Amazon AI coding agent hacked to inject data wiping commands
A hacker slipped a wiper intoAmazon Qv1.84.0 via a dodgy GitHub pull. AWS revoked every key, nuked the rogue commit, then rolled outAmazon Q v1.85.0... read more Â
A hacker slipped a wiper intoAmazon Qv1.84.0 via a dodgy GitHub pull. AWS revoked every key, nuked the rogue commit, then rolled outAmazon Q v1.85.0... read more Â

Alibaba unleashedQwen3-Coder, a480B-parameter MoE titan. It ignites35Bparameters per token to code, debug, and automate workflows. It spans256Ktokens of contextâand can stretch to a million. It ships asQwen3-Coder-480B-A35B-Instructon Hugging Face and GitHub. It hooks intoQwen CodeCLI orClaude Code... read more Â

Over ten years, the legacy report page mutated from a locked-downSQLform. It ended up as a hidden console spilling raw database guts. Developers swapped hardcoded queries fordatabase-drivenreport names. They slapped ontimeouts,string filters, and warnings but skipped restoring safe defaults. Implic.. read more Â

Pulumi ESC corrals secrets from 20 + storesâVault, AWS, Azure, GCPâinto a singleYAML config-as-codeengine. It spawns dynamic short-lived credentials and locks every action behind a centralized audit log. Existing secret stores stay intact. Retrieval hitssub-secondspeeds. Envelope encryption shields .. read more Â
OpenAI set to launch GPT-5 in August, blending distinct models for versatile AI functionality. Watch for potential delays due to development hurdles or competitor announcements.Implication: OpenAI is shifting from "one model fits all" to a modular AI architecture. Expect future LLMs to act more like.. read more Â
Scott Alexanderâs team argues that AI is aprofoundly abnormal technologyon track forrecursive self-improvementwithin2â10 years. They counter (AIANT)âs view (AI As A Normal Technology) of slow, regulated diffusion by showing thatLLMsare rapidly adopted in medicine, law, and software â bypassing insti.. read more Â

Anthropic teamsfire upClaude Code. They automate data pipelines and squash Kubernetes IP exhaustion. They churn out tests and trace cross-repo context. Non-dev squads use plain-text prompts to script workflows, spin up Figma plugin automations, and mock up UIs from screenshotsâzero code. Trend to w.. read more Â

Bugbot hunts bugs in PR diffs, flagging logic slip-ups and strange edge cases. It then detects security gaps, blending top LLMs with custom heuristics. It plugs into the Cursor dashboard and runs dedicated Bugbot rules.Beta stats: 1M+ reviews, 1.5M+ issues found. Half the bugs are fixed before merge.. read more Â
![[Cursor] Bugbot is out of beta](https://cdn.faun.dev/prod/media/public/images/cursor-bugbot-is-out-of-beta-1d97.width-545.format-webp.webp)
LLMs function as next-token predictors. With scant user context, they hallucinateâspinning fresh backstories. As these models morph into autonomous agents, context engineeringâfeeding facts, memory, tools, guardrailsâhalts rogue behavior. Trend to watch:A jump in context engineering. It pins LLMs t.. read more Â

AI agents tap MCP servers andStrands Agents. They fire off tools that chart IAM permission chains and sniff out AWS privilege escalations. Enter the âSum of All Permissionsâ method. It hijacks EC2 Instance Connect, warps through SSM to swipe data, and leaps rolesâlong after static scanners nod off. .. read more Â
