Surprising nobody not hooked up to a firehose IV of VC money. "The malware did more than just steal SSH keys, npm tokens, and .gitconfig files - it weaponized AI CLI tools (including Claude, Gemini, and q) to aid in reconnaissance and data exfiltration. This marks the first known case where attackers have turned developer AI assistants into tools for supply chain exploitation." https://lnkd.in/gYws7CHV
Angel Vazquez Carlos Degante Joshua Smith ^ Thanks for sharing Mike Watson !
lol at being able to repost more than once. 😅 Sorry about the notification bombing Matt.
This was actually such a great read though man. Going to check my repo for that s1ngularity-repository (initial glance: not there, thank god lol). Also, will make sure to share internally at Fiserv. Thanks again man!!!
Chief Architect
3w"In a concerning new development, the malware attempts to abuse locally installed AI assistant CLIs (claude, gemini, q) to bypass traditional security boundaries. To our knowledge, this is one of the first documented cases of malware coercing AI‑assistant CLIs (claude/gemini/q) to assist in reconnaissance. The script prompts these tools with dangerous flags: --dangerously-skip-permissions --yolo --trust-all-tools" Incredible.