ContentPosts from @kellywilsondfh..
Link
@faun shared a link, 4 months ago
FAUN.dev()

Seeing like an LLM

LLMs function as next-token predictors. With scant user context, they hallucinate—spinning fresh backstories. As these models morph into autonomous agents, context engineering—feeding facts, memory, tools, guardrails—halts rogue behavior. Trend to watch:A jump in context engineering. It pins LLMs t.. read more  

Seeing like an LLM
Link
@faun shared a link, 4 months ago
FAUN.dev()

The Future of Threat Emulation: Building AI Agents that Hunt Like Cloud Adversaries

AI agents tap MCP servers andStrands Agents. They fire off tools that chart IAM permission chains and sniff out AWS privilege escalations. Enter the “Sum of All Permissions” method. It hijacks EC2 Instance Connect, warps through SSM to swipe data, and leaps roles—long after static scanners nod off. .. read more  

The Future of Threat Emulation: Building AI Agents that Hunt Like Cloud Adversaries
Link
@faun shared a link, 4 months ago
FAUN.dev()

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System

April 2025 Copilot Enterprise update slipped in aJupyter sandbox. It snuck in aPATH-poisonable pgrepat root’s entrypoint. Attackers could hijack that forroot execution.Eye Securityflagged the hole in April. By July 25, 2025, Microsoft patched this moderate bug. No data exfiltration reported. Why it.. read more  

Microsoft Copilot Rooted to Gain Unauthorized Root Access to its Backend System
Link
@faun shared a link, 4 months ago
FAUN.dev()

From Raw Data to Model Serving: A Blueprint for the AI/ML Lifecycle with

Post maps out aKubeflow Pipelinesworkflow onSpark,Feast, andKServe. It tackles fraud detection end-to-end: data prep, feature store, live inference. It turns infra into code, ensures feature parity in train and serve, and registers ONNX models in theKubeflow Model Registry... read more  

From Raw Data to Model Serving: A Blueprint for the AI/ML Lifecycle with
Link
@faun shared a link, 4 months ago
FAUN.dev()

Intel CEO Letter to Employees

Intel scraps itsGermanyandPoland foundries, shifting assembly fromCosta RicatoVietnamandMalaysia. It slows Ohio fab construction while ramping upIntel 18A/18A‑Pand planningIntel 14Aaround key customers. SMT returns. Focus shifts to Panther Lake, Nova Lake, and Granite Rapids.AI strategy pivots towar.. read more  

Intel CEO Letter to Employees
Link
@faun shared a link, 4 months ago
FAUN.dev()

AI Coding Tools Underperform in Field Study with Experienced Developers

METRran an randomized controlled trial  (RCT) with 16 open-source devs. They tackled real-world code tasks usingClaude 3.5andCursor Pro. The pitch:40%speed boost. Reality:19%slowdown. A deep dive into 246 screen recordings laid bare friction in prompting, vetting suggestions, and merging code. That .. read more  

AI Coding Tools Underperform in Field Study with Experienced Developers
Link
@faun shared a link, 4 months ago
FAUN.dev()

The Cybersecurity Blind Spot in DevOps Pipelines

DevOps pipelines serve as superhighways for cybercriminals to target with credential leaks, supply chain infiltration, misconfigurations, and dependency vulnerabilities. Security must evolve with development to combat these sophisticated attacks... read more  

Link
@faun shared a link, 4 months ago
FAUN.dev()

Self-hosting Trigger.dev v4 using Docker

Trigger.dev v4 sharpens self-hosting. It pins everything toDocker Compose. It bakesregistryandobject storagein. It chops YAML bloat. Env-var docs unify configs. Resource caps lock down security. Scaling? Spin up more worker containers... read more  

Self-hosting Trigger.dev v4 using Docker
Link
@faun shared a link, 4 months ago
FAUN.dev()

How GitHub engineers tackle platform problems

Product engineersare like builders ofGundam models, construcing the final product, whileplatform engineerssupply the tools needed to build these kits. Understanding theGundam analogyhelps differentiate engineering roles at GitHub... read more  

Link
@faun shared a link, 4 months ago
FAUN.dev()

What Is IDOR? Finding and Preventing Insecure Direct Object References in AWS APIs

Attackers swap predictable IDs. They slip intoAWS APIs,Lambda functions, internal tools. Fuzzers likeffufflag sneaky HTTP 200s.Burp Intruderbubbles up 404 probes.CloudWatchlogs trace every call. Random UUIDs seal ID gaps... read more  

What Is IDOR? Finding and Preventing Insecure Direct Object References in AWS APIs