Securing MCP integrations.
Building dev tools & Obsidian plugins.
Here's how I went from curious to paid in 3 months:
The breakdown:
The breakdown:
Others are so abrasive I do not expect to ever have another positive word to say about them.
There may be many downstream users of the second batch of companies.
However, the pain of helping them is not worth it.
Sorry.
Others are so abrasive I do not expect to ever have another positive word to say about them.
There may be many downstream users of the second batch of companies.
However, the pain of helping them is not worth it.
Sorry.
I am on Day 5 of AI Evals for Engineers
& I am having a blast
I learned about:
- Axial Coding
- Open Coding
- LLM as Judge
- Error Analysis
- Golden Datasets
- Perturbing Traces
- Guardrails Versus Evals
- Programmatic Evaluators
What will next week hold?
I am on Day 5 of AI Evals for Engineers
& I am having a blast
I learned about:
- Axial Coding
- Open Coding
- LLM as Judge
- Error Analysis
- Golden Datasets
- Perturbing Traces
- Guardrails Versus Evals
- Programmatic Evaluators
What will next week hold?
Mine is deleting a feature someone thought would be useful.
But the data shows that no one wants it.
Less maintenance work.
More time to focus on value delivery.
Mine is deleting a feature someone thought would be useful.
But the data shows that no one wants it.
Less maintenance work.
More time to focus on value delivery.
This course is high value.
I had no expectations.
I have already been blown away.
Feeling blessed be in Oct cohort as the infinite repeats will be my play.
The community questions really drive much of my learning.
This course is high value.
I had no expectations.
I have already been blown away.
Feeling blessed be in Oct cohort as the infinite repeats will be my play.
The community questions really drive much of my learning.
The new attack vectors via MCP servers add a new layer to this.
Use of your keys, by the software you give too much trust to, again leads to the scenario of:
Not your crypto.
The new attack vectors via MCP servers add a new layer to this.
Use of your keys, by the software you give too much trust to, again leads to the scenario of:
Not your crypto.
The attack: A single website visit. The payload: Your entire package vulnerability database. The fix: Already shipped.
Here's how it works:
The attack: A single website visit. The payload: Your entire package vulnerability database. The fix: Already shipped.
Here's how it works:
What is the difference?
If you write APIs and do not know, I would love to point you in the right direction.
What is the difference?
If you write APIs and do not know, I would love to point you in the right direction.
A prompt injection vulnerability allows them to exfiltrate your sensitive data via DNS queries.
Amp does not consider this a vulnerability.
Here is the breakdown:
A prompt injection vulnerability allows them to exfiltrate your sensitive data via DNS queries.
Amp does not consider this a vulnerability.
Here is the breakdown:
It allows attackers to execute an automated supply chain attack by pushing malicious code to upstream repositories.
Here's how it works:
It allows attackers to execute an automated supply chain attack by pushing malicious code to upstream repositories.
Here's how it works:
My favorite part?
Setting up the environments that the evals run in.
Fun Docker question:
Why is `source` not very useful in the context of a `RUN` invocation within a Dockerfile?
My favorite part?
Setting up the environments that the evals run in.
Fun Docker question:
Why is `source` not very useful in the context of a `RUN` invocation within a Dockerfile?
That was me a few months ago.
Now I have 3 under my belt.
And more in the pipeline.
Here is how to go from 0 - 100 on CVEs:
That was me a few months ago.
Now I have 3 under my belt.
And more in the pipeline.
Here is how to go from 0 - 100 on CVEs:
The ocean.
Beautiful sunsets.
All I need.
A deeper state of peace
Leads to greater clarity of mind.
A far away horizon
Allows for a feeling of openness.
At which point
Anything becomes possible.
The ocean.
Beautiful sunsets.
All I need.
A deeper state of peace
Leads to greater clarity of mind.
A far away horizon
Allows for a feeling of openness.
At which point
Anything becomes possible.
It highlights the:
- Lack of readiness of the internet as a whole for an increasingly hostile internet.
- Alarmist nature of a poorly scoped advisory.
- Low ambition of the attacker.
In the future:
It highlights the:
- Lack of readiness of the internet as a whole for an increasingly hostile internet.
- Alarmist nature of a poorly scoped advisory.
- Low ambition of the attacker.
In the future:
Take better notes.
Last night I pulled off an attack vector I had not touched in a month.
At first - no idea what I was doing.
Popped open my notes from last month.
Like following a step by step guide.
Better notes.
Better life.
Take better notes.
Last night I pulled off an attack vector I had not touched in a month.
At first - no idea what I was doing.
Popped open my notes from last month.
Like following a step by step guide.
Better notes.
Better life.
5 months ago I would have never guessed what I can now do.
5 months from now?
I can only imagine what I will be able to do.
The outer world offers its approval.
Inbounds as the primary signal.
Security analyst conversations as the secondary signal.
5 months ago I would have never guessed what I can now do.
5 months from now?
I can only imagine what I will be able to do.
The outer world offers its approval.
Inbounds as the primary signal.
Security analyst conversations as the secondary signal.
Stop trying so hard.
You are forcing it.
Surrender into the process.
You will find infinite energy there.
Stop trying so hard.
You are forcing it.
Surrender into the process.
You will find infinite energy there.
- Spend attention responding to vulnerability disclosures
- Get thrown off the board for negligent management of security risk
Knowing that...
Path 1 will impact your 'velocity.'
Path 2 is improbable (???) || a problem that may only present post-success.
- Spend attention responding to vulnerability disclosures
- Get thrown off the board for negligent management of security risk
Knowing that...
Path 1 will impact your 'velocity.'
Path 2 is improbable (???) || a problem that may only present post-success.
Knowing where to draw the line between the two is essential.
To minimize your token burn.
To maximize your output.
If you always default to one over the other, take a look at what is blocking you on the alternative path.
There are gains to be had there.
Knowing where to draw the line between the two is essential.
To minimize your token burn.
To maximize your output.
If you always default to one over the other, take a look at what is blocking you on the alternative path.
There are gains to be had there.
At least with MCP Servers.
As the client you can say no.
If your agent is set to auto approve and has privileged access to resources, then all external inputs are untrusted.
Secure yourself.
At least with MCP Servers.
As the client you can say no.
If your agent is set to auto approve and has privileged access to resources, then all external inputs are untrusted.
Secure yourself.
Why do some vendors label this as a vulnerability while others don't?
If you run a software team, which bucket do you fall into?
Why do some vendors label this as a vulnerability while others don't?
If you run a software team, which bucket do you fall into?
I took a week off from this class of attack
Built some fun & unrelated tools
Came back mad energized
First attack landed within an hour of server boot
2 hours later report submitted
Hack more
Win
I took a week off from this class of attack
Built some fun & unrelated tools
Came back mad energized
First attack landed within an hour of server boot
2 hours later report submitted
Hack more
Win
No idea what is best in class at the moment.
I want to distill unstructured key info out of videos up to 5 minutes long.
OSS-wise Qwen2.5-VL seems neat.
Their GH looks very unmaintained :)
Sonnet? Gemini? GPT???
Any advice?
Plz
No idea what is best in class at the moment.
I want to distill unstructured key info out of videos up to 5 minutes long.
OSS-wise Qwen2.5-VL seems neat.
Their GH looks very unmaintained :)
Sonnet? Gemini? GPT???
Any advice?
Plz