OpenMatter

222 posts

OpenMatter banner
OpenMatter

OpenMatter

@OpenMatter_

Verifiable Collaboration. Computing without Exposure. https://t.co/6mrYtL8Q3M

Global Katılım Ağustos 2025
6 Takip Edilen126 Takipçiler
Sabitlenmiş Tweet
OpenMatter
OpenMatter@OpenMatter_·
The OpenMatter Network testnet is live! Join, deploy a job or an agent, battle test the network, register your idle hardware to power the future of private compute. onboard.openmatter.network
English
0
0
2
169
OpenMatter retweetledi
Devi Devs
Devi Devs@Devi__Devs·
@OpenMatter_ Exactly this. We work with companies on EU AI Act compliance and the number one blocker is never the regulation itself. It is that their ML pipeline has zero audit trail, no data lineage, no model versioning. Compliance as a product spec is the right framing.
English
0
1
1
21
OpenMatter
OpenMatter@OpenMatter_·
@dfolloni @cline Guardrails de texto falham inevitavelmente. O agente obedeceu, mas não pôde verificar se a instrução era autorizada. A solução são MPC e ZK guardrails: vincular chamadas a políticas, dividir segredos para impedir exfiltração. Conformidade precisa de matemática, não de prompts.
Português
0
0
0
17
Deborah Folloni
Deborah Folloni@dfolloni·
Um hacker simplesmente hackeou o @cline e instalou o OpenClaw em 4.000 computadores com prompt injection 🫠 Olha que loucura: - O time do Cline criou um workflow de triagem de issues automatizado no GitHub, usando o próprio Claude pra ler e categorizar os tickets - O hacker abriu uma issue com um prompt injection no título — o Claude leu, achou que era uma instrução legítima, e executou - Com isso, ele encheu o cache do GitHub com lixo até forçar a deleção dos caches legítimos de build, substituiu por caches envenenados, e roubou os tokens de publicação do npm - Com os tokens em mãos, ele publicou uma nova versão do cline que parecia idêntica a anterior, só que com uma linhazinha a mais no package.json: "postinstall": "npm install -g openclaw@latest" Resultado: 4,000 devs instalaram o openclaw nas suas máquinas sem saber (aka: um agente com acesso total ao seu computador) 🥲 Muito importante lembrar que IAs não têm malícia e por isso prompt injections são, na minha opinião, a maior vulnerabilidade delas. Resumindo galera: CUIDADO. quem quiser ler na íntegra: thehackernews.com/2026/02/cline-…
Português
61
266
2K
155.1K
OpenMatter
OpenMatter@OpenMatter_·
@cline is a warning shot. 4,000 developers compromised by one issue title. The next attack won't stop at OpenClaw. It will go after treasuries, databases, production systems. Secure the execution layer. Turn text-based rules into cryptographic guarantees. Build on math. 6/6
English
0
0
0
9
OpenMatter
OpenMatter@OpenMatter_·
This isn’t about better prompt engineering. It’s not about output classifiers. The attack surface for agents is not the model. It is the execution environment. If the environment trusts text, it will be exploited. 5/6
English
1
0
0
3
OpenMatter
OpenMatter@OpenMatter_·
Yet another inevitable hack. Not because Claude failed. Because text-based security always fails. When agents read untrusted input and execute system commands, prompt injection is not a bug. It’s an architectural vulnerability. Here’s how we fix it. 🧵 1/6
Deborah Folloni@dfolloni

Um hacker simplesmente hackeou o @cline e instalou o OpenClaw em 4.000 computadores com prompt injection 🫠 Olha que loucura: - O time do Cline criou um workflow de triagem de issues automatizado no GitHub, usando o próprio Claude pra ler e categorizar os tickets - O hacker abriu uma issue com um prompt injection no título — o Claude leu, achou que era uma instrução legítima, e executou - Com isso, ele encheu o cache do GitHub com lixo até forçar a deleção dos caches legítimos de build, substituiu por caches envenenados, e roubou os tokens de publicação do npm - Com os tokens em mãos, ele publicou uma nova versão do cline que parecia idêntica a anterior, só que com uma linhazinha a mais no package.json: "postinstall": "npm install -g openclaw@latest" Resultado: 4,000 devs instalaram o openclaw nas suas máquinas sem saber (aka: um agente com acesso total ao seu computador) 🥲 Muito importante lembrar que IAs não têm malícia e por isso prompt injections são, na minha opinião, a maior vulnerabilidade delas. Resumindo galera: CUIDADO. quem quiser ler na íntegra: thehackernews.com/2026/02/cline-…

English
1
0
0
29
OpenMatter
OpenMatter@OpenMatter_·
Data marketplaces are failing because they require moving data. No enterprise sends proprietary data to a stranger's server to sell it. The winners will be networks where compute travels to the data. Process blindly. Return the insight. No data movement. No legal risk.
English
0
0
0
15
shafu
shafu@shafu0x·
dm if you are building something with agentic commerce, x402 and mpp
English
36
6
124
7.4K
OpenMatter
OpenMatter@OpenMatter_·
Regulation isn't killing AI adoption, bad infrastructure is. Legal teams block AI because they can't verify what happens to the data. ZK-proofs solve this. Compliance is not a blockade. It is a product spec most stacks forgot to build.
English
2
2
3
68
OpenMatter
OpenMatter@OpenMatter_·
Agents are now controlling treasuries. Most store private keys in plaintext environment variables on centralized clouds. One breach and the agent is drained. Threshold decryption is the only architecture that allows agents to hold capital safely. Stop building banks out of glass.
English
0
0
3
32
OpenMatter
OpenMatter@OpenMatter_·
Intel and NVIDIA are pushing enclaves as the answer for AI privacy. It's a trap. TEEs require trusting the hardware vendor. You can't audit silicon. When a backdoor is found, every "secure" workload is exposed. Privacy must be mathematical. MPC doesn't trust. It verifies.
English
1
0
2
84
OpenMatter
OpenMatter@OpenMatter_·
@usv @aweissman @uninsightful Yes and yes. We're building PQ safe MPC to process data blindly and ZKP to return only verified insights. Agent economy with MPC key protection + ZK-firewall for compliance, access controls, and audit commitments. MCP and x402 to make it plug and play. Seed round live now!
English
0
0
1
44
USV
USV@usv·
We’re paying close attention to the open architecture emerging around AI agents. MCP, CLIs, skills, and protocols like x402 are becoming the Lego bricks of a new layer where agents can act, pay, and compose across the web. If you're building new native capabilities for agents, we’d love to talk.
USV tweet media
English
78
27
322
71.2K
OpenMatter
OpenMatter@OpenMatter_·
@ReallyNotB0B Yes, exactly what we're building. ZK can prove a variety of checks and balances using ZK-output compliance, toolcall compiance, access control, and audit commitments. AI research agents will rapidly become the norm.
English
0
0
0
4
Andy
Andy@andyyy·
Without privacy, this industry isn't going to scale. We need privacy.
English
153
50
453
41.4K
OpenMatter
OpenMatter@OpenMatter_·
OMNI is solving common enterprise security threats like: Data Leakage: use Masked Compute to collaborate on data without sharing it. Your data stays yours, nobody sees it. Rogue Agents: ZK-firewall let's you bring your own agent without risking prompt injections or bad APIs.
English
0
0
2
68