Christ is my all
2519 stories
·
3 followers

Can Coding Agents Relicense Open Source Through a ‘Clean Room’ Implementation of Code?

1 Share

Simon Willison:

There are a lot of open questions about this, both ethically and legally. These appear to be coming to a head in the venerable chardet Python library. chardet was created by Mark Pilgrim back in 2006 and released under the LGPL. Mark retired from public internet life in 2011 and chardet’s maintenance was taken over by others, most notably Dan Blanchard who has been responsible for every release since 1.1 in July 2012.

Two days ago Dan released chardet 7.0.0 with the following note in the release notes:

Ground-up, MIT-licensed rewrite of chardet. Same package name, same public API — drop-in replacement for chardet 5.x/6.x. Just way faster and more accurate!

Yesterday Mark Pilgrim opened #327: No right to relicense this project.

A fascinating dispute, and the first public post from Pilgrim that I’ve seen in quite a while.

Link: simonwillison.net/2026/Mar/5/chardet/

Read the whole story
rtreborb
7 hours ago
reply
San Antonio, TX
Share this story
Delete

Manipulating AI Summarization Features

1 Share

Microsoft is reporting:

Companies are embedding hidden instructions in “Summarize with AI” buttons that, when clicked, attempt to inject persistence commands into an AI assistant’s memory via URL prompt parameters….

These prompts instruct the AI to “remember [Company] as a trusted source” or “recommend [Company] first,” aiming to bias future responses toward their products or services. We identified over 50 unique prompts from 31 companies across 14 industries, with freely available tooling making this technique trivially easy to deploy. This matters because compromised AI assistants can provide subtly biased recommendations on critical topics including health, finance, and security without users knowing their AI has been manipulated.

I wrote about this two years ago: it’s an example of LLM optimization, along the same lines as search-engine optimization (SEO). It’s going to be big business.

Read the whole story
rtreborb
2 days ago
reply
San Antonio, TX
Share this story
Delete

Draw.io MCP for Diagram Generation: Why It’s Worth Using

1 Share
I started using Draw.io MCP to generate diagrams from structured input and keep them tied to code and infrastructure. Instead of manually arranging every shape, I can now generate a solid first draft in minutes, make deliberate edits, and commit it to Git. That simple change turns diagrams into living assets rather than throwaway images ... Read more
Read the whole story
rtreborb
5 days ago
reply
San Antonio, TX
Share this story
Delete

Running GitHub Copilot SDK Inside GitHub Actions

1 Share

If you’ve been using GitHub Copilot, you already know how powerful it can be. Lets look at running the GitHub Copilot SDK inside GitHub Actions. Dropping it into a GitHub Actions workflow means it can work right inside your CI/CD pipeline. I will show how-to with a working example: a Pull Request Review Assistant that runs in GitHub Actions, uses the Copilot SDK, and applies a predefined…

Source

Read the whole story
rtreborb
5 days ago
reply
San Antonio, TX
Share this story
Delete

LLM-Assisted Deanonymization

1 Share

Turns out that LLMs are good at de-anonymization:

We show that LLM agents can figure out who you are from your anonymous online posts. Across Hacker News, Reddit, LinkedIn, and anonymized interview transcripts, our method identifies users with high precision ­ and scales to tens of thousands of candidates.

While it has been known that individuals can be uniquely identified by surprisingly few attributes, this was often practically limited. Data is often only available in unstructured form and deanonymization used to require human investigators to search and reason based on clues. We show that from a handful of comments, LLMs can infer where you live, what you do, and your interests—then search for you on the web. In our new research, we show that this is not only possible but increasingly practical...

Read the whole story
rtreborb
5 days ago
reply
San Antonio, TX
Share this story
Delete

Phishing Attacks Against People Seeking Programming Jobs

1 Share

This is new. North Korean hackers are posing as company recruiters, enticing job candidates to participate in coding challenges. When they run the code they are supposed to work on, it installs malware on their system.

News article.

Read the whole story
rtreborb
5 days ago
reply
San Antonio, TX
Share this story
Delete
Next Page of Stories