

Sean D. Emory
25.9K posts

@_SeanDavid
Avory Foundational ETF $AVRY | Founding Partner & CIO of @AvoryCo | Investing Forward. | Data tells our stories | Opinions are mine.



New businesses are creating fewer jobs... due to AI, per Bloomberg.



5/12 “AI = Pretext”: $XYZ built 'goose' around Apr '24. This was one of the 1st on-machine AI agent ‘harnesses’. ~50% of the co were using it by Jun '25. Claude Co-Work wasn't released until Jan '26. Block was widely using its own Co-Work ~18m before the RIF & Co-Work's release.







Here's the latest: the trees have been watered, the apples are growing, and we will be announcing when the Cash Apples orchard reopens very soon.




Vail Resorts stock update.


🦔 Researchers at Aikido Security found 151 malicious packages uploaded to GitHub between March 3 and March 9. The packages use Unicode characters that are invisible to humans but execute as code when run. Manual code reviews and static analysis tools see only whitespace or blank lines. The surrounding code looks legitimate, with realistic documentation tweaks, version bumps, and bug fixes. Researchers suspect the attackers are using LLMs to generate convincing packages at scale. Similar packages have been found on NPM and the VS Code marketplace. My Take Supply chain attacks on code repositories aren't new, but this technique is nasty. The malicious payload is encoded in Unicode characters that don't render in any editor, terminal, or review interface. You can stare at the code all day and see nothing. A small decoder extracts the hidden bytes at runtime and passes them to eval(). Unless you're specifically looking for invisible Unicode ranges, you won't catch it. The researchers think AI is writing these packages because 151 bespoke code changes across different projects in a week isn't something a human team could do manually. If that's right, we're watching AI-generated attacks hit AI-assisted development workflows. The vibe coders pulling packages without reading them are the target, and there are a lot of them. The best defense is still carefully inspecting dependencies before adding them, but that's exactly the step people skip when they're moving fast. I don't really know how any of this gets better. The attackers are scaling faster than the defenses. Hedgie🤗 arstechnica.com/security/2026/…

