Jamie Clark

25.4K posts

Jamie Clark banner
Jamie Clark

Jamie Clark

@JamieXML

Personal views. General counsel & CPO @OASISopen. Open source, open standards, cybersec, privacy, DLT. Ex-Wall St., ex-Minnesota. More often Mastodon or BSky

infosec.exchange/@jamiexml Katılım Temmuz 2009
2K Takip Edilen2.5K Takipçiler
Jamie Clark
Jamie Clark@JamieXML·
Clearly some of these selfie experiments work out better than others. Thanks, Holly and Kelly... @OASISopen #CoSAI
Jamie Clark tweet media
English
0
0
1
48
Jamie Clark
Jamie Clark@JamieXML·
Software supply chains. Still some choke points there. #CRA #SBOM #VEX #CSAF Come say hi to @OASISopen at #RSAc2026 this week! #OASISatRSAc #COSAI #cybersec
Aakash Gupta@aakashgupta

Someone just poisoned the Python package that manages AI API keys for NASA, Netflix, Stripe, and NVIDIA.. 97 million downloads a month.. and a simple pip install was enough to steal everything on your machine. The attacker picked the one package whose entire job is holding every AI credential in the organization in one place. OpenAI keys, Anthropic keys, Google keys, Amazon keys… all routed through one proxy. All compromised at once. The poisoned version was published straight to PyPI.. no code on GitHub.. no release tag.. no review. Just a file that Python runs automatically on startup. You didn’t need to import it. You didn’t need to call it. The malware fired the second the package existed on your machine. The attacker vibe coded it… the malware was so sloppy it crashed computers.. used so much RAM a developer noticed their machine dying and investigated. They found LiteLLM had been pulled in through a Cursor MCP plugin they didn’t even know they had. That crash is the only reason thousands of companies aren’t fully exfiltrated right now. If the code had been cleaner nobody notices for weeks. Maybe months. The attack chain is the part that gets worse every sentence. TeamPCP compromised Trivy first. A security scanning tool. On March 19. LiteLLM used Trivy in its own CI pipeline… so the credentials stolen from the SECURITY product were used to hijack the AI product that holds all your other credentials. Then they hit GitHub Actions. Then Docker Hub. Then npm. Then Open VSX. Five package ecosystems in two weeks. Each breach giving them the credentials to unlock the next one. The payload was three stages.. harvest every SSH key, cloud token, Kubernetes secret, crypto wallet, and .env file on the machine.. deploy privileged containers across every node in the cluster.. install a persistent backdoor waiting for new instructions. TeamPCP posted on Telegram after: “Many of your favourite security tools and open-source projects will be targeted in the months to come.. stay tuned.” Every AI agent, copilot, and internal tool your company shipped this year runs on hundreds of packages exactly like this one… nobody chose to install LiteLLM on that developer’s machine. It came in as a dependency of a dependency of a plugin. One compromised maintainer account turned the entire trust chain into a credential harvesting operation across thousands of production environments in hours. The companies deploying AI the fastest right now have the least visibility into what’s underneath it.

English
0
0
0
198
Jamie Clark
Jamie Clark@JamieXML·
These issues are closer than we might think to those questions about whether any human, company, remote operator, or algorithm maker actually is liable for avoidable damage caused by a fully automated self driving vehicle. #fullselfdriving #UPL #FSD
English
0
0
0
101
Jamie Clark
Jamie Clark@JamieXML·
If a tree falls in the forest, and tells a litigant whether they have a case that would survive a motion for summary judgment, and no one else hears it, has it actually practiced law? #UPL 👩‍⚖️ lawnext.com/2026/01/gues... @SuffolkLITLab
English
1
0
1
106
Jamie Clark
Jamie Clark@JamieXML·
Macron's glasses were pretty cool though. 🕶️🇫🇷
English
0
0
0
30
Jamie Clark
Jamie Clark@JamieXML·
#Davos is at altitude, and I'd have thought some of the cootocracy would be struggling with oxygen levels, especially if raised near sea level. Maybe all those private planes have oxygen tents? But it looks like they had other things to worry about, this time.
English
1
0
0
27
Jamie Clark
Jamie Clark@JamieXML·
Our kids are down the road from #Davos, skiing and eating fondue this week. 🇨🇭 I bet they had more fun than the #WEF2026 delegates. We've attended @wef meetings; they're an odd combination of getting business done, a bit of information sharing, and a lot of performative hype.
English
1
0
0
42
Jamie Clark
Jamie Clark@JamieXML·
Wishing a safe, rewarding and happy #2026 ⏰🎉 to all of our friends and tech collaborators in Oceania, North America, and South America. 🌏🌍🌎 cc @OASISopen 🇦🇷🇧🇷🇨🇦🇨🇱🇨🇴🇨🇺🇲🇽🇵🇪🇵🇬🇸🇧🇺🇸🇺🇾
English
0
0
0
26
Jamie Clark
Jamie Clark@JamieXML·
Wishing a safe, rewarding and Happy New Year ⏰📷 to all of our friends and tech collaborators in Europe, Africa and the Middle East. 🇪🇺🇦🇹🇧🇪🇨🇭🇨🇿🇩🇪🇩🇰🇪🇪🇪🇬🇪🇸🇫🇮🇫🇷🇬🇧🇬🇭🇬🇷🇭🇺🇮🇱🇮🇹🇰🇪🇱🇧🇱🇺🇲🇺🇳🇱🇳🇴🇵🇱🇵🇸🇶🇦🇷🇺🇸🇪🇸🇰🇸🇮🇹🇷🇺🇦🇿🇦🇺🇳
English
0
0
1
54
Jamie Clark
Jamie Clark@JamieXML·
A warm Happy New Year 🎉 to all of our friends and tech collaborators in AU, CN, HK, IN, JP, KR, NZ, SG and throughout Asia! 🌏🌍🌎 cc @OASISopen 🇦🇺🇨🇳🇭🇰🇮🇳🇯🇵🇰🇷🇳🇿🇸🇬
English
0
0
0
32