Robuta

https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/ The lethal trifecta for AI agents: private data, untrusted content, and external communication If you are a user of LLM systems that use tools (you can call them “AI agents” if you like) it is critically important that you understand the risk of … lethal trifectaai agentsdata https://www.adstradata.com/blog/from-untrusted-to-overtrusted-how-marketers-must-rethink-their-data-again/ From Untrusted to Overtrusted: How Marketers Must Rethink Their Fata (Again) - Adstra marketers mustuntrustedfata https://deno.com/blog/build-secure-performant-cloud-platform How we built a secure, performant, multi-tenant cloud platform to run untrusted code | Deno When building a modern cloud platform to securely run untrusted code, it can be difficult to balance cost and performance. Here’s how we built Deno Deploy... multi tenantcloud platform https://deno.com/blog/subhosting Deno Subhosting: the easiest and most secure way to run untrusted multi-tenant code | Deno Subhosting is a new way to leverage Deno Deploy's fast, scalable multi-tenant v8 isolate cloud to run your users code securely. deno subhostingsecure wayrun https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507 Deserialization of Untrusted Data in com.fasterxml.jackson.core:jackson-databind | CVE-2017-7525 |... High severity (8.1) Deserialization of Untrusted Data in com.fasterxml.jackson.core:jackson-databind | CVE-2017-7525 fasterxml jacksonuntrusted https://untrustedgame.com/ Untrusted - a user javascript adventure game adventure gameuntrusteduser https://deno.com/blog/monaco-nextjs How to add Monaco to a Next.js app and securely run untrusted user code | Deno Enabling your users to deploy and run code can make your platform more useful. Here's a guide to building a platform that deploys and runs untrusted user code... next js appaddmonaco https://cwe.mitre.org/data/definitions/502.html CWE - CWE-502: Deserialization of Untrusted Data (4.19.1) Common Weakness Enumeration (CWE) is a list of software weaknesses. cwedeserializationuntrusted https://onehack.st/t/google-to-warn-of-chrome-extensions-from-new-or-untrusted-developers/187790 Google To Warn of Chrome Extensions From New or Untrusted Developers - News & Articles - OneHack... Jun 4, 2021 - Google says it will scan the extensions users install in their Chrome browsers and warn users if they are adding an extension from a new or untrusted... chrome extensionsgooglewarn https://github.blog/security/web-application-security/encoding-escaping-untrusted-data-prevent-injection-attacks/ Encoding and escaping untrusted data to prevent injection attacks - The GitHub Blog Feb 25, 2022 - Practical tips on how to apply OWASP Top 10 Proactive Control C4. prevent injectionencodingdata https://www.nokia.com/blog/nokia-n3iwf-seamless-5g-integration/ Nokia's N3IWF: connect untrusted non-3GPP access and 5G nokiaconnectuntrustednon Sponsored https://www.kupid.ai/ Experience the Future of AI Chat with KupidAI https://deno.com/blog/subhosting-vs-lambda Using Deno Subhosting vs. AWS Lambda to Run Untrusted User Code | Deno Which technology is best for building a deployment platform for running third party code? Let's dive into the key differences in feature set, billing model,... deno subhostingvs awsusingrun https://deno.com/blog/subhosting-security-run-untrusted-code How security and tenant isolation allows Deno Subhosting to run untrusted code securely | Deno Deno Deploy and Deno Subhosting was designed with security and tenant isolation in mind. Here's how it works. deno subhostingsecuritytenant https://syntax.fm/show/699/potluck-typescript-s-longevity-canvas-rendered-apps-learning-rust-executing-untrusted-js-code Potluck × TypeScript's Longevity × Canvas-Rendered Apps × Learning Rust × Executing Untrusted... In this potluck episode, Scott and Wes answer listener questions on various web dev topics including TypeScript's future, Flutter for web, WordPress workflows,... potlucktypescriptlongevity