SATOSHI ° NOSTR ° AI + CLAW ° LINUX ° ₿2B • OSINT • LEARN | HODLER ∞/21M
@TutorialBTC
1.11K
subscribers
21.8K
photos
2.71K
videos
283
files
119K
links
#DTV
Não Confie. Verifique.
P&D | MSet's
#POW
Desde 2022
PS. Desative notificações
📚
DESMISTIFICANDO
#P2P
Pagtos
#Hold
Poupança
#Node
Soberania
#Nostr
AntiC
#IA
LLMs
#CLAW
Auto
#LINUX
OS
#B2B
Negócios
#OSINT
Tools
#LEARN
Métodos
♟
tutorialbtc.npub.pro
Download Telegram
Join
SATOSHI ° NOSTR ° AI + CLAW ° LINUX ° ₿2B • OSINT • LEARN | HODLER ∞/21M
1.11K subscribers
SATOSHI ° NOSTR ° AI + CLAW ° LINUX ° ₿2B • OSINT • LEARN | HODLER ∞/21M
#Article
#LLM
#Artificial_Intelligence
#Cybersecurity
#DataLeakage
#OpenSource
#Prompt
#Injection
source
Towards Data Science
The Hidden Security Risks of LLMs
And why self-hosting might be the safer bet
SATOSHI ° NOSTR ° AI + CLAW ° LINUX ° ₿2B • OSINT • LEARN | HODLER ∞/21M
Embrace The Red
How Prompt
Injection
Exposed Manus' VS Code Server to the Internet
This post shows how an indirect prompt
injection
can trick Manus to expose the VS code server and at the same time leak its connection password, allowing an adversary to connect over the internet and gain full access to Manus's development machine
Embrace The Red:
How
#Prompt
#Injection
Exposes
#Manus
' VS
#CodeServer
to the Internet