
Billy Benson
115 posts

Billy Benson
@BILLYBENS0N
Obsessed with efficiency. Creative Technologist working in AI & automation.


Introducing Higgsfield Supercomputer The first ever cloud-native, self-learning AI agent for end-to-end task execution. 40+ built-in tools. Three layers of memory. Access via browser or Telegram. Powered by enhanced Hermes Agent.

🪰 📡That green blob on radar at sunset is a massive termite swarm! Unlike ground clutter (buildings/trees), which look similar, these swarms move with the wind on "storm motion" products. According to experts, it seems they’ve been waiting out the rain to emerge!




‼️🚨 UPDATE: The TanStack npm attack is now a full campaign. 'Mini' Shai-Hulud has hit: - OpenSearch - Mistral AI - Guardrails AI -UiPath - Squawk packages across npm and PyPI The malware specifically targets AI developer tooling. It hooks into Claude Code (.claude/settings.json) and VS Code (.vscode/tasks.json) to re-execute on every tool event, long after the infected package is gone. npm uninstall does not fix this.


‼️🚨 BREAKING: A new npm supply-chain attack uses a dead-man's switch. The payload plants a watcher on your machine that nukes your home directory the second you revoke the GitHub token it stole from you. The compromise happened today, across 42 official tanstack npm packages, 84 malicious versions in total. tanstack/react-router alone pulls more than 12 million weekly downloads. The attacker forked TanStack's repository and pushed a single hidden commit. From there, they tricked TanStack's own release system into signing the malicious packages as if they were the real thing. To npm, and to anyone checking the cryptographic proof of origin (SLSA provenance), the poisoned versions looked 100% legitimate. Maintainer Tanner Linsley confirmed the whole team had 2FA enabled. It didn't matter. This is the first documented npm worm in history that ships with a valid, signed certificate of authenticity, the same one defenders rely on to know a package wasn't tampered with.


















