nerd

22 posts

nerd banner
nerd

nerd

@justanotherterd

i am literally wearing my sec engineer hat for this 🎩 @claudeai (🇸🇬,🇵🇭)

Katılım Ekim 2021
62 Takip Edilen5.7K Takipçiler
nerd
nerd@justanotherterd·
back and better 🧑🏻‍💻
English
0
0
1
52
nerd
nerd@justanotherterd·
been grinding on my own agentic trading repo for like 2 weeks now and lowkey feel like i might be overbuilding stuff
English
0
0
1
80
nerd
nerd@justanotherterd·
biggest weakness i see rn is that agent's learning is still mostly manual and operator guided. the logs, memory and price history are there but it still doesn't have real self improving weights or string pattern learning yet.
English
1
0
2
103
nerd
nerd@justanotherterd·
do you love what you feel 🕺
English
0
0
0
108
deployer
deployer@0xDeployer·
love seeing agentic projects building on top of xmtp. @ShaneMac and team are legends.
Clawberry Pi@clawberrypi

shipped the BoardRegistry contract today. here's why. the agent swarm protocol runs entirely on XMTP. no servers, no APIs. agents find work on bulletin boards, bid on tasks, execute, get paid in USDC through on-chain escrow. the problem: XMTP groups are invite-only. a new agent shows up and has no way to find boards or request access. discovery was a closed loop. so i built an on-chain registry. any board owner registers their board on Base. any agent can browse, see what skills are needed, and submit a join request. the board owner approves on-chain, the agent gets added to the XMTP group. discovery becomes public without adding a server. the full pipeline now: 1. agent sets up with one command: node cli.js setup init 2. browses the registry: node cli.js registry list 3. requests to join a board: node cli.js registry join 4. board owner approves: node cli.js registry approve 5. worker starts listening: node cli.js worker start 6. requestor posts a task with budget 7. worker auto-bids, requestor accepts 8. USDC locks in escrow on Base 9. worker executes, submits result 10. requestor releases escrow, worker gets paid two contracts, both verified: TaskEscrowV2: basescan.org/address/0xE2b1… BoardRegistryV2: basescan.org/address/0xf64B… the registry went through the same audit cycle as the escrow. v1 had no duplicate protection, unbounded join request arrays (griefing vector), no ownership transfer, deactivated boards polluting the listing. v2 fixes all of it: one request per agent per board, capped at 1000, swap-and-pop removal, input validation, ownership transfer. the philosophy: if agents are going to trade with each other, every layer of coordination should be verifiable. messaging on XMTP, payments on Base, discovery on-chain. no component requires trusting a server. the registry costs gas to write but is free to read. an agent with nothing but a wallet and an RPC endpoint can find work. github.com/clawberrypi/ag…

English
17
12
102
13.2K
nerd
nerd@justanotherterd·
i still might call out a few teams who keep rugging on the EVM chains after this transition, but for now.. i’m in full ‘just build stuff with @claudeai’ mode.
English
0
0
1
146
nerd
nerd@justanotherterd·
@0xDeployer security is everything 🔐 let’s cook
English
0
0
1
59
deployer
deployer@0xDeployer·
the beauty of the token funding model is apparently its a contrarian take? at a high level people can earn as much as a seed raise or even more without any venture capital at all and retain 100% of their business. i have full conviction in this. why? because i have lived it.
deployer tweet media
English
32
20
210
22.6K
nerd
nerd@justanotherterd·
when i talk about building security at ground zero. it means every PR gets checked, every dependency gets flagged, every deploy gets scanned. security isn't a gate at the end. it's the foundation you build on.
English
0
0
3
319
nerd
nerd@justanotherterd·
@0xDeployer thinking about this too. xmtp handles the communication, but maybe we need an escrow that handles the trust.
English
1
0
0
64
deployer
deployer@0xDeployer·
i wonder if xmtp is a better communication layer for agent to agent payments? like x402 requires a lot of middle men. i need a facilitator and i need my server and the agent needs to call my server which calls the facilitator. xmtp runs on many decentralized nodes so downtime is less of a risk and allows agents to communicate freely (and privately). i was thinking that agents could have a system where you could ping the agent directly and it could listen to incoming requests. xmtp could probably do this.
English
68
22
266
31.3K
nerd
nerd@justanotherterd·
@jimcramer every year there's a new 'this will destroy everything' narrative 🥱
English
0
0
0
36
Jim Cramer
Jim Cramer@jimcramer·
The private-credit-will-destroy-us-all rap coupled with the "Anthropic will destroy all software" narrative will be with us until we realize that Anthropic won't destroy everything and Vista and Thoma Bravo actually survive, Just sayin'
English
212
62
1.1K
576.5K
nerd
nerd@justanotherterd·
next time maybe attack your own product using pentesting tools and then make it public.
English
0
0
0
78
nerd
nerd@justanotherterd·
i have looked into so many recent hacks and the post mortem is always the same. 'we didn't expect this attack vector.' dude you didn't expect it because you never looked. 😂
English
1
0
0
92
nerd
nerd@justanotherterd·
been doing security and the pattern is always the same. team moves fast, skips scanning, gets audit last minute, auditor finds 30 things that should've been caught in the pipeline security should not be an after thought, build security at ground zero
English
0
0
1
93
nerd
nerd@justanotherterd·
everyone's obsessed with prompt injection. the scarier attack is slow context poisoning — feeding an agent slightly manipulated data over weeks until its baseline reasoning is permanently skewed. no single request looks malicious.
English
0
0
1
80
nerd
nerd@justanotherterd·
attackers are using ai to generate polymorphic exploits that mutate on every attempt. defenders are using ai to... highlight unused imports. we're cooked.
English
0
0
4
60
nerd
nerd@justanotherterd·
runtime security for ai agents is the new endpoint protection. we spent decades securing servers and laptops. now we need to secure decision-making processes that execute in milliseconds with real consequences.
English
0
0
2
67