jfmelo

117 posts

jfmelo banner
jfmelo

jfmelo

@jfmelo_

🇧🇷

Katılım Nisan 2022
71 Takip Edilen2.8K Takipçiler
jfmelo
jfmelo@jfmelo_·
@theo optimization isn't one of Microsoft's quality...
English
0
0
0
37
Theo - t3.gg
Theo - t3.gg@theo·
I sent a single message on Copilot and it did over 60m tokens. It's still going. $30 of inference so far. In their current billing model, you get 1,500 messages, regardless of how expensive each is. I'm pretty sure I can do $45,000 of messaging on this plan
Theo - t3.gg tweet media
English
146
13
2.1K
154.7K
jfmelo
jfmelo@jfmelo_·
I accidentally figured that my volume button keys actually work on my Linux... Who would have guessed that?
English
0
0
0
23
jfmelo
jfmelo@jfmelo_·
@maxcallstack yes, that's the point of the trade-off.. for this specific use-case, the scope was so tiny that I wouldn't benefit from Rust's power.. thus, I choose Go for the sake of simplicity and handiness.. It's like you said, it depends on the task..
English
0
0
1
3
Hormuz closed again
Hormuz closed again@maxcallstack·
@jfmelo_ I mean, (I'm not taking a stance) If in this scenario Golang can perform just as good as Rust with 6 libs then it's doesn't. But if Rust is significantly outperforming Go here then yes the 6 libs are worth it. I guess it just depends on the task.
English
1
0
1
29
jfmelo
jfmelo@jfmelo_·
Trade-off: 6 libs with Rust x 0 libs with Go to get the exact same feature done! Many times I've faced this...
English
1
0
1
79
jfmelo
jfmelo@jfmelo_·
GPT5.5 isn't good at Rust... it suggested adding 5 libs and writing 17 lines of code for parsing the response stream from a model into a vector of structs... I've done that with no extra lib and 3 lines of code!
English
0
0
0
39
Cloudflare
Cloudflare@Cloudflare·
Static sites are having a renaissance. What is your favorite static site generator right now and why do you prefer it? #CloudflareChat
English
102
12
225
64.8K
jfmelo retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️ Apple accidentally shipped Claude[.]md files in the Apple Support app update (v5.13). For context, Claude[.]md is the instruction file Anthropic's Claude Code uses to understand a project's structure, conventions, and developer guidance. They typically live in source repos and are not meant to ship inside production apps. Source: @aaronp613
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
54
186
1.8K
277.7K
jfmelo retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
229
2.7K
11.7K
2.4M
Anonymous
Anonymous@YourAnonOne·
#BREAKING: Elon Musk says most cryptocurrencies are "scams" during OpenAI court testimony.
Anonymous tweet media
English
41
35
208
18.6K
jfmelo
jfmelo@jfmelo_·
GitHub stars aren't reliable anymore... Just in case you don't know, "creators" are paying for "fake" stars now...
English
0
0
0
43
jfmelo retweetledi
Wiz
Wiz@wiz_io·
🚨 BREAKING: Wiz Research discovered Remote Code Execution on GitHub.com with a single git push The flaw in @github allowed unauthorized access to millions of repositories belonging to other users and organizations 🤯
Wiz tweet media
English
92
1K
4.5K
534.8K
jfmelo
jfmelo@jfmelo_·
This is what AI was created for...
English
0
0
0
23
jfmelo
jfmelo@jfmelo_·
the world is changing... we're getting more Agent Framework/SDK than JS frameworks... who would guess?
English
0
0
0
63
Anonymous
Anonymous@YourAnonOne·
Name a huge scam.
English
10.6K
449
5.7K
3.8M
jfmelo
jfmelo@jfmelo_·
while everyone is talking about claude, codex, openclaw... don't forget our friend n8n, that's still one of the best workflow automation tools
jfmelo tweet media
English
2
0
1
77
jfmelo retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🛡️ Claude Code, Gemini CLI, & GitHub Copilot Vulnerable to Prompt Injection via GitHub Source: cybersecuritynews.com/prompt-injecti… A critical cross-vendor vulnerability class dubbed "Comment and Control" is a new category of prompt injection attacks that weaponizes GitHub pull request titles, issue bodies, and issue comments to hijack AI coding agents and steal API keys and access tokens directly from CI/CD environments. The attack name is a deliberate play on the classic Command and Control (C2) framework used in malware campaigns. Three widely deployed AI agents, Anthropic's Claude Code Security Review, Google's Gemini CLI Action, and GitHub Copilot Agent (SWE Agent), were confirmed vulnerable. #cybersecuritynews
Cyber Security News tweet media
English
14
98
342
27.9K
jfmelo retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️ Critical Anthropic’s MCP Vulnerability Enables Remote Code Execution Attacks Source: cybersecuritynews.com/anthropics-mcp… A critical flaw in Anthropic’s Model Context Protocol (MCP) exposes over 150 million downloads to potential compromise. The vulnerability could enable full system takeover across up to 200,000 servers. Unlike a traditional coding bug, this vulnerability is architectural, meaning any developer building on Anthropic's MCP foundation unknowingly inherits the exposure from the ground up. The flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation. Successful exploitation grants attackers direct access to sensitive user data, internal databases, API keys, and chat histories, effectively handing over complete control of the affected environment. #cybersecuritynews
Cyber Security News tweet media
English
90
334
1.5K
413.9K