Dai Motoki | ZentoAI(全国統一生成AI活用技能試験) 責任者
102.4K posts

Dai Motoki | ZentoAI(全国統一生成AI活用技能試験) 責任者
@zento_ai
Founder of ZentoAI @zentou_ai & KAMUI | CEO of KandaQuantum → https://t.co/mqt3qh370h | ZentoAI → Japan only (for now) 全国統一生成AI活用技能試験 |

If you don't want Claude to read your .env files Just add this to your .claude/settings.json


Claude Designで社内ダッシュボードのデザインを作り直しているんだけど、手書き風にすると和みが増して良い。


Claude Codeに.envは絶対に読ませるな。 可能ならローカルに.envを置くな。

「第1回 全統AI基礎開発力試験」、終わった! 3月にやった「第1回 全国統一生成AI活用技能試験」は激ムズすぎてボロボロだったから、非常に身構えていたけど、今回は本当に「基礎開発力」を試験をやりながら気づく仕様で、「おぉ、できるぞ!私、これできるようになっていたんだ」と分かる良い試験。






どちらかというと時間制限付きのプロジェクト学習に近い気がした。 学校とかでやると面白そう。 個人的には、小問ごとに1時間くらい時間をもらってじっくりやれるとAIの回答も読んで、概念理解までいけそうだけど、時間がかかった問1でも回答は流し読みだった。


Here's my update to the broader community about the ongoing incident investigation. I want to give you the rundown of the situation directly. A Vercel employee got compromised via the breach of an AI platform customer called Context.ai that he was using. The details are being fully investigated. Through a series of maneuvers that escalated from our colleague’s compromised Vercel Google Workspace account, the attacker got further access to Vercel environments. Vercel stores all customer environment variables fully encrypted at rest. We have numerous defense-in-depth mechanisms to protect core systems and customer data. We do have a capability however to designate environment variables as “non-sensitive”. Unfortunately, the attacker got further access through their enumeration. We believe the attacking group to be highly sophisticated and, I strongly suspect, significantly accelerated by AI. They moved with surprising velocity and in-depth understanding of Vercel. At the moment, we believe the number of customers with security impact to be quite limited. We’ve reached out with utmost priority to the ones we have concerns about. All of our focus right now is on investigation, communication to customers, enhancement of security measures, and sanitization of our environments. We’ve deployed extensive protection measures and monitoring. We’ve analyzed our supply chain, ensuring Next.js, Turbopack, and our many open source projects remain safe for our community. The recommendation for all Vercel customers is to follow the Security Bulletin closely (vercel.com/kb/bulletin/ve…). My advice to everyone is to follow the best practices of security response: secret rotation, monitoring access to your Vercel environments and linked services, and ensuring the proper use of the sensitive env variables feature. In response to this, and to aid in the improvement of all of our customers’ security postures, we’ve already rolled out new capabilities in the dashboard, including an overview page of environment variables, and a better user interface for sensitive env var creation and management. As always, I’m totally open to your feedback. We’re working with elite cybersecurity firms, industry peers, and law enforcement. We’ve reached out to Context to assist in understanding the full scale of the incident, in an effort to protect other organizations and the broader internet. I also want to thank the Google Mandiant team for their active engagement and assistance. It’s my mission to turn this attack into the most formidable security response imaginable. It’s always been a top priority for me. Vercel employs some of the most dedicated security researchers and security-minded engineers in the world. I commit to keeping you updated and rolling out extensive improvements and defenses so you, our customers and community, can have the peace of mind that Vercel always has your back.








