling also increases oxytocin which massively lowers stress You dont need crazy biohacks, you just need connection



you still need to read and understand code


Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.

This guy emailed me asking for a *token session refund* because his claw made mistakes. 🙃







