argen

774 posts

argen

argen

@0xancaeus

gamer, dev, electronics engg. Average JOJO FAN

Katılım Eylül 2022
576 Takip Edilen125 Takipçiler
argen
argen@0xancaeus·
@AzFlin i feel it apply to game dev in general
English
0
0
0
6
AzFlin 🌎
AzFlin 🌎@AzFlin·
The difference between vibe coding a game and vibe coding a game that people actually want to play Is very big.
English
59
13
278
10.3K
argen
argen@0xancaeus·
@theo what a call
English
0
0
0
33
Theo - t3.gg
Theo - t3.gg@theo·
Claude Code being closed source is the biggest bag fumble in the AI era. If CC was on Github, these things would be trivial to identify and fix. Instead we're stuck reverse engineering their incompetence.
Alex Volkov@altryne

PSA: If you've been running out of Claude session quotas on Max tier, you're not alone. Read this. Some insane Redditor reverse engineered the Claude binaries with MITM to find 2 bugs that could have caused cache-invalidation. Tokens that aren't cached are 10x-20x more expensive and are killing your quota. If you're using your API keys with Claude this is even worse. This is also likely why this isn't uniform, while over 500 folks replied to me and said "me too", many (including me) didn't see this issue. There are 2 issues that are compounded here (per Redditor, I haven't independently confirmed this) : 1s bug he found is a string replacement bug in bun that invalidates cache. Apparently this has to do with the custom @bunjavascript binary that ships with standalone Claude CLI. The workaround there is to use Claude with `npx @anthropic-ai/claude-code` 2nd bug is worse, he claims that --resume always breaks cache. And there doesn't seem to be a workaround there, except pinning to a very old version (that will miss on tons of features) This bug is also documented on Github and confirmed by other folks. I won't entertain the conspiracy theories there that Anthropic "chooses" to ignore these bugs because it gets them more $$$, they are actively benefiting from everyone hitting as much cached tokens as possible, so this is absolutely a great find and it does align with my thoughts earlier. The very sudden spike in reporting for this, the non-uniform nature (some folks are completely fine, some folks are hitting quotas after saying "hey") definitely points to a bug. cc @trq212 @bcherny @_catwu for visibility in case this helps all of us.

English
227
115
3.1K
531.7K
ellen livia ᯅ 🇺🇸🇮🇩
TLDR - more stats + read the article today 1. Axios - npm maintainer hijacked, RAT deployed to 100M+ weekly downloads 2. Railway - CDN misconfiguration leaked authenticated user data for 52 minutes 3. Mercor AI - LAPSUS$ allegedly stole 939GB source code and 4TB total data 4. OpenAI Codex - command injection via branch names, found in Dec 2025, patched by Feb 2026, BeyondTrust published findings today (no evidence of exploitation, but shows why AI coding tools need more scrutiny) 5. Copilot - Microsoft allegedly injected ads into 1.5M+ GitHub pull requests without developer consent1. last week: 6. LiteLLM - PyPI package backdoored, three-stage credential harvester across 97M monthly installs 7. Delve - $300M compliance startup allegedly exposed for fabricating 493 SOC 2 audit reports BONUS Non AI Security Heist: Over 400K KitKat candy bars stolen in European heist (Yes 400K?!)
ellen livia ᯅ 🇺🇸🇮🇩@ellen_in_sf

x.com/i/article/2038…

English
9
33
168
22.8K
Matt Ehrnschwender
Matt Ehrnschwender@M_alphaaa·
Oh... well that's not good
Matt Ehrnschwender tweet media
Feross@feross

🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios has 100M+ weekly downloads. Every npm install pulling the latest version is potentially compromised right now. Socket AI analysis confirms this is malware. plain-crypto-js is an obfuscated dropper/loader that: • Deobfuscates embedded payloads and operational strings at runtime • Dynamically loads fs, os, and execSync to evade static analysis • Executes decoded shell commands • Stages and copies payload files into OS temp and Windows ProgramData directories • Deletes and renames artifacts post-execution to destroy forensic evidence If you use axios, pin your version immediately and audit your lockfiles. Do not upgrade.

English
11
15
236
75K
argen retweetledi
vx-underground
vx-underground@vxunderground·
Cybersecurity nerds this week after experiencing 50 supply chain attacks last week
vx-underground tweet media
English
27
188
2.6K
47.3K
argen retweetledi
milk
milk@iShowShitpost·
ZXX
77
9.5K
84.5K
1.5M
argen retweetledi
vx-underground
vx-underground@vxunderground·
TeamPCP has done ANOTHER supply chain attack. My Brother in Christ, how many of these fuckin' things are you going to do? YOU'VE DONE 50 FUCKING SUPPLY CHAIN ATTACKS. 50 SUPPLY CHAIN ATTACKS IN EIGHT FUCKING DAYS. March 19th: - Trivy March 20th: - EmilGroup (28 packages) - OpenGov (16 packages) - Teale-io (eslint-config) - AIRTM (uuid-base32) - PypeSteam (floating-ui-dom) March 23rd: - Checkmarx March 24th: - LiteLLM March 27th: - Telnyx
vx-underground tweet media
English
58
186
1.8K
76.3K
argen retweetledi
Nathie
Nathie@NathieVR·
This mixed reality app lets you create and ride thrilling rollercoasters in your own living room. It uses physics-based tools to design tracks that adapt to your space and then simply hop in the front seat for a first-person ride like no other.
English
196
1.8K
19.2K
1.7M
Myself | Wesker
Myself | Wesker@AlmightyWesker·
Bro's building an insane immune system
English
35
1.8K
24.9K
321.7K
argen retweetledi
vx-underground
vx-underground@vxunderground·
Whoa whoa whoa. Everyone CLAM down for a second. Earlier today someone broke the news that there was a supply chain attack impacting LiteLLM which had over 97 MILLION installs. Initially it was reported the payload was vibe coded which resulted in the payload failing. HOWEVER, this has been determined to be NOT TRUE. The payload was a SUCCESS. The payload failed in specific edge cases (currently unknown). The Threat Actor(s) managed to exfiltrate data from 500,000 infected machines (approx. 300gb of data). I have confirmed this from three different sources. The initially news which is spreading all over social media is incorrect and this is actually a very big bamboozle. They had one short, one opportunity, and did indeed seize it (but only failing in specific and unknown edge cases). It's all over for LLM-dependency nerds. Also, in a bit of irony, LiteLLM is SOC2 certified by Delve. This is very big shenanigans for a Tuesday.
vx-underground tweet media
English
53
202
2.5K
116.7K
argen retweetledi
Glitchbyte
Glitchbyte@0xglitchbyte·
Damn, theyre trying to do it to arch too What happened to privacy and freedom?
Glitchbyte tweet media
English
231
276
2.5K
120.9K
argen retweetledi
Pirat_Nation 🔴
Pirat_Nation 🔴@Pirat_Nation·
Kojima did this on Death Stranding 2 with no DLSS 5
English
453
2K
50.5K
2.4M
Fuggy
Fuggy@CEOofFuggy·
This looks so vibe coded I can just tell somehow by how it looks
Fuggy tweet media
English
1
0
1
74
argen
argen@0xancaeus·
@kamisamaexp Leon can parry these with household knife as well
English
0
0
1
1.2K