Tag: event

  • Simon Willison’s Weblog: Become a command-line superhero with Simon Willison’s llm tool

    Source URL: https://simonwillison.net/2025/Jul/7/become-a-command-line-superhero-with-simon-willisons-llm-tool/#atom-everything Source: Simon Willison’s Weblog Title: Become a command-line superhero with Simon Willison’s llm tool Feedly Summary: Become a command-line superhero with Simon Willison’s llm tool Christopher Smith ran a mini hackathon in Albany New York at the weekend around uses of my LLM – the first in-person event I’m aware of dedicated…

  • Simon Willison’s Weblog: I Shipped a macOS App Built Entirely by Claude Code

    Source URL: https://simonwillison.net/2025/Jul/6/macos-app-built-entirely-by-claude-code/#atom-everything Source: Simon Willison’s Weblog Title: I Shipped a macOS App Built Entirely by Claude Code Feedly Summary: I Shipped a macOS App Built Entirely by Claude Code Indragie Karunaratne has “been building software for the Mac since 2008", but recently decided to try Claude Code to build a side project: Context, a…

  • Simon Willison’s Weblog: Supabase MCP can leak your entire SQL database

    Source URL: https://simonwillison.net/2025/Jul/6/supabase-mcp-lethal-trifecta/#atom-everything Source: Simon Willison’s Weblog Title: Supabase MCP can leak your entire SQL database Feedly Summary: Supabase MCP can leak your entire SQL database Here’s yet another example of a lethal trifecta attack, where an LLM system combines access to private data, exposure to potentially malicious instructions and a mechanism to communicate data…

  • Slashdot: Two Sudo Vulnerabilities Discovered and Patched

    Source URL: https://linux.slashdot.org/story/25/07/05/0323220/two-sudo-vulnerabilities-discovered-and-patched?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Two Sudo Vulnerabilities Discovered and Patched Feedly Summary: AI Summary and Description: Yes Summary: The text discusses recently disclosed security vulnerabilities in Sudo that allow local attackers to escalate their privileges. Researchers have identified two critical flaws, CVE-2025-32462 and CVE-2025-32463, which could potentially expose systems to security risks and…

  • Slashdot: US Plans AI Chip Curbs on Malaysia, Thailand Over China Concerns

    Source URL: https://slashdot.org/story/25/07/04/1644224/us-plans-ai-chip-curbs-on-malaysia-thailand-over-china-concerns?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: US Plans AI Chip Curbs on Malaysia, Thailand Over China Concerns Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the Trump administration’s plans to restrict shipments of AI chips from companies like Nvidia to Malaysia and Thailand, aiming to prevent semiconductor smuggling into China. This move…

  • Simon Willison’s Weblog: Identify, solve, verify

    Source URL: https://simonwillison.net/2025/Jul/4/identify-solve-verify/#atom-everything Source: Simon Willison’s Weblog Title: Identify, solve, verify Feedly Summary: The more time I spend using LLMs for code, the less I worry for my career – even as their coding capabilities continue to improve. Using LLMs as part of my process helps me understand how much of my job isn’t just…

  • Simon Willison’s Weblog: awwaiid/gremllm

    Source URL: https://simonwillison.net/2025/Jul/4/gremllm/#atom-everything Source: Simon Willison’s Weblog Title: awwaiid/gremllm Feedly Summary: awwaiid/gremllm Delightfully cursed Python library by Brock Wilcox, built on top of LLM: from gremllm import Gremllm counter = Gremllm(“counter") counter.value = 5 counter.increment() print(counter.value) # 6? print(counter.to_roman_numerals()) # VI? You tell your Gremllm what it should be in the constructor, then it uses…