Tyler Williams's picture
Building on HF

Tyler Williams PRO

unmodeled-tyler

AI & ML interests

AI research engineer & solo operator of VANTA Research/Quanta Intellect

Recent Activity

reacted to karstenskyt's post with ๐Ÿ”ฅ about 5 hours ago
๐Ÿš€ ๐—Ÿ๐—ฎ๐˜‚๐—ป๐—ฐ๐—ต๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—”๐—œ/๐— ๐—Ÿ ๐—ช๐—ผ๐—ฟ๐—ธ๐—ณ๐—น๐—ผ๐˜„๐˜€ ๐——๐—ฎ๐˜€๐—ต๐—ฏ๐—ผ๐—ฎ๐—ฟ๐—ฑ Now that our Taipy architecture is humming along on Hugging Face Spaces, we just shipped the most complex feature of the (๐˜™๐˜ช๐˜จ๐˜ฉ๐˜ต! ๐˜“๐˜ถ๐˜น๐˜ถ๐˜ณ๐˜บ!) ๐˜“๐˜ข๐˜ฌ๐˜ฆ๐˜ฉ๐˜ฐ๐˜ถ๐˜ด๐˜ฆ to date: the ๐—”๐—œ/๐— ๐—Ÿ ๐—ช๐—ผ๐—ฟ๐—ธ๐—ณ๐—น๐—ผ๐˜„๐˜€ ๐——๐—ฎ๐˜€๐—ต๐—ฏ๐—ผ๐—ฎ๐—ฟ๐—ฑ. Managing 16 different machine learning pipelines (from Expected Goals to Space Creation) across Databricks Serverless and HF Jobs is a logistical challenge. To solve this, we built a dynamic operations center (the 13th page in our app). It features: ย ย โ€ข ๐—”๐—ป ๐—ถ๐—ป๐˜๐—ฒ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐—ฑ๐—ฒ๐—ฝ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ป๐—ฐ๐˜† ๐——๐—”๐—š: Powered by Cytoscape.js, it visually maps exactly how our models and data grids feed into each other. ย ย โ€ข ๐—ฅ๐—ฒ๐—ฎ๐—น-๐˜๐—ถ๐—บ๐—ฒ ๐—บ๐—ผ๐—ป๐—ถ๐˜๐—ผ๐—ฟ๐—ถ๐—ป๐—ด: Tracks run volumes and data freshness SLAs across the entire platform. ย ย โ€ข ๐—” ๐Ÿฏ-๐˜๐—ถ๐—ฒ๐—ฟ ๐—ต๐˜†๐—ฏ๐—ฟ๐—ถ๐—ฑ ๐—ฐ๐—ผ๐˜€๐˜ ๐—ฒ๐—ป๐—ด๐—ถ๐—ป๐—ฒ: Merges "cold" Databricks billing data with "warm/hot" live HF Jobs estimates to give a unified view of pipeline expenses. Check out the live interactive graph here: https://huggingface.co/spaces/luxury-lakehouse/soccer-analytics-app
posted an update about 16 hours ago
PSA: LiteLLM has been compromised on PyPI - if you have it installed, CHECK NOW. LiteLLM is used as a dependency in A LOT of AI tooling, so there's a pretty good chance that you have it installed somewhere on your machine (my instance was part of Hermes Agent, but I was unaffected by the hack) Versions 1.82.7 & 1.82.8 on PyPI have been compromised with a multi-stage credential stealer. - Version 1.82.8 uses a .pth file that executes on EVERY python process startup. You don't even need to import litellm. Just having it installed is enough. - The payload harvests SSH keys, .env files, AWS/GCP/Azure credentials, Kubernetes configs, database passwords, crytpo wallets, shell history - basically every secret on your machine. - Stolen data is encrypted with a hardcoded RSA key and exfiltrated to a domain that is NOT part of a legitimate litellm infrastructure. - If you're running Kubernetes, it attempts lateral movement across the entire cluster. - The C2 is hosted on the Internet Computer blockchain, making it essentially impossible to take down. This is part of a coordinated campaign by a threat actor called TeamPCP who have also hit Trivy (Aqua Security), Checkmarx KICS, and multiple npm packages in the last week ALONE. What to do: 1. Run 'pip show litellm' in every environment you have 2. If you're on 1.82.7 or 1.82.8 - rotate EVERY secret on that machine immediately. 3. Check for persistence artifacts ~/.config/sysmon/sysmon.py & ~/.config/systemd/user/sysmon.service I was lucky in this case that my litellm version was out of date, but if you've installed litellm as a dependency in ANY package within the last 24ish hours, you're gonna want to check. SOURCES https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/ Same group, different attack a couple of days ago: https://www.stepsecurity.io/blog/canisterworm-how-a-self-propagating-npm-worm-is-spreading-backdoors-across-the-ecosystem
View all activity

Organizations

Blog-explorers's profile picture VANTA Research's profile picture Mistral Hack-a-ton 2026's profile picture