https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/
The lethal trifecta for AI agents: private data, untrusted content, and external communication
If you are a user of LLM systems that use tools (you can call them “AI agents” if you like) it is critically important that you understand the risk of …
lethal trifectaai agentsdata
https://www.adstradata.com/blog/from-untrusted-to-overtrusted-how-marketers-must-rethink-their-data-again/
From Untrusted to Overtrusted: How Marketers Must Rethink Their Fata (Again) - Adstra
marketers mustuntrustedfata
https://deno.com/blog/build-secure-performant-cloud-platform
How we built a secure, performant, multi-tenant cloud platform to run untrusted code | Deno
When building a modern cloud platform to securely run untrusted code, it can be difficult to balance cost and performance. Here’s how we built Deno Deploy...
multi tenantcloud platform
https://deno.com/blog/subhosting
Deno Subhosting: the easiest and most secure way to run untrusted multi-tenant code | Deno
Subhosting is a new way to leverage Deno Deploy's fast, scalable multi-tenant v8 isolate cloud to run your users code securely.
deno subhostingsecure wayrun
https://security.snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-31507
Deserialization of Untrusted Data in com.fasterxml.jackson.core:jackson-databind | CVE-2017-7525 |...
High severity (8.1) Deserialization of Untrusted Data in com.fasterxml.jackson.core:jackson-databind | CVE-2017-7525
fasterxml jacksonuntrusted
https://untrustedgame.com/
Untrusted - a user javascript adventure game
adventure gameuntrusteduser
https://deno.com/blog/monaco-nextjs
How to add Monaco to a Next.js app and securely run untrusted user code | Deno
Enabling your users to deploy and run code can make your platform more useful. Here's a guide to building a platform that deploys and runs untrusted user code...
next js appaddmonaco
https://cwe.mitre.org/data/definitions/502.html
CWE - CWE-502: Deserialization of Untrusted Data (4.19.1)
Common Weakness Enumeration (CWE) is a list of software weaknesses.
cwedeserializationuntrusted
https://onehack.st/t/google-to-warn-of-chrome-extensions-from-new-or-untrusted-developers/187790
Google To Warn of Chrome Extensions From New or Untrusted Developers - News & Articles - OneHack...
Jun 4, 2021 - Google says it will scan the extensions users install in their Chrome browsers and warn users if they are adding an extension from a new or untrusted...
chrome extensionsgooglewarn
https://github.blog/security/web-application-security/encoding-escaping-untrusted-data-prevent-injection-attacks/
Encoding and escaping untrusted data to prevent injection attacks - The GitHub Blog
Feb 25, 2022 - Practical tips on how to apply OWASP Top 10 Proactive Control C4.
prevent injectionencodingdata
https://www.nokia.com/blog/nokia-n3iwf-seamless-5g-integration/
Nokia's N3IWF: connect untrusted non-3GPP access and 5G
nokiaconnectuntrustednon
Sponsored https://www.kupid.ai/
Experience the Future of AI Chat with KupidAI
https://deno.com/blog/subhosting-vs-lambda
Using Deno Subhosting vs. AWS Lambda to Run Untrusted User Code | Deno
Which technology is best for building a deployment platform for running third party code? Let's dive into the key differences in feature set, billing model,...
deno subhostingvs awsusingrun
https://deno.com/blog/subhosting-security-run-untrusted-code
How security and tenant isolation allows Deno Subhosting to run untrusted code securely | Deno
Deno Deploy and Deno Subhosting was designed with security and tenant isolation in mind. Here's how it works.
deno subhostingsecuritytenant
https://syntax.fm/show/699/potluck-typescript-s-longevity-canvas-rendered-apps-learning-rust-executing-untrusted-js-code
Potluck × TypeScript's Longevity × Canvas-Rendered Apps × Learning Rust × Executing Untrusted...
In this potluck episode, Scott and Wes answer listener questions on various web dev topics including TypeScript's future, Flutter for web, WordPress workflows,...
potlucktypescriptlongevity