Tag: tokens

  • Simon Willison’s Weblog: The lethal trifecta for AI agents: private data, untrusted content, and external communication

    Source URL: https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/#atom-everything Source: Simon Willison’s Weblog Title: The lethal trifecta for AI agents: private data, untrusted content, and external communication Feedly Summary: If you are a user of LLM systems that use tools (you can call them “AI agents" if you like) it is critically important that you understand the risk of combining tools…

  • Slashdot: Meta’s Llama 3.1 Can Recall 42% of the First Harry Potter Book

    Source URL: https://slashdot.org/story/25/06/15/2230206/metas-llama-31-can-recall-42-of-the-first-harry-potter-book?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Meta’s Llama 3.1 Can Recall 42% of the First Harry Potter Book Feedly Summary: AI Summary and Description: Yes Summary: The text discusses significant findings from a research study that highlights the memorization capabilities of Llama 3.1 70B, an AI model from Meta. It raises concerns about potential legal…

  • Simon Willison’s Weblog: Anthropic: How we built our multi-agent research system

    Source URL: https://simonwillison.net/2025/Jun/14/multi-agent-research-system/#atom-everything Source: Simon Willison’s Weblog Title: Anthropic: How we built our multi-agent research system Feedly Summary: Anthropic: How we built our multi-agent research system OK, I’m sold on multi-agent LLM systems now. I’ve been pretty skeptical of these until recently: why make your life more complicated by running multiple different prompts in parallel…

  • Unit 42: Serverless Tokens in the Cloud: Exploitation and Detections

    Source URL: https://unit42.paloaltonetworks.com/serverless-authentication-cloud/ Source: Unit 42 Title: Serverless Tokens in the Cloud: Exploitation and Detections Feedly Summary: Understand the mechanics of serverless authentication: three simulated attacks across major CSPs offer effective approaches for application developers. The post Serverless Tokens in the Cloud: Exploitation and Detections appeared first on Unit 42. AI Summary and Description: Yes…

  • Simon Willison’s Weblog: Breaking down ‘EchoLeak’, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot

    Source URL: https://simonwillison.net/2025/Jun/11/echoleak/ Source: Simon Willison’s Weblog Title: Breaking down ‘EchoLeak’, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot Feedly Summary: Breaking down ‘EchoLeak’, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot Aim Labs reported CVE-2025-32711 against Microsoft 365 Copilot back in January, and the fix is…

  • Simon Willison’s Weblog: o3-pro

    Source URL: https://simonwillison.net/2025/Jun/10/o3-pro/ Source: Simon Willison’s Weblog Title: o3-pro Feedly Summary: o3-pro OpenAI released o3-pro today, which they describe as a “version of o3 with more compute for better responses". It’s only available via the newer Responses API. I’ve added it to my llm-openai-plugin plugin which uses that new API, so you can try it…

  • Simon Willison’s Weblog: o3 price drop

    Source URL: https://simonwillison.net/2025/Jun/10/o3-price-drop/ Source: Simon Willison’s Weblog Title: o3 price drop Feedly Summary: OpenAI just dropped the price of their o3 model by 80% – from $10/million input tokens and $40/million output tokens to just $2/million and $8/million for the very same model. This is in advance of the release of o3-pro which apparently is…

  • CSA: Prevent Downtime from Expired Secrets

    Source URL: https://aembit.io/blog/how-to-stop-expired-secrets-from-disrupting-your-operations/ Source: CSA Title: Prevent Downtime from Expired Secrets Feedly Summary: AI Summary and Description: Yes Summary: The text delves into the crucial issue of managing non-human identities (NHIs) and their authentication credentials within cloud-native environments, emphasizing the risks and operational burdens of expired credentials. It presents real-world examples of service disruptions due…