Romeo Sanz ☕️💾

42.3K posts

Romeo Sanz ☕️💾 banner
Romeo Sanz ☕️💾

Romeo Sanz ☕️💾

@knaverit

CISO, Cryptography & Software Security Geek, Infosec barista ☕️💻🎵▪MSc Artificial Intelligence▪Profe en ITESM y UANL ▪#SrJava▪️Bajista 𝄢 ▪️ Tengo voz de Gokú

The Crypt 🇲🇽 Katılım Ağustos 2009
5.1K Takip Edilen5.7K Takipçiler
Sabitlenmiş Tweet
Romeo Sanz ☕️💾
Romeo Sanz ☕️💾@knaverit·
Esta semana sepulté a mi mamá en una ciudad lejana. Murió de una manera inesperada, trágica, absurda e injusta, y con ella se fue la mitad de mi corazón. Me ha hecho bien hablar y escribir de ella, y me consuela saber que siempre supo cuánto la amo, y que fue muy feliz. 💔❤️‍🩹🤍😔
Romeo Sanz ☕️💾 tweet mediaRomeo Sanz ☕️💾 tweet mediaRomeo Sanz ☕️💾 tweet media
Español
78
1
217
0
Romeo Sanz ☕️💾
RT @harktos: DÍA DEL LIBRO ¡Ah, qué placer es tomar un libro entre las manos!, abrirlo y dejar que escapen sus olores… ora de tinta y papel…
Español
0
1
0
1
Srita K.👩🏻‍💻
Srita K.👩🏻‍💻@SritaKaren·
El desayuno parece ser sencillo pero replicar la receta de los frijoles refritos de mi madre me puso a prueba. 😅
Srita K.👩🏻‍💻 tweet media
Español
7
1
49
1.2K
Romeo Sanz ☕️💾
Romeo Sanz ☕️💾@knaverit·
Tengo un conflicto cuando escucho que pronuncian «Claude» como si fuera «cloud». 😖 🇲🇽 🇺🇸
Español
1
0
6
362
Romeo Sanz ☕️💾 retweetledi
Pablo Corona Fraga
Pablo Corona Fraga@pcoronaf·
Cuando dicen "se filtró el código fuente de una IA" y piensan que eso revela todo lo que sucede dentro, es el gran ejemplo de que entienden poco de cómo funcionan estos modelos grandes y que no están "programados" con código en su parte más interna y relevante.
Pablo Corona Fraga@pcoronaf

En algo que parece una broma de April's fool Se filtró el código de Claude Code, pero conviene ponerlo en contexto: Anthropic distribuyó por error una actualización que incluía un archivo de depuración, y eso expuso parte del código fuente de Claude Code.

Español
1
1
2
293
Romeo Sanz ☕️💾
Romeo Sanz ☕️💾@knaverit·
Lo que acaba de pasar con Claude Code es el equivalente a la rapiña que hacen cuando se accidenta un camión con mercancía: llega la gente que anda cerca del accidente y se lleva todo lo que puede. #AI
Español
0
0
2
95
Romeo Sanz ☕️💾 retweetledi
Shruti
Shruti@heyshrutimishra·
Anthropic leaked 512,000 lines of Claude Code source code yesterday. What happened in the next 12 hours is absolutely wild. 4 AM. Anthropic pushes an update to npm. Inside the package: their entire codebase. A 60 MB debugging file accidentally bundled in. 23 minutes later, researcher Chaofan Shou spots it. Downloads the zip. Posts it on X. Within 6 hours: 3 million views. By the time Anthropic’s team woke up, the code was forked 41,000+ times across GitHub. Anthropic started firing DMCA takedowns. Too late. A Korean developer named Sigrid Jin woke up to his phone exploding. He’s Claude Code’s biggest power user. WSJ reported he burned through 25 billion tokens last year. He read the leaked code. Rewrote the entire thing in Python in 8 hours. His repo hit 30,000 stars faster than any GitHub project in history. Then he rewrote it again in Rust. That version now has 49,000 stars. Someone mirrored it to a decentralized platform with one message: “will never be taken down.” The code is permanent. Anthropic cannot get it back. Here’s the part I can’t stop thinking about: Anthropic built something called “Undercover Mode.” Its only job: prevent Claude from accidentally leaking internal secrets. They shipped an entire anti-leak system in their own product. Then leaked their own source code in a .map file. Irony is beautiful
@

Claude code source code has been leaked via a map file in their npm registry! Code: …a8527898604c1bbb12468b1581d95e.r2.dev/src.zip

English
250
1.3K
6.4K
1.6M
Romeo Sanz ☕️💾 retweetledi
Andrej Karpathy
Andrej Karpathy@karpathy·
Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database passwords. LiteLLM itself has 97 million downloads per month which is already terrible, but much worse, the contagion spreads to any project that depends on litellm. For example, if you did `pip install dspy` (which depended on litellm>=1.64.0), you'd also be pwnd. Same for any other large project that depended on litellm. Afaict the poisoned version was up for only less than ~1 hour. The attack had a bug which led to its discovery - Callum McMahon was using an MCP plugin inside Cursor that pulled in litellm as a transitive dependency. When litellm 1.82.8 installed, their machine ran out of RAM and crashed. So if the attacker didn't vibe code this attack it could have been undetected for many days or weeks. Supply chain attacks like this are basically the scariest thing imaginable in modern software. Every time you install any depedency you could be pulling in a poisoned package anywhere deep inside its entire depedency tree. This is especially risky with large projects that might have lots and lots of dependencies. The credentials that do get stolen in each attack can then be used to take over more accounts and compromise more packages. Classical software engineering would have you believe that dependencies are good (we're building pyramids from bricks), but imo this has to be re-evaluated, and it's why I've been so growingly averse to them, preferring to use LLMs to "yoink" functionality when it's simple enough and possible.
Daniel Hnyk@hnykda

LiteLLM HAS BEEN COMPROMISED, DO NOT UPDATE. We just discovered that LiteLLM pypi release 1.82.8. It has been compromised, it contains litellm_init.pth with base64 encoded instructions to send all the credentials it can find to remote server + self-replicate. link below

English
1.4K
5.4K
28.1K
66.5M
Romeo Sanz ☕️💾
Romeo Sanz ☕️💾@knaverit·
“La primavera agarra y empieza.” —Manolito. 🌺
Español
0
0
1
57
Romeo Sanz ☕️💾 retweetledi
Mili
Mili@Ing_Mili·
#NovedadesIA 🤖 ⚠️ La Inteligencia Artificial también tiene riesgos… y debemos saber identificarlos. El Mapa de Riesgos de IA basado en el repositorio del MIT de @ISMSForum reúne más de 1,700 riesgos asociados a sistemas de inteligencia artificial, organizados para ayudar a las organizaciones a identificar, evaluar y mitigar impactos relacionados con sesgos, privacidad, ciberseguridad, desinformación y uso indebido. 📌 Un recurso muy útil para fortalecer la gobernanza de IA, la gestión de riesgos y el cumplimiento regulatorio en organizaciones públicas y privadas. 📄 Consulta el documento aquí: ismsforum.es/ficheros/desca… #IAResponsable #GobernanzaDeIA #GestiónDeRiesgos #ProtecciónDeDatos #TodoPDP
Mili tweet media
Español
7
172
469
26.8K