burckhap Profile Banner
Philipp Burckhardt Profile
Philipp Burckhardt

@burckhap

Followers
2K
Following
5K
Media
52
Statuses
7K

⚡Securing Software Supply Chains at @SocketSecurity (https://t.co/rjmrp0fCL0) 🔭 Scientific computing for the web via @stdlibjs (https://t.co/nJc4oxoUlD)

Pittsburgh, PA
Joined October 2010
Don't wanna be here? Send us removal request.
@burckhap
Philipp Burckhardt
2 years
GraphMaker for easy graph building: describe in English what nodes and edges you want, and it handles the rest via OpenAI's help. Support for trees, DAGs, styling, saving in multiple formats etc. Work in progress, please send @CRGenovese and me feedback!.
github.com
GraphMaker is a tool for creating, manipulating, and exporting graphs using natural language. - isle-project/graphmaker
1
1
3
@burckhap
Philipp Burckhardt
23 days
On the @stdlibjs blog, we just published my take on @METR_Evals's surprising study: AI tools made experienced developers 19% slower (expectation: 40% faster!)🤯.I dive into the why, where AI coding tools actually help, and how I've shifted from handholding AI to async delegation.
1
0
2
@burckhap
Philipp Burckhardt
24 days
Undocumented Protestware.We found hidden functionality in 28+ npm packages that disables UI for Russian-language users visiting .ru or .by domains. No CVEs. No advisories. No documentation. Just behavior-based disruption quietly copied into packages and shipped to production.
1
0
0
@burckhap
Philipp Burckhardt
24 days
North Korean XORIndex Campaign.The latest "Contagious Interview" wave includes 67 new malicious packages with a previously unknown malware loader, accumulating over 17,000 downloads. These state-backed attackers are evolving quickly, using multiple loader variants in parallel.
1
0
0
@burckhap
Philipp Burckhardt
24 days
Two major npm supply chain discoveries this week from the Socket Research Team highlight a critical gap in traditional security approaches. Both threats would slip past security tools that rely on vulnerability databases or metadata alone.
1
0
1
@burckhap
Philipp Burckhardt
3 months
These packages, disguised as "the cheapest Cursor API," install backdoors that steal credentials and modify crucial files. In total, sw-cur, sw-cur1, and aiide-cur have been downloaded 3,200+ times before discovery. Read more on the Socket blog: .
Tweet card summary image
socket.dev
Malicious npm packages posing as developer tools target macOS Cursor IDE users, stealing credentials and modifying files to gain persistent backdoor a...
0
0
0
@burckhap
Philipp Burckhardt
3 months
🚨 With vibe coding being on everyone's minds and AI code generations seemingly becoming ubiquitous, it is not surprising that this attracts also malicious actors. Kirill Boychenko just uncovered three malicious npm packages targeting Cursor users on macOS.
1
0
0
@burckhap
Philipp Burckhardt
3 months
Over the last few months, I have been picking up Cursor again after finding it not substantially improving my productivity when I tried it last year. It, and the LLMs powering AI code completions, have gotten so much better that I now really enjoy its agent workflow.
1
0
1
@burckhap
Philipp Burckhardt
3 months
The attack takes advantage of the open nature of Go's ecosystem, where it is challenging to distinguish authentic packages from malicious ones due to namespace ambiguity. Check out our detailed analysis, IOCs, and protective measures: #CyberSecurity
Tweet media one
0
2
2
@burckhap
Philipp Burckhardt
3 months
The Socket research team discovered a supply chain attack involving obfuscated Go modules that come with devastating disk-wiping payloads. With just one line of code, these modules retrieve and run a script that zeros out storage devices, rendering data recovery impossible.
1
3
6
@burckhap
Philipp Burckhardt
3 months
The threat actor started publishing these packages in 2021, consistently employing comparable strategies while remaining undetected. Full technical analysis here:.
socket.dev
Socket uncovers malicious packages on PyPI using Gmail's SMTP protocol for command and control (C2) to exfiltrate data and execute commands.
0
3
4
@burckhap
Philipp Burckhardt
3 months
These packages use embedded credentials to connect to Gmail's SMTP server, relay signals to emails under the control of attackers, and initiate WebSocket connections that can bypass firewalls since the connection starts from within the network.
1
1
2
@burckhap
Philipp Burckhardt
3 months
The Socket research team discovered seven "Coffin-Codes" packages that leveraged Gmail's SMTP protocol to create covert channels for extracting data and executing commands.
1
1
4
@burckhap
Philipp Burckhardt
4 months
Remember: If any code asks for your seed phrase, there's no salvation - it's not a feature, it's a scam. Full research here:
Tweet card summary image
socket.dev
Socket researchers uncovered malicious npm and PyPI packages that steal crypto wallet credentials using Google Analytics and Telegram for exfiltration...
0
0
0
@burckhap
Philipp Burckhardt
4 months
With over 8,000 combined downloads, these digital highwaymen use Google Analytics and Telegram for exfiltration - truly where the wild roses grow. While Socket is celebrating our launch week and Coana acquisition, the bad actors never take a break.
1
0
0
@burckhap
Philipp Burckhardt
4 months
Uncovering "The Bad Seeds" in Package Registries. We have identified three malicious npm and PyPI packages that, like their namesake, are doing the devil's work - harvesting crypto wallet credentials while posing as innocent developer tools.
1
0
0
@burckhap
Philipp Burckhardt
4 months
RT @feross: We just bought a company. Why? Because vulnerability scanning is fundamentally broken. And I’m tired of pretending it’s fine.….
0
70
0
@burckhap
Philipp Burckhardt
4 months
What makes these attacks concerning is that they. target business-critical workflows.use sophisticated disguises that implement legitimate functionality.execute at specific runtime events, not installation. The malicious packages have been reported and are removed. Stay vigilant!.
0
1
4