Anthony Wu

6.7K posts

Anthony Wu banner
Anthony Wu

Anthony Wu

@anthonywu

Currently: sabbatical + parenting + open source. Prev: Staff@Apple, TL@Google/YouTube, CTO & Co-Founder @LearnSprout (YC IK12 Batch, acq'd)

California, USA Sumali Mart 2009
0 Sinusundan664 Mga Tagasunod
Anthony Wu nag-retweet
Matthew Prince 🌥
Matthew Prince 🌥@eastdakota·
GPU utilization is embarrassingly low. This is actually good versus the hyperscalers. We’re about to speedrun the multi-tenant CPU optimizations of the last 25 years, including all the security headaches, but with GPUs.
The Information@theinformation

xAI’s GPU fleet is running at about 11% utilization, exposing how hard it is for AI labs to fully use expensive Nvidia hardware. Read more in our AI Agenda newsletter: thein.fo/4cHRjWI

English
53
58
1.3K
273K
Anthony Wu nag-retweet
Anthony Wu
Anthony Wu@anthonywu·
@shellscape Agree. I feel like this is the inflection point of a series of bad decisions. Not too late to undo the bloat goals @bunjavascript
English
0
0
1
87
Anthony Wu nag-retweet
Vaibhav (VB) Srivastav
Team shipped a Codex Security plugin with 5 AppSec workflows: > Security Scan Scans PRs, commits, branches, patches, folders, or full repos. Runs the full pipeline end-to-end > Threat Model Maps the repo: assets, trust boundaries, attacker inputs, invariants, and failure modes > Finding Discovery Finds plausible vulns: authz bypass, SSRF, path traversal, injection, cross-tenant leaks, sandbox escapes, dangerous sinks, etc > Validation Separates signal from noise. Uses PoCs, tests, debugger traces, ASan/valgrind, realistic repros, or static tracing > Attack Path Analysis Turns findings into attacker stories: reachability, counterevidence, impact, severity, and whether it should actually be reported It’s a packaged security review for your projects: threat model → discovery → validation → attack path → report Try it out today!!
Vaibhav (VB) Srivastav tweet media
Robin Ebers | AI Coach for Founders@robinebers

Codex now has a Security Scanner? when tf was this added and why is this not a bigger deal?

English
14
42
328
43K
Andrew Qu
Andrew Qu@andrewqu·
@richtan0 The setup was brutal, I had to put down a credit card to even write to a repo :|
English
2
0
1
315
Anthony Wu nag-retweet
Mario Zechner
Mario Zechner@badlogicgames·
@michellechen and they didn't even fork it this time! what is happening?!
English
2
1
34
2.8K
Anthony Wu nag-retweet
Darren Shepherd
Darren Shepherd@ibuildthecloud·
Sandboxes need cache space. I don't get how you are going to do fast spin up without it. I feel like all the gains of fast spinup are going to get negated by having to download content.
English
7
3
22
4K
Anthony Wu nag-retweet
Tibo
Tibo@thsottiaux·
Tibo tweet media
ZXX
60
54
2.2K
63.6K
Anthony Wu nag-retweet
Sam Altman
Sam Altman@sama·
i think a lot of people are going to be busier (and hopefully more fulfilled) than ever, and jobs doomerism is likely long-term wrong. though of course there will be disruption/significant transition as we switch to new jobs, the jobs of the future may look v different, etc.
English
290
161
4K
684.3K
Anthony Wu nag-retweet
Google Gemma
Google Gemma@googlegemma·
Now you can use Gemma directly in the Gemini CLI! 🚀 v0.40.0 introduces experimental support for local Gemma models, starting with intelligent model routing (with full local execution on the roadmap!).
English
46
134
1.3K
83K
Anthony Wu nag-retweet
David Sacks
David Sacks@DavidSacks·
It’s time to demystify Mythos. Mythos is not magic. It’s not a doomsday device. It’s the first of many models that can automate cyber tasks (just like coding). OpenAI’s GPT-5.5-cyber can now do the same. And all the frontier models (including those from China) will be there within approximately 6 months. It’s important to recognize that these models do not create vulnerabilities; they discover them. The bugs are already in the code. Using AI to discover and patch them will actually harden these systems. The leap from pre-AI cyber to post-AI cyber means that there will be a big upgrade cycle. After that, however, the market is likely to reach a new equilibrium between AI-powered cyber-offense and AI-powered cyber-defense. Obviously it’s important that cyber defenders get access before cyber attackers. That process is already underway but needs to happen quickly (see point above about Chinese models). Unlike Mythos, GPT-5.5-cyber appears not to be token constrained so it may be the first cyber model that defenders actually get to use.
AI Security Institute@AISecurityInst

OpenAI’s GPT-5.5 is the second model to complete one of our multi-step cyber-attack simulations end-to-end 🧵

English
271
571
5K
1.1M
Anthony Wu nag-retweet
The Pragmatic Engineer
The Pragmatic Engineer@Pragmatic_Eng·
Token spend is out of control inside many (most?) tech companies. We gathered first-hand data from 15 companies on what is happening, and what they are doing about it. The two strategies are either "let it rip" or "curb spending, NOW" Full: blog.pragmaticengineer.com/the-pulse-toke…
The Pragmatic Engineer tweet media
English
8
16
77
11.9K
Anthony Wu nag-retweet
terminal
terminal@terminaldotshop·
GitHub these days
terminal tweet media
English
25
132
1.8K
55.9K
Anthony Wu nag-retweet
Cloudflare
Cloudflare@Cloudflare·
Starting today, agents can now be Cloudflare customers. They can create a Cloudflare account, start a paid subscription, register a domain, and get back an API token to deploy code right away. cfl.re/4sY0Uxn
English
160
819
5.3K
1.6M