zerk-dot (@xerkdot) 's Twitter Profile
zerk-dot

@xerkdot

Accelerating WebXR with MLOps

ID: 1573385194463285251

linkhttps://github.com/xerk-dot calendar_today23-09-2022 18:54:46

2,2K Tweet

569 Followers

812 Following

Megan Gray (@megangra) 's Twitter Profile Photo

Anthropic hearing tomorrow gonna be lit, check out this list of questions from the judge storage.courtlistener.com/recap/gov.usco…

Jack (@jackunheard) 's Twitter Profile Photo

🚨BREAKING: Kentucky family rejects a $26 million offer to turn their farmland into a data center, roughly 10x the area’s going rate. “If it’s my way, I’ll stay and hold and feed a nation. 26 million doesn’t mean anything.”

SinSinology (@sinsinology) 's Twitter Profile Photo

to all pwn2own gooners out there, headsup! in the last 4 hours litellm pypi package has been backdored and a bit of decoding shows, it steals almost every fucking key you got (that's the least it does) *An attempt in this category might be launched from the local apt's laptop*

to all pwn2own gooners out there, headsup! in the last 4 hours litellm pypi package has been backdored and a bit of decoding shows, it steals almost every fucking key you got (that's the least it does) 
*An attempt in this category might be launched from the local apt's laptop*
Andrej Karpathy (@karpathy) 's Twitter Profile Photo

Software horror: litellm PyPI supply chain attack. Simple `pip install litellm` was enough to exfiltrate SSH keys, AWS/GCP/Azure creds, Kubernetes configs, git credentials, env vars (all your API keys), shell history, crypto wallets, SSL private keys, CI/CD secrets, database

zerk-dot (@xerkdot) 's Twitter Profile Photo

Daniel Hnyk Umm.. I literally just had an interview with LiteLLM for a backend role. had three interviewers who went in and out without any proper handoff. one of the interviewers didn’t know what a ‘stored procedure’ was glad I know my answer now

zerk-dot (@xerkdot) 's Twitter Profile Photo

Is LiteLLM the largest Python supply chain attack in history? I think so 1. Raw numbers: 97M monthly > PyTorch (~15 million, nightly only)

zerk-dot (@xerkdot) 's Twitter Profile Photo

banteg Strong disagree.. If an attacker can write a .pth file to your site-packages, they already have arbitrary write access to your Python environment. At that point you’ve lost… they could equally overwrite os.py, inject into sitecustomize.py, replace a

zerk-dot (@xerkdot) 's Twitter Profile Photo

banteg scoping is not validation containment is not prevention venv scoping isn’t to stop .pth execution within the environment, it’s to ensure that a compromised environment doesn’t contaminate other environments or the system interpreter. “insufficient validation inside the blast