やまもと

37.4K posts

やまもと

やまもと

@elize180

AI使ったり組み込んだり。 23ラウンド2キル20デスのサイファーだったり。

東京 新宿区 Katılım Aralık 2015
226 Takip Edilen230 Takipçiler
やまもと retweetledi
𝑆𝐼𝐴𝑁
𝑆𝐼𝐴𝑁@SIAN_FKP_37·
エイプリルフールの嘘はどの企業も面白いなぁ
日本語
92
614
8.4K
622.6K
やまもと retweetledi
タナカ
タナカ@johntanaka·
???「内定辞退します」 人事「本気で言ってる?」 ???「本気です」 人事「何で辞退したいの?」 ???「今日入社式なのに寝坊したからです」 人事「大丈夫だから頑張れまだ間に合う」
日本語
419
495
24K
3M
やまもと retweetledi
Polymarket
Polymarket@Polymarket·
BREAKING: Oracle laid off 20,000-30,000 employees this morning with a single 6 am email.
English
738
2.9K
25.2K
2.1M
やまもと retweetledi
麹
@oryzae1824·
麹 tweet media
ZXX
12
953
4.2K
69.6K
やまもと retweetledi
Polymarket
Polymarket@Polymarket·
BREAKING: Source code leak reveals Claude Code detects profanity in user prompts, then silently logs it to a database.
English
474
729
12.2K
1.4M
やまもと retweetledi
Frederik Jacques
Frederik Jacques@thenerd_be·
Today is my first day at Anthropic. Super excited I shipped my first change today, added source maps so debugging is easier. Can’t wait to show you all what I’ve been working on! cc: @AnthropicAI
Frederik Jacques tweet media
English
478
407
14.4K
584.9K
やまもと retweetledi
Kevin Naughton Jr.
Kevin Naughton Jr.@KevinNaughtonJr·
I was fired from Anthropic today. I was the engineer responsible for shipping the latest dev/claude-code npm package. Wanting to improve the debugging experience for the team, I decided to include source maps in the release. This resulted in our entire internal codebase being publicly exposed including thousands of files with every agent command, all system prompts, the complete query engine, Undercover Mode, Bypass Permissions Mode, and our internal telemetry configuration. I take full responsibility. I genuinely believed the safeguards Claude Code had built for me would be adequate and it was a serious miscalculation on my part. My actions have unintentionally open-sourced major parts of Claude’s architecture well ahead of schedule. I apologize to the team and to Claude.
Chaofan Shou@Fried_rice

Claude code source code has been leaked via a map file in their npm registry! Code: …a8527898604c1bbb12468b1581d95e.r2.dev/src.zip

English
930
1.3K
9.2K
2.7M
やまもと
やまもと@elize180·
入れてなくてもサードパーティ側でってケースがあるの厄介すぎて死んだ
日本語
0
0
0
13
やまもと retweetledi
klöss
klöss@kloss_xyz·
do you understand what just happened to one of the most used npm packages on the internet? → axios gets downloaded over 100 million times a week and today it got compromised → an attacker hijacked the npm credentials of a lead axios maintainer… changed the account email to an anonymous ProtonMail address… and manually published two poisoned versions → axios@1.14.1 and axios@0.30.4… neither version contains a single line of malicious code inside axios itself. instead they inject a fake dependency called plain-crypto-js that drops a remote access trojan on your machine → the fake dependency was staged 18 hours in advance… three separate payloads were pre-built for macOS, Windows, and Linux… both release branches were hit within 39 minutes. every trace was designed to self-destruct after execution too → there’s no tag in the axios GitHub repo for 1.14.1. it was published outside the normal release process entirely... bypassed CI/CD completely → StepSecurity called it one of the most operationally sophisticated supply chain attacks ever against a top 10 npm package → a routine npm install silently opens a backdoor… no warning… no suspicious code visible in axios itself this is the wake up call all vibe coding bros need to hear right now: → if you installed either version… assume your system is compromised → pin to axios@1.14.0 or axios@0.30.3 → rotate all secrets, API keys, SSH keys, and credentials on affected machines → check network logs for C2 connections → add –ignore-scripts to CI npm installs going forward 100 million weekly downloads and one compromised maintainer account… that’s all it took to wreak absolute havoc and I imagine we see a whole lot more of these… crazy times ahead for cybersecurity and vibe coding be safe out there y’all
Feross@feross

🚨 CRITICAL: Active supply chain attack on axios -- one of npm's most depended-on packages. The latest axios@1.14.1 now pulls in plain-crypto-js@4.2.1, a package that did not exist before today. This is a live compromise. This is textbook supply chain installer malware. axios has 100M+ weekly downloads. Every npm install pulling the latest version is potentially compromised right now. Socket AI analysis confirms this is malware. plain-crypto-js is an obfuscated dropper/loader that: • Deobfuscates embedded payloads and operational strings at runtime • Dynamically loads fs, os, and execSync to evade static analysis • Executes decoded shell commands • Stages and copies payload files into OS temp and Windows ProgramData directories • Deletes and renames artifacts post-execution to destroy forensic evidence If you use axios, pin your version immediately and audit your lockfiles. Do not upgrade.

English
101
479
3.5K
839.9K
やまもと retweetledi
Jars
Jars@TontonJars·
Les vibecoders qui voient tout le monde parler du dangereux hack npm mais n’y comprennent rien du tout :
Français
32
335
4K
170.8K
やまもと
やまもと@elize180·
Valorantさん、きちんとネオンのせいで人口減ってるらしくて草
日本語
0
0
0
68
やまもと
やまもと@elize180·
なんでエナドリをわざわざ0カロリー0シュガーにするんだよ 健康気にする奴はエナドリ飲まねえよ
電ファミニコゲーマー@denfaminicogame

「モンスター」の“ウルトラバイスグァバ”が本日より日本で発売開始 news.denfaminicogamer.jp/news/260331v 開放感あふれるグァバの爽やかな味わいが特徴のエナジードリンク。0カロリー&0シュガーで甘さ控えめの「モンスター ウルトラシリーズ」最新作

日本語
0
0
0
81