ContentPosts from @mangeshsutarjmr..
Link
@faun shared a link, 1 month ago

Amazon AI coding agent hacked to inject data wiping commands

A hacker slipped a wiper intoAmazon Qv1.84.0 via a dodgy GitHub pull. AWS revoked every key, nuked the rogue commit, then rolled outAmazon Q v1.85.0...

Amazon AI coding agent hacked to inject data wiping commands
Link
@faun shared a link, 1 month ago

Automating Terraform Imports with Configuration Generation Using Claude Code

Terraform v1.5 debuts anexperimental flag,-generate-config-out. It grabs configs duringresource importand spits out raw HCL. Teams stash assets in animportblock, trigger the flag, then polish the generatedmain.tf. IaC onboarding feels like a sprint...

Automating Terraform Imports with Configuration Generation Using Claude Code
Link
@faun shared a link, 1 month ago

OpenAI prepares to launch GPT-5 in August, The Verge reports

OpenAI set to launch GPT-5 in August, blending distinct models for versatile AI functionality. Watch for potential delays due to development hurdles or competitor announcements.Implication: OpenAI is shifting from "one model fits all" to a modular AI architecture. Expect future LLMs to act more like..

Link
@faun shared a link, 1 month ago

I Watched Gemini CLI Hallucinate and Delete My Files

The Gemini CLI on Windows bungled a failedmkdir. It flagged the error as success, then ranmovecommands. Files landed in a ghost folder and got overwritten. Data vanished. WindowsmkdirsetsERRORLEVELon failure.movetreats missing targets as rename directives. No exit-code checks. No read-after-write ve..

Link
@faun shared a link, 1 month ago

AI As Profoundly Abnormal Technology

Scott Alexander’s team argues that AI is aprofoundly abnormal technologyon track forrecursive self-improvementwithin2–10 years. They counter (AIANT)’s view (AI As A Normal Technology) of slow, regulated diffusion by showing thatLLMsare rapidly adopted in medicine, law, and software — bypassing insti..

AI As Profoundly Abnormal Technology
Link
@faun shared a link, 1 month ago

Seeing like an LLM

LLMs function as next-token predictors. With scant user context, they hallucinate—spinning fresh backstories. As these models morph into autonomous agents, context engineering—feeding facts, memory, tools, guardrails—halts rogue behavior. Trend to watch:A jump in context engineering. It pins LLMs t..

Seeing like an LLM
Link
@faun shared a link, 1 month ago

Intel CEO Letter to Employees

Intel scraps itsGermanyandPoland foundries, shifting assembly fromCosta RicatoVietnamandMalaysia. It slows Ohio fab construction while ramping upIntel 18A/18A‑Pand planningIntel 14Aaround key customers. SMT returns. Focus shifts to Panther Lake, Nova Lake, and Granite Rapids.AI strategy pivots towar..

Intel CEO Letter to Employees
Link
@faun shared a link, 1 month ago

From Raw Data to Model Serving: A Blueprint for the AI/ML Lifecycle with

Post maps out aKubeflow Pipelinesworkflow onSpark,Feast, andKServe. It tackles fraud detection end-to-end: data prep, feature store, live inference. It turns infra into code, ensures feature parity in train and serve, and registers ONNX models in theKubeflow Model Registry...

From Raw Data to Model Serving: A Blueprint for the AI/ML Lifecycle with
Link
@faun shared a link, 1 month ago

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System

April 2025 Copilot Enterprise update slipped in aJupyter sandbox. It snuck in aPATH-poisonable pgrepat root’s entrypoint. Attackers could hijack that forroot execution.Eye Securityflagged the hole in April. By July 25, 2025, Microsoft patched this moderate bug. No data exfiltration reported. Why it..

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System
Link
@faun shared a link, 1 month ago

The Future of Threat Emulation: Building AI Agents that Hunt Like Cloud Adversaries

AI agents tap MCP servers andStrands Agents. They fire off tools that chart IAM permission chains and sniff out AWS privilege escalations. Enter the “Sum of All Permissions” method. It hijacks EC2 Instance Connect, warps through SSM to swipe data, and leaps roles—long after static scanners nod off. ..

The Future of Threat Emulation: Building AI Agents that Hunt Like Cloud Adversaries