mteam.eth

16K posts

mteam.eth banner
mteam.eth

mteam.eth

@mteamisloading

cofounder @spire_labs ~ eliminate the middleman

based Katılım Kasım 2021
1.9K Takip Edilen10.8K Takipçiler
Sabitlenmiş Tweet
mteam.eth
mteam.eth@mteamisloading·
I'm in crypto to eliminate the middleman. Disintermediate all human coordination. Finance, commerce, social, governance (corporation, even state level), information curation, internet infra, physical infra, content creation, science, property rights, employment...
English
352
37
787
95.9K
mteam.eth
mteam.eth@mteamisloading·
@banteg it was a banger prompt I'm sure
English
1
0
0
119
banteg
banteg@banteg·
my most popular recent post by a wide margin is a shitpost written by gpt 5.5 in one shot. marking humor agi achieved here. it's great news, because humor is a true eval of intelligence.
English
1
1
27
2.2K
arixon
arixon@arixoneth·
@mteamisloading @kapilansh_twt they have this sharing in warp but i find termius ssh with tailscale to be easier or sometimes using litter for codex tho it has some bad gui bugs for long threads
English
2
0
1
27
kapilansh
kapilansh@kapilansh_twt·
as a dev, what was your first code editor?
kapilansh tweet media
English
394
12
423
34.4K
arixon
arixon@arixoneth·
it’s good, still learning stuff about multitasking and all that the gui is nice imo, different from a normal terminal but nice. stuff like tracking your branches etc without messing with zsh and everything stays uniform even if i ssh into another machine, since they do things through their own ssh client or whatever i actually have most of their agent stuff turned off, i just do pi -p most of the time, and when i do things by hand the llm autocomplete is convenient
English
1
0
1
20
arixon
arixon@arixoneth·
@mteamisloading @kapilansh_twt well yeah i'm also more in the terminal with agents, trying out warp now that they became OSS but i have also enjoyed ghostty a lot after the default terminal lol, warp should also migrate to libghostty probably it's gud
English
1
0
1
17
Ethereum Foundation
Ethereum Foundation@ethereumfndn·
0/ Clear signing is now live. An open standard to end blind signing, making human-readable transactions default. This effort brings a major UX and Security upgrade to transaction signing on Ethereum.
Ethereum Foundation tweet media
English
92
277
1.4K
137.1K
Mallesh Pai
Mallesh Pai@malleshpai·
Thrilled that @Rabby_io has fully integrated with Tempo, including Tempo Transactions! This enables users to have all the UX benefits of account abstraction: batching (approve and swap!), passkeys, access keys, fee sponsorship and a lot more, natively and cheaply. Try it out and let us know what you think!
Tempo@tempo

Rabby Wallet is live on Tempo With native support for Tempo Transactions, Rabby users get features including: → Approve & swap in a single transaction → Fees paid in any stablecoin → Native fee sponsorship

English
5
1
16
1.1K
mteam.eth retweetledi
João Mendonça
João Mendonça@joaomendoncaaaa·
0 RTT for any book adjusting transaction that doesn't rely on offchain sources I'm not a quant so I don't really know how useful onchain info is in relative terms. big CEX venues are probably the ones who truly dictate execution at any point in time will be hard to overcome these network effects in market structure but propAMMs are a glimpse of the world computer vision; having business logic literally onchain so that other programs can compose with it and get rugged when the program eventually gets exploited directionally very bullish, people are actually putting in the work even tho it still seems very technically challenging to make it viable
mteam.eth@mteamisloading

Prop AMMs enable literally 0 latency order updates. Your contract can change its entire orderbook based on trades throughout the block. Thats very useful if you are the top venue for a token, and I think prop amms for long tail tokens with use this well.

English
1
1
10
1.1K
mteam.eth
mteam.eth@mteamisloading·
@junbug_sol @joaomendoncaaaa Yes, there is lots of other risk categories that still need to be eliminated. In crypto we see a lot of adverse selection risk too, for example.
English
0
0
1
14
MilliΞ
MilliΞ@llamaonthebrink·
MEV, a concept that I was utterly fascinated by, is hardly even mentioned on the timeline anymore…
English
35
4
220
19.4K
mteam.eth
mteam.eth@mteamisloading·
@feross Does sfw work with bun / yarn / pnpm or other package managers like cargo or curl scripts? I'd really like to avoid installing malware 😅
English
0
0
0
283
Feross
Feross@feross·
Socket flagged every malicious version within six minutes of publication.
Feross@feross

🚨 Active supply chain attack on @tan_stack. 84 npm packages in the @​tanstack namespace have been compromised with a credential-stealing worm. @​tanstack/react-router alone has 12M+ weekly downloads. The affected packages span react-router, solid-router, vue-router, start, and dozens more across the TanStack ecosystem. Additional compromised packages were also found in the @​uipath namespace and several other organizations. Socket flagged every malicious version within six minutes of publication. Here's what the malware does: • Injects a 2.3 MB obfuscated file (router_init.js) that daemonizes itself on install, detaching from the terminal so nothing looks wrong • Harvests credentials from GitHub Actions (including OIDC tokens), AWS (IMDSv2, Secrets Manager, SSM across multiple regions), HashiCorp Vault, and Kubernetes service accounts • Uses stolen OIDC tokens to autonomously republish itself to npm under the compromised maintainer's identity, turning every infected CI pipeline into a new propagation vector • Writes persistence hooks into .claude/ and .vscode/ directories so it survives across reboots and re-executes when developers use Claude Code or open VS Code • Exfiltrates everything through the Session decentralized P2P network, making C2 traffic nearly indistinguishable from encrypted messaging • Commits copies of itself to maintainer repositories via GitHub's GraphQL API, spoofing the author as claude@users.noreply.github.com to blend in with legitimate Claude Code activity • Generates valid Sigstore provenance attestations for the malicious packages, meaning provenance badges alone cannot be trusted as a security signal The attack vector: an orphaned commit (no parent history) in the TanStack/router repo was used to hijack the CI workflow's OIDC token, bypassing existing publishing protections including 2FA. The commit was authored by the account "voicproducoes," whose repos include projects named "A Mini Shai-Hulud has Appeared," linking this to an ongoing campaign Socket has been tracking. TanStack maintainer Tanner Linsley confirmed the attack and the team is unpublishing compromised versions and shutting down publishing pipelines while they remediate. What to do right now: • Check your dependency tree for router_init.js. SHA256: ab4fcadaec49c03278063dd269ea5eef82d24f2124a8e15d7b90f2fa8601266c • Rotate npm tokens, GitHub PATs, AWS credentials, Vault tokens, and K8s service account tokens on any system that installed an affected version • Audit .claude/ and .vscode/ directories for router_runtime.js, setup.mjs, or unfamiliar hooks • Check git log for commits authored by claude@users.noreply.github.com that weren't initiated through the legitimate Claude Code app • Block egress to filev2.getsession[.]org at the DNS level • Do not trust Sigstore provenance badges alone Full list of affected packages and IOCs: socket.dev/blog/tanstack-… Developing story...

English
14
14
376
814.7K
mteam.eth
mteam.eth@mteamisloading·
@llamaonthebrink Meh, I also think it's just less entertaining as a topic. No more bell curves about mev lol
English
0
0
1
83
MilliΞ
MilliΞ@llamaonthebrink·
@mteamisloading It’s one or a combination of these: - we became indifferent to its extraction - user/builder awareness increased so it’s somewhat mitigated - activity has died down onchain - entrenched actors won the war of attrition so there isn’t much of a debate left
English
4
0
15
1K
Bruno Skvorc
Bruno Skvorc@bitfalls·
The /be-thorough skill is the coolest thing I've discovered to date in LLM development, and it feels like I can't tell anyone about it because of the X shadowban. It's insane how useful this is and what good results it provides.
Bruno Skvorc tweet media
English
4
1
6
624