Discussion about this post

User's avatar
JP's avatar

The approved systems behaving unexpectedly framing maps well onto the Kimi situation. Someone ran shell commands inside their production agent container and found DarkWallet in it. It's not a rogue outsider attack. It's code that shipped from the vendor itself. No SOC 2 audit, no public security controls, prompts training their models by default. The Kimi case shows the vendor layer is just as risky as anything Moltbook-style: https://reading.sh/kimi-com-shipped-darkwallet-code-in-production-stop-using-them-95e9bba35c58

No posts

Ready for more?