ItakGol Profile Banner
Itamar Golan 🤓 Profile
Itamar Golan 🤓

@ItakGol

Followers
16K
Following
2K
Media
625
Statuses
2K

CEO & Co-founder @prompt_security ||| AI Researcher ||| LLM hacker

Tel-Aviv
Joined June 2009
Don't wanna be here? Send us removal request.
@ItakGol
Itamar Golan 🤓
2 years
Prompt-Visual Injection is the new kid in town! 😈🛡
Tweet media one
Tweet media two
116
2K
13K
@ItakGol
Itamar Golan 🤓
11 days
AI now writes 50% of the code at Google. *Defined as the number of accepted characters from AI-based suggestions divided by the sum of manually typed characters and accepted characters from AI-based suggestions. Source -
Tweet media one
1
0
4
@ItakGol
Itamar Golan 🤓
15 days
Our product team just demoed a POC for a new capability we’re building at Prompt Security—powered by Cursor and Figma, no traditional devs involved. It’s rough, definitely not prod-ready, but still wild to see it in action. Makes you wonder: is QA about to become the most
Tweet media one
1
0
1
@ItakGol
Itamar Golan 🤓
17 days
This is epic. 🤯. Ask any human — they’ll know this is the Mona Lisa. All LLMs so far have failed this test. o3 passes it.
Tweet media one
1
0
5
@ItakGol
Itamar Golan 🤓
20 days
Did We Just Find the Ideal Benchmark for LLMs? 🧪🤖. ------------------------------------. o3 is starting to feel different. ⚡️. Personally, it’s the only model I trust for tasks like financial analysis, GTM brainstorming, and roadmap refinement. It feels like it can search and
Tweet media one
0
0
3
@ItakGol
Itamar Golan 🤓
21 days
One day, I’ll sit my kid down and tell him how I used to switch activation functions in TensorFlow just to get a slightly better loss after 100 epochs—and he’ll just laugh at his old dad and his prehistoric deep learning tricks.
Tweet media one
1
0
4
@ItakGol
Itamar Golan 🤓
22 days
Be delusional enough to believe you can. Be disciplined enough to prove yourself right.
1
0
2
@ItakGol
Itamar Golan 🤓
1 month
This is wild. 🤯. Apple drops a paper saying AI "reasoning" is just fancy pattern-matching—models flop on stuff like Tower of Hanoi. A week later, “The Illusion of the Illusion of Thinking” drops. Absolute roast. Claims Apple rigged the game with token limits + impossible
Tweet media one
1
1
22
@ItakGol
Itamar Golan 🤓
1 month
רק מזכיר (רציונליזציה כמנגנון להפחתת חרדה):. הסיכוי להיפגע מטיל שנופל באקראי בתל אביב הוא פחות או יותר היחס בין 20 מ״ר ל-50 מיליון, כלומר 1 ל-2.5 מיליון! . רק לשם השוואה, הסיכון למות בתאונת דרכים בדרככם מתל אביב לאילת הוא גבוה יותר; 1 ל-2.4 מיליון!. המשך יום טוב.
2
0
0
@ItakGol
Itamar Golan 🤓
1 month
You thought Silicon Valley was brilliant?. Check this out-. They literally built Cursor with a filesystem MCP server more than ten years ago. 🤯. Totally epic.
1
3
12
@ItakGol
Itamar Golan 🤓
1 month
All that matters is winning the next point.
Tweet media one
0
0
2
@ItakGol
Itamar Golan 🤓
2 months
9) We thus successfully exfiltrated several pieces of private information about our user ukend0464: information about their private repositories, such as Jupiter Star, their plan to relocate to South America, and even their salary. Below, we include a screenshot of the full chat
Tweet media one
1
0
1
@ItakGol
Itamar Golan 🤓
2 months
8) Attack Rollout The agent now goes through the list of issues until it finds the attack payload. It willingly pulls private repository data into context, and leaks it into a pull request of the pacman repo, which is freely accessible to the attacker since it is public. The
Tweet media one
1
0
0
@ItakGol
Itamar Golan 🤓
2 months
7) Claude then uses the GitHub MCP integration to follow the instructions. Throughout this process, Claude Desktop by default requires the user to confirm individual tool calls. However, many users already opt for an “Always Allow” confirmation policy when using agents, and stop.
1
0
0
@ItakGol
Itamar Golan 🤓
2 months
6) User Interaction To trigger the attack, the user merely prompts Claude 4 Opus with the following request:
Tweet media one
1
0
0
@ItakGol
Itamar Golan 🤓
2 months
5) We now place a malicious issue in the public repository, which is accessible to the attacker. The issue contains a payload that will be executed by the agent as soon as it queries the public repository's list of issues.
Tweet media one
1
0
0
@ItakGol
Itamar Golan 🤓
2 months
4) As shown here, as soon as the agent encounters the malicious GitHub issue, it can be coerced into pulling private repository data into context, and leaking it in an autonomously-created PR in the public repository, freely accessible to the attacker or anyone else.
1
0
0
@ItakGol
Itamar Golan 🤓
2 months
3) See below for an illustration of the ensuing flow.
Tweet media one
1
0
0
@ItakGol
Itamar Golan 🤓
2 months
2) We assume the user has created two repositories:. <user>/public-repo: A publicly accessible repository, allowing everyone on GitHub to create issues and bug reports. <user>/private-repo: A private repository, e.g. with proprietary code or private company data. By standard.
1
0
0