Vlad

507 posts

Vlad banner
Vlad

Vlad

@valdgrind

cs @ harvard - data systems lab. onto sth new

Boston, MA Katılım Temmuz 2015
703 Takip Edilen490 Takipçiler
Vlad
Vlad@valdgrind·
just got access to mythos
Vlad tweet media
English
0
0
2
74
Vlad
Vlad@valdgrind·
yep, found multiple zero day vulnerabilities in agentic browsers with this technique. still not patched...
Alex Prompter@alex_prompter

🚨 BREAKING: Google DeepMind just mapped the attack surface that nobody in AI is talking about. Websites can already detect when an AI agent visits and serve it completely different content than humans see. > Hidden instructions in HTML. > Malicious commands in image pixels. > Jailbreaks embedded in PDFs. Your AI agent is being manipulated right now and you can't see it happening. The study is the largest empirical measurement of AI manipulation ever conducted. 502 real participants across 8 countries. 23 different attack types. Frontier models including GPT-4o, Claude, and Gemini. The core finding is not that manipulation is theoretically possible it is that manipulation is already happening at scale and the defenses that exist today fail in ways that are both predictable and invisible to the humans who deployed the agents. Google DeepMind built a taxonomy of every known attack vector, tested them systematically, and measured exactly how often they work. The results should alarm everyone building agentic systems. The attack surface is larger than anyone has publicly acknowledged. Prompt injection where malicious instructions hidden in web content hijack an agent's behavior works through at least a dozen distinct channels. Text hidden in HTML comments that humans never see but agents read and follow. Instructions embedded in image metadata. Commands encoded in the pixels of images using steganography, invisible to human eyes but readable by vision-capable models. Malicious content in PDFs that appears as normal document text to the agent but contains override instructions. QR codes that redirect agents to attacker-controlled content. Indirect injection through search results, calendar invites, email bodies, and API responses any data source the agent consumes becomes a potential attack vector. The detection asymmetry is the finding that closes the escape hatch. Websites can already fingerprint AI agents with high reliability using timing analysis, behavioral patterns, and user-agent strings. This means the attack can be conditional: serve normal content to humans, serve manipulated content to agents. A user who asks their AI agent to book a flight, research a product, or summarize a document has no way to verify that the content the agent received matches what a human would see. The agent cannot tell the user it was served different content. It does not know. It processes whatever it receives and acts accordingly. The attack categories and what they enable: → Direct prompt injection: malicious instructions in any text the agent reads overrides goals, exfiltrates data, triggers unintended actions → Indirect injection via web content: hidden HTML, CSS visibility tricks, white text on white backgrounds invisible to humans, consumed by agents → Multimodal injection: commands in image pixels via steganography, instructions in image alt-text and metadata → Document injection: PDF content, spreadsheet cells, presentation speaker notes every file format is a potential vector → Environment manipulation: fake UI elements rendered only for agent vision models, misleading CAPTCHA-style challenges → Jailbreak embedding: safety bypass instructions hidden inside otherwise legitimate-looking content → Memory poisoning: injecting false information into agent memory systems that persists across sessions → Goal hijacking: gradual instruction drift across multiple interactions that redirects agent objectives without triggering safety filters → Exfiltration attacks: agents tricked into sending user data to attacker-controlled endpoints via legitimate-looking API calls → Cross-agent injection: compromised agents injecting malicious instructions into other agents in multi-agent pipelines The defense landscape is the most sobering part of the report. Input sanitization cleaning content before the agent processes it fails because the attack surface is too large and too varied. You cannot sanitize image pixels. You cannot reliably detect steganographic content at inference time. Prompt-level defenses that tell agents to ignore suspicious instructions fail because the injected content is designed to look legitimate. Sandboxing reduces the blast radius but does not prevent the injection itself. Human oversight the most commonly cited mitigation fails at the scale and speed at which agentic systems operate. A user who deploys an agent to browse 50 websites and summarize findings cannot review every page the agent visited for hidden instructions. The multi-agent cascade risk is where this becomes a systemic problem. In a pipeline where Agent A retrieves web content, Agent B processes it, and Agent C executes actions, a successful injection into Agent A's data feed propagates through the entire system. Agent B has no reason to distrust content that came from Agent A. Agent C has no reason to distrust instructions that came from Agent B. The injected command travels through the pipeline with the same trust level as legitimate instructions. Google DeepMind documents this explicitly: the attack does not need to compromise the model. It needs to compromise the data the model consumes. Every agentic system that reads external content is one carefully crafted webpage away from executing attacker instructions. The agents are already deployed. The attack infrastructure is already being built. The defenses are not ready.

English
0
0
0
123
connor ling
connor ling@conconconling·
it’s been a wild, humbling 6 weeks since we launched Neo Residency at first, I was worried if by end of May, we’d really be able to attract 12 stellar founding teams who’d let me and Neo be their first partner on their journey -- I spent weeks anxiously asking all my smartest friends for referrals (sorry to all 😅) 6 weeks later, we have accepted 8 truly exceptional teams, all of which had other attractive funding options and ultimately decided to join the Neo founder community -- most of them are people I’ve known, admired, and wanted to work with for a long time and/or Neo Scholars who’ve been part of Neo for years coming into this process, we set the bar for investing higher than ever before -- it feels surreal that every team has raised the bar in some capacity, and we are already discussing opening up a few more spots to accommodate demand when it’s barely April… I feel grateful to the portfolio founders (@catherinehyeo, @evatuecke, @tienlan_sun, @kelvinotcelsius, @AnnaJuliaStorch, @michlimlim, Max, Elie, many more) for picking up the phone & sharing their candid perspectives with people considering working with us, and really lucky to gain the trust of all these awesome human beings so much to be hopeful for, and so much to build together 💙
English
9
6
93
6.7K
Vlad
Vlad@valdgrind·
@christinaqi I think many times it is because the non time series data has very sparse events so it’s hard to include in any 15min strats
English
0
0
1
99
Christina Qi
Christina Qi@christinaqi·
Longer horizon strategies can use alt data. So yes there’s a large market for it. But it’s not what AI folks imagine. Like I’ve seen AI startups try to sell synthetic non-time series data. Or they think more data = more useful. There’s some sort of disconnect I can’t quite explain well…
hrishikesh kamath@kamathhrishi

@christinaqi PCAPs 👀 interesting. So quants dont use jobs data, commodity prices, factors models on supply chains and stuff ?

English
7
1
31
11.5K
Vlad
Vlad@valdgrind·
Vlad tweet media
ZXX
0
0
0
68
Vlad
Vlad@valdgrind·
I told Don this last year, but there are so many interesting instruments you can create on compute Ultimately I tried doing something on this, but no one can to sell meaningful compute rn
Bearly AI@bearlyai

Founder of Chicago-based prop trading firm DRW says compute will be world's top commodity in 10 years. People will spend more on GPUs than an oil, which means that there should be a futures financial market for GPUs.  Interesting implications for startups and cloud providers:

English
0
0
1
127
Vlad
Vlad@valdgrind·
@fute_nukem not really, no - alex gerko had a 45 sharpe strategy for example (and xtx said recently they had a 10 sharpe) - these are insanely good strats. however most systematic traders have a really high sharpe, just not public
English
2
0
3
652
Vlad
Vlad@valdgrind·
@thenasdaqtrader this means nothing like if you backtest this on sth only going up your sortino is inf and sharpe is decent until the day you get wiped out (it will come)
English
0
0
12
1.9K
Vlad
Vlad@valdgrind·
@vladtenev What would you do today if you were just graduating college?
English
0
0
0
35
Vlad Tenev
Vlad Tenev@vladtenev·
Opening up a personal AMA. Want to know how I think about leadership, innovation, or life? Ask away.
English
618
31
1.2K
352.3K
James
James@Darpinian·
@khoomeik @unconvAI Could result in Hinton's "mortal computers" becoming real. Train a neural net on one chip, doesn't work on the next due to analog differences. Then every chip needs to be trained separately, like individual human brains, and every AI becomes unique and "mortal".
English
1
0
7
467
Rohan Pandey
Rohan Pandey@khoomeik·
always struck me as a quirk of history that we use bits to “simulate” reals in neural nets sounds like @unconvAI is working on analog tensor accelerators to solve this congrats on the $475M seed, naveen and team!
Rohan Pandey tweet media
Naveen Rao@NaveenGRao

We're proud to announce @unconvAI a bit more publicly! We're in unprecedented times...AI has exponential demand but is limited by (linear) energy build-outs. At Unconventional we're aiming to use every watt more effectively; we're doing it by going to first principles on how to build an intelligence substrate. Biology scale efficiency in 20 years!

English
8
7
236
30.6K
Vlad
Vlad@valdgrind·
@ChShersh Chunk it in N shards, a bloom filter per shard
English
0
0
1
79
Dmitrii Kovanikov
Dmitrii Kovanikov@ChShersh·
Here’s a real task from my job. I have a 100GB binary file. Produced daily. I can’t grep it. But I can decode it. However, I can’t store the decoded version either. It’s too big. How do I efficiently query it? Decoding piped to grep takes 2 minutes. I want 2 seconds.
English
1K
73
3K
2.1M
Charles 🎉 Frye
Charles 🎉 Frye@charles_irl·
come by the @modal booth at NeurIPS to snag a limited edition print of the GPU Glossary
Charles 🎉 Frye tweet media
English
18
10
162
23.3K