Size doesn't matter: Just a small number of malicious files can corrupt LLMs of any size
techxplore.comยท4h
๐Ÿ›ก๏ธAI Security
The effective LLM multi-tenant security with SQL
getbruin.comยท23hยท
Discuss: Hacker News
๐ŸŽฏQuery Optimizer
A Retrospective Survey of 2024/2025 Open Source Supply Chain Compromises
words.filippo.ioยท3hยท
๐Ÿ”“Open Source Software
AI Guardrails, Gateways, Governance Nightmares
go.mcptotal.ioยท11hยท
Discuss: Hacker News
๐Ÿ›ก๏ธAI Security
Towards a Typology of Strange LLM Chains-of-Thought
lesswrong.comยท21h
๐Ÿช„Prompt Engineering
ChatGPT and other AI models can be โ€˜poisonedโ€™ to spew gibberish, researchers warn
nordot.appยท2h
๐Ÿ›ก๏ธAI Security
Data quantity doesn't matter when poisoning an LLM
theregister.comยท22hยท
Discuss: Hacker News
๐Ÿ›ก๏ธAI Security
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.comยท5h
๐Ÿ”“Hacking
SLip - An aspiring Common Lisp environment in the browser.
lisperator.netยท6hยท
Discuss: r/programming
๐ŸŒฟLeptos
AI models can acquire backdoors from surprisingly few malicious documents
arstechnica.comยท21h
๐Ÿ›ก๏ธAI Security
SSH Security: Why You Should Touch to Verify
ubicloud.comยท11hยท
Discuss: Hacker News
๐Ÿ”Hardware Security
Suno.com security disclosure: JWT token leakage, IDOR, and DoS vulnerabilities
github.comยท4hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
How to use tls_native TlsSocket if they cannot be split?
docs.rsยท22hยท
Discuss: r/rust
๐Ÿ“˜Typescript
Three ways formally verified code can go wrong in practice
buttondown.comยท1h
๐Ÿ’ปProgramming languages
Looking at my Arduino
boswell.bearblog.devยท2h
๐Ÿ–ฅ๏ธHardware Architecture
Ship Broken Things
matmul.netยท23hยท
Discuss: Hacker News
๐Ÿช„Prompt Engineering
OpenAI's inflated valuation, as I understand it
taloranderson.comยท3hยท
Discuss: Hacker News
๐Ÿ†LLM Benchmarking
NEW: Pegasus spyware coming to America?
threadreaderapp.comยท9h
๐Ÿ”“Hacking