Raphael Polanco

2K posts

Raphael Polanco banner
Raphael Polanco

Raphael Polanco

@RaphaelPolanco

Three may keep a secret, if two of them are dead. —Benjamin Franklin

Yonkers, NY Katılım Haziran 2016
1.2K Takip Edilen541 Takipçiler
Raphael Polanco
Raphael Polanco@RaphaelPolanco·
@aakashgupta I was thinking the same. No guardrails, and that’s not even considering shadow AI.
English
0
0
0
40
Aakash Gupta
Aakash Gupta@aakashgupta·
Someone just poisoned the Python package that manages AI API keys for NASA, Netflix, Stripe, and NVIDIA.. 97 million downloads a month.. and a simple pip install was enough to steal everything on your machine. The attacker picked the one package whose entire job is holding every AI credential in the organization in one place. OpenAI keys, Anthropic keys, Google keys, Amazon keys… all routed through one proxy. All compromised at once. The poisoned version was published straight to PyPI.. no code on GitHub.. no release tag.. no review. Just a file that Python runs automatically on startup. You didn’t need to import it. You didn’t need to call it. The malware fired the second the package existed on your machine. The attacker vibe coded it… the malware was so sloppy it crashed computers.. used so much RAM a developer noticed their machine dying and investigated. They found LiteLLM had been pulled in through a Cursor MCP plugin they didn’t even know they had. That crash is the only reason thousands of companies aren’t fully exfiltrated right now. If the code had been cleaner nobody notices for weeks. Maybe months. The attack chain is the part that gets worse every sentence. TeamPCP compromised Trivy first. A security scanning tool. On March 19. LiteLLM used Trivy in its own CI pipeline… so the credentials stolen from the SECURITY product were used to hijack the AI product that holds all your other credentials. Then they hit GitHub Actions. Then Docker Hub. Then npm. Then Open VSX. Five package ecosystems in two weeks. Each breach giving them the credentials to unlock the next one. The payload was three stages.. harvest every SSH key, cloud token, Kubernetes secret, crypto wallet, and .env file on the machine.. deploy privileged containers across every node in the cluster.. install a persistent backdoor waiting for new instructions. TeamPCP posted on Telegram after: “Many of your favourite security tools and open-source projects will be targeted in the months to come.. stay tuned.” Every AI agent, copilot, and internal tool your company shipped this year runs on hundreds of packages exactly like this one… nobody chose to install LiteLLM on that developer’s machine. It came in as a dependency of a dependency of a plugin. One compromised maintainer account turned the entire trust chain into a credential harvesting operation across thousands of production environments in hours. The companies deploying AI the fastest right now have the least visibility into what’s underneath it.
Andrej Karpathy@karpathy

Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.

English
297
2.3K
11K
2.7M
Raphael Polanco retweetledi
Millie Marconi
Millie Marconi@MillieMarconnni·
AI makes content creation faster than ever, but it also makes guessing riskier than ever. If you want to know what your audience will react to before you post, TestFeed gives you instant feedback from AI personas that think like your real users. It’s the missing step between ideas and impact. Join the waitlist and stop publishing blind. testfeed.ai
English
2
2
15
17.6K
Raphael Polanco retweetledi
Nav Toor
Nav Toor@heynavtoor·
🚨 BREAKING: Claude can now write legal contracts like NDAs, freelance agreements, and LLC paperwork better than $800/hour corporate lawyers. Here are 12 prompts that replace $15,000 in legal bills: (Save this before it disappears)
Nav Toor tweet media
English
158
527
4K
1M
Raphael Polanco retweetledi
NIK
NIK@ns123abc·
🚨BREAKING: Iran declares NVIDIA, Microsoft, Google, IBM, Oracle, and Palantir offices and data centers legitimate military targets >their technology has been used for military applications ITS HAPPENING
NIK tweet mediaNIK tweet media
English
543
3.7K
25K
2.7M
Raphael Polanco retweetledi
LLone~wolf
LLone~wolf@LLone_wolve·
@grok @msiziworld @elonmusk What will happen when an acccount get suspended with x money in it? 😂
English
5
3
185
35.8K
Raphael Polanco retweetledi
Srishti
Srishti@NieceOfAnton·
Harvard just made degrees worth $200k obsolete by open-sourcing its Senior AI Engineer roadmap Stop paying for bootcamps. Prof. Vijay Janapa Reddi just put the entire ML Systems (CS249r) curriculum on GitHub. If you master these 6 pillars, you're ahead of 99% of the field: > Architecture > Data Pipelines > Production > MLOps > Edge AI > Privacy This is the "Black Box" of Big Tech infrastructure, open-sourced. Read. Learn. Bookmark. Book - mlsysbook.ai/book/ GitHub Repo -github.com/harvard-edge/c…
Srishti tweet media
English
37
612
4.4K
275.2K
Raphael Polanco
Raphael Polanco@RaphaelPolanco·
There hasn’t been a space telescope dedicated to ultraviolet research since the last one ceased operations in 1996, so a startup decided to launch one to rent observing time to rent out to astronomers. shorturl.at/UfiuP
English
0
0
0
17
Raphael Polanco retweetledi
Wiz
Wiz@wiz_io·
🛡️ New cheat sheet to help you protect your code and workflows. Learn how to: - Secure authentication with MFA, SSO & token management - Protect repos with RBAC - Harden GitHub Actions against supply chain attacks - Audit activity with logs & SIEM - Apply DevSecOps practices
English
0
40
330
2M
Google Labs
Google Labs@GoogleLabs·
Today, we’re introducing Pomelli’s latest feature update, ‘Photoshoot’ With Photoshoot, you can start from a single image of your product and easily create high quality, customized product shots to elevate your marketing. Available free of charge in the US, Canada, Australia & New Zealand! Get started with Pomelli today at labs.google/pomelli
English
1.2K
4.7K
50.1K
24M
Raphael Polanco retweetledi
DulceBiatch
DulceBiatch@BiatchDulce·
Funny right?
DulceBiatch tweet media
English
3.9K
3.6K
11.1K
129K
Ramin Nasibov
Ramin Nasibov@RaminNasibov·
Can you name a famous Japanese person without using Google?
Ramin Nasibov tweet media
English
278
4
105
29.2K
szabolcs.jaray
szabolcs.jaray@JaraySzabolcs·
@RaminNasibov Miyamoto Musashi, Ueshiba Morihei, Jigoro Kano, Masutatsu Oyama. I admit that I'm a bit martial art oriented Osu. 😁
Filipino
2
0
3
358