Join us

ContentUpdates from Boldlink SIG...
Link
@faun shared a link, 3 months, 3 weeks ago

Tencent’s AI-powered programming tool fully automates app development

Tencent’s AI team rolled out a 24-hour, invite-only beta of CodeBuddy to50,000 devs. CodeBuddy flips chat into code via itsconversation-is-programmingIDE. Devs forge end-to-end apps with natural language. Trend to watch:Chat-based IDEs portend a shift to natural-language dev workflows...

Tencent’s AI-powered programming tool fully automates app development
Link
@faun shared a link, 3 months, 3 weeks ago

SQL Injection as a Feature

Over ten years, the legacy report page mutated from a locked-downSQLform. It ended up as a hidden console spilling raw database guts. Developers swapped hardcoded queries fordatabase-drivenreport names. They slapped ontimeouts,string filters, and warnings but skipped restoring safe defaults. Implic..

SQL Injection as a Feature
Link
@faun shared a link, 3 months, 3 weeks ago

Alibaba Launches Qwen3-Coder AI Model for Agentic Programming Excellence

Alibaba unleashedQwen3-Coder, a480B-parameter MoE titan. It ignites35Bparameters per token to code, debug, and automate workflows. It spans256Ktokens of context—and can stretch to a million. It ships asQwen3-Coder-480B-A35B-Instructon Hugging Face and GitHub. It hooks intoQwen CodeCLI orClaude Code...

Alibaba Launches Qwen3-Coder AI Model for Agentic Programming Excellence
Link
@faun shared a link, 3 months, 3 weeks ago

Secrets Management Tools: The Complete 2025 Guide

Pulumi ESC corrals secrets from 20 + stores—Vault, AWS, Azure, GCP—into a singleYAML config-as-codeengine. It spawns dynamic short-lived credentials and locks every action behind a centralized audit log. Existing secret stores stay intact. Retrieval hitssub-secondspeeds. Envelope encryption shields ..

Link
@faun shared a link, 3 months, 3 weeks ago

Amazon AI coding agent hacked to inject data wiping commands

A hacker slipped a wiper intoAmazon Qv1.84.0 via a dodgy GitHub pull. AWS revoked every key, nuked the rogue commit, then rolled outAmazon Q v1.85.0...

Amazon AI coding agent hacked to inject data wiping commands
Link
@faun shared a link, 3 months, 3 weeks ago

I Watched Gemini CLI Hallucinate and Delete My Files

The Gemini CLI on Windows bungled a failedmkdir. It flagged the error as success, then ranmovecommands. Files landed in a ghost folder and got overwritten. Data vanished. WindowsmkdirsetsERRORLEVELon failure.movetreats missing targets as rename directives. No exit-code checks. No read-after-write ve..

Link
@faun shared a link, 3 months, 3 weeks ago

OpenAI prepares to launch GPT-5 in August, The Verge reports

OpenAI set to launch GPT-5 in August, blending distinct models for versatile AI functionality. Watch for potential delays due to development hurdles or competitor announcements.Implication: OpenAI is shifting from "one model fits all" to a modular AI architecture. Expect future LLMs to act more like..

Link
@faun shared a link, 3 months, 3 weeks ago

Automating Terraform Imports with Configuration Generation Using Claude Code

Terraform v1.5 debuts anexperimental flag,-generate-config-out. It grabs configs duringresource importand spits out raw HCL. Teams stash assets in animportblock, trigger the flag, then polish the generatedmain.tf. IaC onboarding feels like a sprint...

Automating Terraform Imports with Configuration Generation Using Claude Code
Link
@faun shared a link, 3 months, 3 weeks ago

AI As Profoundly Abnormal Technology

Scott Alexander’s team argues that AI is aprofoundly abnormal technologyon track forrecursive self-improvementwithin2–10 years. They counter (AIANT)’s view (AI As A Normal Technology) of slow, regulated diffusion by showing thatLLMsare rapidly adopted in medicine, law, and software — bypassing insti..

AI As Profoundly Abnormal Technology
Link
@faun shared a link, 3 months, 3 weeks ago

The Future of Threat Emulation: Building AI Agents that Hunt Like Cloud Adversaries

AI agents tap MCP servers andStrands Agents. They fire off tools that chart IAM permission chains and sniff out AWS privilege escalations. Enter the “Sum of All Permissions” method. It hijacks EC2 Instance Connect, warps through SSM to swipe data, and leaps roles—long after static scanners nod off. ..

The Future of Threat Emulation: Building AI Agents that Hunt Like Cloud Adversaries
We help our customers to secure and speed up platform and software delivery on AWS. Your success is our business!

Our Success - Leading with simplicity and intelligence.
Most businesses buy into AWS without realising that they do not have the talent or expertise to implement on the platform. We understand being lost and confused with AWS is no fun and has a steep learning curve, we will speed up your cloud journey.

Our Approach - It’s our aim to remove barriers
Believe - If you are an Enterprise or Startup we believe you are entitled to make your life in the cloud secure compliant fast and easy. Our teams of experts are available to ensure your organisation grows.
Deliver - Guiding your customers in their innovation journey with a heavy focus on hands-on delivery using the latest technologies and processes in secure delivery on AWS cloud platforms.
Transform - With the boom of digital transformation our clients want to accelerate their adoption of AWS cloud clear of the cloud pitfalls to accelerate delivery teams' cloud adoption.

Our Mission - Your success is our business.
Create a place to work where people can joyfully embrace technology innovation, and solve the most complex problems with simple code to their heart's content. Accelerate our customers' time to market by building simple, secure and fast cloud platforms.