Tyler Williams's picture
Building on HF

Tyler Williams PRO

unmodeled-tyler

AI & ML interests

AI research engineer & solo operator of VANTA Research/Quanta Intellect

Recent Activity

reacted to karstenskyt's post with šŸ”„ about 6 hours ago
šŸš€ š—Ÿš—®š˜‚š—»š—°š—µš—¶š—»š—“ š˜š—µš—² š—”š—œ/š— š—Ÿ š—Ŗš—¼š—æš—øš—³š—¹š—¼š˜„š˜€ š——š—®š˜€š—µš—Æš—¼š—®š—æš—± Now that our Taipy architecture is humming along on Hugging Face Spaces, we just shipped the most complex feature of the (š˜™š˜Ŗš˜Øš˜©š˜µ! š˜“š˜¶š˜¹š˜¶š˜³š˜ŗ!) š˜“š˜¢š˜¬š˜¦š˜©š˜°š˜¶š˜“š˜¦ to date: the š—”š—œ/š— š—Ÿ š—Ŗš—¼š—æš—øš—³š—¹š—¼š˜„š˜€ š——š—®š˜€š—µš—Æš—¼š—®š—æš—±. Managing 16 different machine learning pipelines (from Expected Goals to Space Creation) across Databricks Serverless and HF Jobs is a logistical challenge. To solve this, we built a dynamic operations center (the 13th page in our app). It features:   • š—”š—» š—¶š—»š˜š—²š—æš—®š—°š˜š—¶š˜ƒš—² š—±š—²š—½š—²š—»š—±š—²š—»š—°š˜† š——š—”š—š: Powered by Cytoscape.js, it visually maps exactly how our models and data grids feed into each other.   • š—„š—²š—®š—¹-š˜š—¶š—ŗš—² š—ŗš—¼š—»š—¶š˜š—¼š—æš—¶š—»š—“: Tracks run volumes and data freshness SLAs across the entire platform.   • š—” šŸÆ-š˜š—¶š—²š—æ š—µš˜†š—Æš—æš—¶š—± š—°š—¼š˜€š˜ š—²š—»š—“š—¶š—»š—²: Merges "cold" Databricks billing data with "warm/hot" live HF Jobs estimates to give a unified view of pipeline expenses. Check out the live interactive graph here: https://huggingface.co/spaces/luxury-lakehouse/soccer-analytics-app
posted an update about 17 hours ago
PSA: LiteLLM has been compromised on PyPI - if you have it installed, CHECK NOW. LiteLLM is used as a dependency in A LOT of AI tooling, so there's a pretty good chance that you have it installed somewhere on your machine (my instance was part of Hermes Agent, but I was unaffected by the hack) Versions 1.82.7 & 1.82.8 on PyPI have been compromised with a multi-stage credential stealer. - Version 1.82.8 uses a .pth file that executes on EVERY python process startup. You don't even need to import litellm. Just having it installed is enough. - The payload harvests SSH keys, .env files, AWS/GCP/Azure credentials, Kubernetes configs, database passwords, crytpo wallets, shell history - basically every secret on your machine. - Stolen data is encrypted with a hardcoded RSA key and exfiltrated to a domain that is NOT part of a legitimate litellm infrastructure. - If you're running Kubernetes, it attempts lateral movement across the entire cluster. - The C2 is hosted on the Internet Computer blockchain, making it essentially impossible to take down. This is part of a coordinated campaign by a threat actor called TeamPCP who have also hit Trivy (Aqua Security), Checkmarx KICS, and multiple npm packages in the last week ALONE. What to do: 1. Run 'pip show litellm' in every environment you have 2. If you're on 1.82.7 or 1.82.8 - rotate EVERY secret on that machine immediately. 3. Check for persistence artifacts ~/.config/sysmon/sysmon.py & ~/.config/systemd/user/sysmon.service I was lucky in this case that my litellm version was out of date, but if you've installed litellm as a dependency in ANY package within the last 24ish hours, you're gonna want to check. SOURCES https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/ Same group, different attack a couple of days ago: https://www.stepsecurity.io/blog/canisterworm-how-a-self-propagating-npm-worm-is-spreading-backdoors-across-the-ecosystem
View all activity

Organizations

Blog-explorers's profile picture VANTA Research's profile picture Mistral Hack-a-ton 2026's profile picture