Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. lol oh my god i feel **so fucking smug** right now, it's incredible.

lol oh my god i feel **so fucking smug** right now, it's incredible.

Scheduled Pinned Locked Moved Uncategorized
39 Posts 17 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • peter@thepit.socialP peter@thepit.social

    like, it's moving **way** too fast for anyone to be able to tell if things are going to break or get injected with some malware. the whole thing is a house of cards built on top of a bomb.

    peter@thepit.socialP This user is from outside of this forum
    peter@thepit.socialP This user is from outside of this forum
    peter@thepit.social
    wrote last edited by
    #9

    oh my fucking god.

    Link Preview Image
    peter@thepit.socialP nan@mastodon.greenN 2 Replies Last reply
    0
    • peter@thepit.socialP peter@thepit.social

      oh my fucking god.

      Link Preview Image
      peter@thepit.socialP This user is from outside of this forum
      peter@thepit.socialP This user is from outside of this forum
      peter@thepit.social
      wrote last edited by
      #10

      let's see, who can i tag about this... @davidgerard will definitely want to know. @tante maybe. idk, tag your favorite cyber-security person. this might be the mother of all LLM supply chain attacks lol. @briankrebs

      peter@thepit.socialP davidgerard@circumstances.runD 2 Replies Last reply
      0
      • peter@thepit.socialP peter@thepit.social

        let's see, who can i tag about this... @davidgerard will definitely want to know. @tante maybe. idk, tag your favorite cyber-security person. this might be the mother of all LLM supply chain attacks lol. @briankrebs

        peter@thepit.socialP This user is from outside of this forum
        peter@thepit.socialP This user is from outside of this forum
        peter@thepit.social
        wrote last edited by
        #11

        plenty of good chatter on Hacker News about it. https://news.ycombinator.com/item?id=47501729

        looks grim!!

        peter@thepit.socialP gfitzp@social.glennfitzpatrick.comG wordshaper@weatherishappening.networkW 4 Replies Last reply
        0
        • peter@thepit.socialP peter@thepit.social

          plenty of good chatter on Hacker News about it. https://news.ycombinator.com/item?id=47501729

          looks grim!!

          peter@thepit.socialP This user is from outside of this forum
          peter@thepit.socialP This user is from outside of this forum
          peter@thepit.social
          wrote last edited by
          #12

          me right now

          Link Preview Image
          1 Reply Last reply
          0
          • peter@thepit.socialP peter@thepit.social

            plenty of good chatter on Hacker News about it. https://news.ycombinator.com/item?id=47501729

            looks grim!!

            gfitzp@social.glennfitzpatrick.comG This user is from outside of this forum
            gfitzp@social.glennfitzpatrick.comG This user is from outside of this forum
            gfitzp@social.glennfitzpatrick.com
            wrote last edited by
            #13

            @peter https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/

            peter@thepit.socialP 1 Reply Last reply
            0
            • gfitzp@social.glennfitzpatrick.comG gfitzp@social.glennfitzpatrick.com

              @peter https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/

              peter@thepit.socialP This user is from outside of this forum
              peter@thepit.socialP This user is from outside of this forum
              peter@thepit.social
              wrote last edited by
              #14

              @gfitzp oh yeah, it's those guys!

              peter@thepit.socialP 1 Reply Last reply
              0
              • peter@thepit.socialP peter@thepit.social

                @gfitzp oh yeah, it's those guys!

                peter@thepit.socialP This user is from outside of this forum
                peter@thepit.socialP This user is from outside of this forum
                peter@thepit.social
                wrote last edited by
                #15

                @gfitzp oh nooooo

                Link Preview Image
                gfitzp@social.glennfitzpatrick.comG 1 Reply Last reply
                0
                • peter@thepit.socialP peter@thepit.social

                  plenty of good chatter on Hacker News about it. https://news.ycombinator.com/item?id=47501729

                  looks grim!!

                  peter@thepit.socialP This user is from outside of this forum
                  peter@thepit.socialP This user is from outside of this forum
                  peter@thepit.social
                  wrote last edited by
                  #16

                  based on some commits in the repo, seems like it was these guys: https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/

                  mkristensson@thepit.socialM peter@thepit.socialP 2 Replies Last reply
                  0
                  • peter@thepit.socialP peter@thepit.social

                    @gfitzp oh nooooo

                    Link Preview Image
                    gfitzp@social.glennfitzpatrick.comG This user is from outside of this forum
                    gfitzp@social.glennfitzpatrick.comG This user is from outside of this forum
                    gfitzp@social.glennfitzpatrick.com
                    wrote last edited by
                    #17

                    @peter Yup, I was like "didn't I just read about these guys like an hour ago??"

                    1 Reply Last reply
                    0
                    • peter@thepit.socialP peter@thepit.social

                      based on some commits in the repo, seems like it was these guys: https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/

                      mkristensson@thepit.socialM This user is from outside of this forum
                      mkristensson@thepit.socialM This user is from outside of this forum
                      mkristensson@thepit.social
                      wrote last edited by
                      #18

                      @peter and @dangoodin sometimes hangs out here

                      1 Reply Last reply
                      0
                      • peter@thepit.socialP peter@thepit.social

                        based on some commits in the repo, seems like it was these guys: https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/

                        peter@thepit.socialP This user is from outside of this forum
                        peter@thepit.socialP This user is from outside of this forum
                        peter@thepit.social
                        wrote last edited by
                        #19

                        picking through the various bits and pieces of this story, i kind of think what really happened is the dev accounts got pwned, and then the attackers were able to push a bad version to PyPi and people pip installed it from there. so as far as a "supply chain" attack, LiteLLM is the part of the supply chain that got attacked, it's not like they accidentally vibe-coded something malicious into their project.

                        peter@thepit.socialP 1 Reply Last reply
                        0
                        • peter@thepit.socialP peter@thepit.social

                          RE: https://mstdn.social/@hkrn/116284264915152671

                          lol oh my god i feel **so fucking smug** right now, it's incredible. my whole body is tingling.

                          jongary@macaw.socialJ This user is from outside of this forum
                          jongary@macaw.socialJ This user is from outside of this forum
                          jongary@macaw.social
                          wrote last edited by
                          #20

                          @peter it isn’t even necessary to compromise repos. If a malicious actor posts enough malicious code that gets mingled with the LLM training data, some poor souls will start vibe-coding malicious code directly into their own products.

                          peter@thepit.socialP 1 Reply Last reply
                          0
                          • peter@thepit.socialP peter@thepit.social

                            picking through the various bits and pieces of this story, i kind of think what really happened is the dev accounts got pwned, and then the attackers were able to push a bad version to PyPi and people pip installed it from there. so as far as a "supply chain" attack, LiteLLM is the part of the supply chain that got attacked, it's not like they accidentally vibe-coded something malicious into their project.

                            peter@thepit.socialP This user is from outside of this forum
                            peter@thepit.socialP This user is from outside of this forum
                            peter@thepit.social
                            wrote last edited by
                            #21

                            but this still goes back to what i was saying: this AI ecosystem is developing **way** too fast and without the kind of maturity that is naturally required when you have lots of people working on a thing. so with berri.ai, you had ~2 guys in their 20s building this thing at break-neck speed that became the linchpin to waaaaay too much of the "AI" ecosystem and now look what's happened.

                            1 Reply Last reply
                            0
                            • jongary@macaw.socialJ jongary@macaw.social

                              @peter it isn’t even necessary to compromise repos. If a malicious actor posts enough malicious code that gets mingled with the LLM training data, some poor souls will start vibe-coding malicious code directly into their own products.

                              peter@thepit.socialP This user is from outside of this forum
                              peter@thepit.socialP This user is from outside of this forum
                              peter@thepit.social
                              wrote last edited by
                              #22

                              @jongary 100%!!

                              1 Reply Last reply
                              0
                              • peter@thepit.socialP peter@thepit.social

                                RE: https://mstdn.social/@hkrn/116284264915152671

                                lol oh my god i feel **so fucking smug** right now, it's incredible. my whole body is tingling.

                                tael@yiff.lifeT This user is from outside of this forum
                                tael@yiff.lifeT This user is from outside of this forum
                                tael@yiff.life
                                wrote last edited by
                                #23

                                @peter The crypto wallet checker in this compromise really underlines the fact that there's so much overlap between LLM boosters and crypto boosters. It's all the same marks. They just found something easier to sell to people.

                                peter@thepit.socialP 1 Reply Last reply
                                0
                                • tael@yiff.lifeT tael@yiff.life

                                  @peter The crypto wallet checker in this compromise really underlines the fact that there's so much overlap between LLM boosters and crypto boosters. It's all the same marks. They just found something easier to sell to people.

                                  peter@thepit.socialP This user is from outside of this forum
                                  peter@thepit.socialP This user is from outside of this forum
                                  peter@thepit.social
                                  wrote last edited by
                                  #24

                                  @tael i think also, banks and payment processors have made it so much more difficult to steal and do anything with credit card numbers that there's not much point in going after those anymore, especially when finding someone's crypto passphrase is like picking up money off the ground.

                                  tael@yiff.lifeT 1 Reply Last reply
                                  0
                                  • peter@thepit.socialP peter@thepit.social

                                    RE: https://mstdn.social/@hkrn/116284264915152671

                                    lol oh my god i feel **so fucking smug** right now, it's incredible. my whole body is tingling.

                                    spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                    spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                    spinnyspinlock@infosec.exchange
                                    wrote last edited by
                                    #25

                                    @peter oh my a day ending in -y

                                    1 Reply Last reply
                                    0
                                    • peter@thepit.socialP peter@thepit.social

                                      let's see, who can i tag about this... @davidgerard will definitely want to know. @tante maybe. idk, tag your favorite cyber-security person. this might be the mother of all LLM supply chain attacks lol. @briankrebs

                                      davidgerard@circumstances.runD This user is from outside of this forum
                                      davidgerard@circumstances.runD This user is from outside of this forum
                                      davidgerard@circumstances.run
                                      wrote last edited by
                                      #26

                                      @peter @tante @briankrebs thank you for this comedy gold

                                      davidgerard@circumstances.runD dogiedog64@app.wafrn.netD 2 Replies Last reply
                                      0
                                      • peter@thepit.socialP peter@thepit.social

                                        @tael i think also, banks and payment processors have made it so much more difficult to steal and do anything with credit card numbers that there's not much point in going after those anymore, especially when finding someone's crypto passphrase is like picking up money off the ground.

                                        tael@yiff.lifeT This user is from outside of this forum
                                        tael@yiff.lifeT This user is from outside of this forum
                                        tael@yiff.life
                                        wrote last edited by
                                        #27

                                        @peter It's easy to siphon crypto, yeah, but turning that into spendable money has gotten much, much more difficult than it used to be.

                                        1 Reply Last reply
                                        0
                                        • peter@thepit.socialP peter@thepit.social

                                          oh my fucking god.

                                          Link Preview Image
                                          nan@mastodon.greenN This user is from outside of this forum
                                          nan@mastodon.greenN This user is from outside of this forum
                                          nan@mastodon.green
                                          wrote last edited by
                                          #28

                                          @peter is wrapping a vibe coded mess into a package so it looks reasonable the new sub-prime mortgage?

                                          prietschka@mastodon.socialP 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups