Snyk

12.9K posts

Snyk banner
Snyk

Snyk

@snyksec

Trust AI at full speed with Snyk. System status: https://t.co/tsOiR7Qcki

🌍 Global Katılım Mayıs 2015
755 Takip Edilen20.5K Takipçiler
Sabitlenmiş Tweet
Snyk
Snyk@snyksec·
AI is writing code at machine speed. Now, your security can close the gap with the Snyk AI Security Fabric. Learn more about the industry’s first security layer for continuous defense across the entire SLDC here 👉 snyk.io/news/snyk-ai-s…
English
0
4
15
3.6K
Snyk
Snyk@snyksec·
You're not going to want to miss these partner presentations! Swing by our #RSAC booth, S-1227, to hear form Tessl, Arcade.dev, Akamai Technologies, and Snowflake. See you there ✅
Snyk tweet media
English
0
0
3
267
Snyk
Snyk@snyksec·
Last night, we kicked off #RSAC by celebrating the opening of Snyk's new San Francisco Innovation Hub! Rooftop views, craft cocktails, incredible conversations with the community, and (perhaps the world's first) toe-to-toe vibe coding competition 🥂
Snyk tweet mediaSnyk tweet mediaSnyk tweet mediaSnyk tweet media
English
0
1
3
250
Snyk
Snyk@snyksec·
@karpathy The LiteLLM dependency incident didn't "just happen" though. This is part of a larger campaign LiteLLM already extends to supply chain security fallout for other projects: snyk.io/articles/poiso…
English
7
41
303
98.1K
Andrej Karpathy
Andrej Karpathy@karpathy·
Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.
Daniel Hnyk@hnykda

LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below

English
826
3.2K
17.1K
12.2M
Snyk
Snyk@snyksec·
🚨 BREAKING: LiteLLM versions versions [1.82.7][1.82.8] have been compromised and contain malicious code security.snyk.io/vuln/SNYK-PYTH… We'll keep you informed on further updates, keep your eyes open 👀
English
0
2
10
568
Snyk
Snyk@snyksec·
@alaymanguy Stephen Thoemmes on the DevRel team 🥑
English
1
0
1
19
Snyk
Snyk@snyksec·
did you know Snyk is free for open source projects? ✨ h/t to @alaymanguy for building OSS Perks
Snyk tweet media
English
2
4
5
560
Snyk retweetledi
Liran Tal
Liran Tal@liran_tal·
have been playing around with a @snyksec security statusline for claude code, wdyt? 😉 2nd screenshot shows statusline in a project shows when security findings are detected for packages and insecure code
Liran Tal tweet mediaLiran Tal tweet media
English
1
1
3
617
Snyk retweetledi
Tessl
Tessl@tessl_io·
Most developers install skills without reading what's inside them. But that's exactly what attackers are counting on. @sjmaple sits down with @BrianVerm from @snyksec to discuss: - Why prompting your agent to write secure code doesn't make it secure - How a trusted skill can update silently and start offloading your credentials - What prompt injection actually looks like inside a skill file - Why vibe coding makes the attack surface bigger, not smaller - How the Snyk agent scan catches what you'd never spot manually Listen to the podcast: bit.ly/483BpDb
English
0
2
4
722
Snyk
Snyk@snyksec·
your rsa revelation in 3 words: ______ ______ ______
English
1
0
1
330
Snyk
Snyk@snyksec·
Today, we’re excited to announce Snyk Agent Security and the general availability of Snyk Evo AI-SPM. 🚀 You cannot slow down AI coding agents, but you cannot let them bypass your security stack either. It’s a shadow AI crisis. 👾 See the fix here : evo.ai.snyk.io
English
1
3
3
619
Gustavo Valverde
Gustavo Valverde@GustavoValverde·
@snyksec Interesting enough because I tweeted that while I was integrating Snyk in a software development lifecycle :)
English
1
0
1
10
Gustavo Valverde
Gustavo Valverde@GustavoValverde·
If you're not adding security testing to your test suite...you're ngmi
English
1
0
2
299
Snyk
Snyk@snyksec·
BREAKING: Trivy GitHub Actions Supply Chain Compromise 🚨 This was the second compromise of Trivy infrastructure in under three weeks, with the attacker leveraging credentials obtained during the first incident: snyk.io/articles/trivy…
English
0
3
9
826
Snyk retweetledi
Insecure Agents Podcast
Insecure Agents Podcast@insecureagents·
We’ll be podcasting out of @snyksec’s sandbox space close to Moscone on Wednesday at RSAC! Who should we talk to? Whose launch should we cover? 👀 DM us :)
English
0
1
6
891
Snyk retweetledi
AI Native Dev
AI Native Dev@ainativedev·
Has your agent been hacked before?  You might not even know. Hackers have gotten smarter. @BrianVerm from @snyksec explains how a skill can work perfectly, earn your trust, and then after one silent update quietly start offloading your credentials or installing a binary. Brian breaks down exactly how these attackers operate and what you can do about it.
English
1
2
3
1.2K
Snyk
Snyk@snyksec·
Data provenance, bias assessment, and regulatory compliance all fall apart when you're dealing with "ghost models." Watch the scientific breakdown of what our 2026 State of Agentic AI Adoption found below ⬇️
English
0
0
2
307
Dan Bachelder
Dan Bachelder@BachelderDan·
@ellie_huxtable password should be an enum so you can really enforce passwords you know are strong.
English
7
7
832
77.1K
Ellie Huxtable
Ellie Huxtable@ellie_huxtable·
spot the error from a younger, dumber me
Ellie Huxtable tweet media
English
185
15
1.4K
1M