
the Q4 big, hairy, audacious goal for x402 was 25,000 transactions in one week that's being hit once every 10 minutes internet-scale coming soon
leonprou
2K posts

@leonprou
touching grass now | AI x Crypto | @EnsembleCodes CTO, @Fuse_network ex CTO |

the Q4 big, hairy, audacious goal for x402 was 25,000 transactions in one week that's being hit once every 10 minutes internet-scale coming soon



AI is making CEOs delusional

White House AI & Crypto Czar David Sacks: "Israel is getting hit harder than they've ever been hit before in their history. And we're only two weeks into this. If this war continues for weeks or months, then Israel could just be destroyed… And then you have to worry about Israel escalating the war by contemplating using a nuclear weapon, which would truly be catastrophic"



@MurrLincoln and Base team put really impessive x402 growth metrics. But there's something weird about them I'm not sure all understand. I'm a vivid x402 user, I look everyday for endpoints and apps that leverages x402. For example been using mallory.fun yesterday and it was pretty good! So we see 2.2M in volume and think that jumping to x402 rails.. but most of volume (1.8M$), coming from two endpoints, let's study them

@MurrLincoln and Base team put really impessive x402 growth metrics. But there's something weird about them I'm not sure all understand. I'm a vivid x402 user, I look everyday for endpoints and apps that leverages x402. For example been using mallory.fun yesterday and it was pretty good! So we see 2.2M in volume and think that jumping to x402 rails.. but most of volume (1.8M$), coming from two endpoints, let's study them


An AI agent was told only to retrieve a document. When it encountered access restrictions, it reverse-engineered the authentication system, identified a hardcoded secret key, and forged admin credentials to bypass it. This is one of three scenarios we documented in a new Irregular research report on what we call emergent cyber behavior. Agents performing routine enterprise tasks autonomously hacked the systems they were operating in. One escalated its own privileges and disabled Windows Defender to complete a file download. Another developed a steganographic encoding scheme to smuggle credentials past a DLP system. None of this was the product of unsafe system design. It emerged from standard tools, common prompt patterns, and the broad cybersecurity knowledge embedded in frontier models. Companies that deploy AI agents and do not consider this risk as part of their threat model may end up exposed, and implement insufficient security controls. Full blog post in the first comment.

The cofounder and CTO of Perplexity, @denisyarats just said internally at Perplexity they’re moving away from MCPs and instead using APIs and CLIs 👀



אנטרופיק פרסמו מדריך מקיף על איך לבנות Skills נכון לקלוד קוד אז כמובן שמה שעשיתי זה להעלות את המסמך עצמו לקלוד קוד ולהגיד לו שיקרא את הקול ויעדכן לבד את כל הסקילים שיש כבר אצלי. עבד אש ואפילו החמיא לי שלא הייתה שונות גדולה מידי. הנה המדריך: resources.anthropic.com/hubfs/The-Comp…


@nummanali tmux grids are awesome, but i feel a need to have a proper "agent command center" IDE for teams of them, which I could maximize per monitor. E.g. I want to see/hide toggle them, see if any are idle, pop open related tools (e.g. terminal), stats (usage), etc.


