Ace: aceofspadeshq at gee mail.com
Buck: buck.throckmorton at protonmail.com
CBD: cbd at cutjibnewsletter.com
joe mannix: mannix2024 at proton.me
MisHum: petmorons at gee mail.com
J.J. Sefton: sefton at cutjibnewsletter.com
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published.
Contact OrangeEnt for info: maildrop62 at proton dot me
If you've used Claude Code, you've noticed that it loves running shell commands to examine your codebase, rather than, say, reading it. Or having simple fixed-function code built into the software to do it on your computer.
And it also loves to ask you for permission to run those shell commands.
The vulnerability comes into play when a very long string of shell commands are run together. For the first fifty commands it will check - manually if needed, and in its history of permitted and denied commands if it's in there already.
And on the fifty-first command, it rests. And executes it regardless.
So if someone triggers a long string of commands and the first fifty are innocuous, after that they can take full control of your computer - because Claude Code runs on your computer, and just communicates with the Claude AI service as needed.
The particularly lovely thing here is that Anthropic already fixed this.
But both versions are present inside Claude Code and it using the broken one.
Bartlett Lake has up to 12 performance cores, the most of any mainstream Intel processor. Except that while it runs on common Socket 1700 motherboards, it's not a mainstream processor and only sells to industrial users, and is not supported by common Socket 1700 motherboard BIOSes.
Except it turns out that by changing one digit in the BIOS and reflashing it, it works fine.