Mr. Nobody 🌐 (@n0tsa) 's Twitter Profile
Mr. Nobody 🌐

@n0tsa

Doing stooopid thing with AI

ID: 124524936

calendar_today19-03-2010 17:45:28

2,2K Tweet

8,8K Takipçi

200 Takip Edilen

Stefan Esser (@i0n1c) 's Twitter Profile Photo

There is a party at #GLx and you have been invited. Don’t miss the next session of our new training course giving you a deep dive into #SPTM, #TXM, #SK and #Exclaves antid0te.sg/training/sptm-…

KF (@d0tslash) 's Twitter Profile Photo

Hey AgileX Robotics, can you tell your mammotiontech "𝐖𝐨𝐫𝐥𝐝’𝐬 𝐍𝐨.𝟏 𝐖𝐢𝐫𝐞-𝐅𝐫𝐞𝐞 𝐑𝐨𝐛𝐨𝐭𝐢𝐜 𝐋𝐚𝐰𝐧 𝐌𝐨𝐰𝐞𝐫!" team to respond to Sammy Azdoufal Andreas & I attempting to report security issues in your cloud platform that features FPV. youtube.com/watch?v=Octk-n…

Mr. Nobody 🌐 (@n0tsa) 's Twitter Profile Photo

pasfunfact: pendant les matchs de laliga la majorité des services passant par cloudflare ne fonctionnent pas en espagne. Je ne peux littéralement pas docker pull sans vpn

KF (@d0tslash) 's Twitter Profile Photo

For anyone following along... Andreas Sammy Azdoufal & I have made *positive* contact with mammotiontech, and are working on "responsibly" disclosing the vulnerability information to them.

For anyone following along... <a href="/Bin4ryDigit/">Andreas</a> <a href="/n0tsa/">Sammy Azdoufal</a> &amp; I have made *positive* contact with <a href="/mammotiontech/">mammotiontech</a>, and are working on "responsibly" disclosing the vulnerability information to them.
LiteLLM (YC W23) (@litellm) 's Twitter Profile Photo

[INCIDENT UPDATES] - Compromised LiteLLM packages have been deleted. - Proxy docker image users were not impacted - All dependencies are pinned on requirements.txt. - Compromise came from Trivvy security scan dependency, looking into it with Google’s Mandiant Security

Mr. Nobody 🌐 (@n0tsa) 's Twitter Profile Photo

Ok so the guy who compromised LiteLLM, and who technically could compromised 97M devices, vibecoded his payload so LiteLLM kept crashing... meaning the payload never actually launched. Man i love 2026