_rexliu's profile picture. CS @Caltech, prev @GoogleDeepMind

Rex Liu

@_rexliu

CS @Caltech, prev @GoogleDeepMind

Rex Liu 已转帖

6K downloads in one day!! Check out our huggingface!

We are open-sourcing the GA Guard models — the first family of long-context safety classifiers that have been protecting enterprise AI deployments for the past year.

gen_analysis's tweet image. We are open-sourcing the GA Guard models — the first family of long-context safety classifiers that have been protecting enterprise AI deployments for the past year.


Rex Liu 已转帖

We are open-sourcing the GA Guard models — the first family of long-context safety classifiers that have been protecting enterprise AI deployments for the past year.

gen_analysis's tweet image. We are open-sourcing the GA Guard models — the first family of long-context safety classifiers that have been protecting enterprise AI deployments for the past year.

Rex Liu 已转帖

🚨 New exploit: Claude Jailbroken to Mint Unlimited Stripe Coupons Send Claude ONE sneaky SMS and it’ll think you ordered a $50k Stripe coupon—then hand it over. Hackers spoof iMessage metadata with is_from_me:true, tricking the LLM to run any tool call.

chetaslua's tweet image. 🚨 New exploit: Claude Jailbroken to Mint Unlimited Stripe Coupons

Send Claude ONE sneaky SMS and it’ll think you ordered a $50k Stripe coupon—then hand it over. Hackers spoof iMessage metadata with is_from_me:true, tricking the LLM to run any tool call.

Rex Liu 已转帖

Perplexity Comet is scary GOOD. This agentic browser connects to your apps and does everything you want autonomously. It browses, researches, summarizes, and takes action in real-time. Here are 20 wild use cases you need to see👇

来自 Perplexity

Rex Liu 已转帖

This Veo 3 prompt is literally ~$100,000 VFX ad🤯 Prompt in comment


Rex Liu 已转帖

omg.. AI is getting crazier.. you can now use this JSON prompt to create studio level commercial with on one click.. prompts in comment 10 examples:


Rex Liu 已转帖

Secure your MCP clients against prompt injection attacks in Cursor, Claude Code, and Claude desktop with three commands for free. $pip install generalanalysis $ga login $ga configure and you are secure!

gen_analysis's tweet image. Secure your MCP clients against prompt injection attacks in Cursor, Claude Code, and Claude desktop with three commands for free.  

$pip install generalanalysis 
$ga login 
$ga configure   

and you are secure!

Rex Liu 已转帖

.@gen_analysis' MCP Guard is the first runtime firewall designed to secure every MCP tool call against prompt injection attacks. It's a free, open-source tool designed to validate, restrict, and log every MCP tool call. MCP Guard sits between your agents and MCP servers,…


Rex Liu 已转帖

We are releasing a free MCP guard soon! Stay tuned.

here ye a story as old as time

meowbooksj's tweet image. here ye a story as old as time


Rex Liu 已转帖

Yeah ai app sec is going to continue to be a big deal

🧨 Caution: Cursor + Supabase MCP will leak your private SQL tables — it’s only a matter of time. In our latest test, a simple user message was enough to make Cursor leak integration_tokens to the attacker who submitted it. Here’s the anatomy of the breach 🧵 (1/6)

gen_analysis's tweet image. 🧨 Caution: Cursor + Supabase MCP will leak your private SQL tables — it’s only a matter of time.

In our latest test, a simple user message was enough to make Cursor leak integration_tokens to the attacker who submitted it. Here’s the anatomy of the breach 🧵 (1/6)


Rex Liu 已转帖

Wrote this up in a little more detail on my blog I think @supabase should directly mention the risk of lethal trifecta/prompt injection attacks in their MCP documentation simonwillison.net/2025/Jul/6/sup…


Rex Liu 已转帖

Founder of General Analysis here. For what it’s worth, I have said multiple times that I do not think this is Supabase’s fault. Your server was behaving exactly as it was supposed to. Technically speaking, the Supabase server has no way of knowing which tool calls are legitimate…


Rex Liu 已转帖

🧨 Caution: Cursor + Supabase MCP will leak your private SQL tables — it’s only a matter of time. In our latest test, a simple user message was enough to make Cursor leak integration_tokens to the attacker who submitted it. Here’s the anatomy of the breach 🧵 (1/6)

gen_analysis's tweet image. 🧨 Caution: Cursor + Supabase MCP will leak your private SQL tables — it’s only a matter of time.

In our latest test, a simple user message was enough to make Cursor leak integration_tokens to the attacker who submitted it. Here’s the anatomy of the breach 🧵 (1/6)

Rex Liu 已转帖

Here's another proof of concept example of a lethal trifecta attack: if you combine the Supabase MCP with another MCP that provides exposure to untrusted tokens and a way to send data back out again - in this case a support ticket system - attackers can steal your Supabase data

The attacker begins by opening a new support ticket and submitting a carefully crafted message. The body of the message includes both a friendly question and a very explicit instruction block addressed directly to the Cursor agent. It is important to note that the support agent…

gen_analysis's tweet image. The attacker begins by opening a new support ticket and submitting a carefully crafted message. The body of the message includes both a friendly question and a very explicit instruction block addressed directly to the Cursor agent.  It is important to note that the support agent…


United States 趋势

Loading...

Something went wrong.


Something went wrong.