mastodon.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
Generic Mastodon server for anyone to use.

Server stats:

8.5K
active users

#developers

53 posts50 participants0 posts today

We do not provide evidence that:

- #AI systems do not currently speed up many or most #softwareDevelopers

- AI systems do not speed up individuals or groups in domains other than #softwareDevelopment

- AI systems in the near future will not speed up #developers

- There are not ways of using existing AI systems more effectively

> Measuring the Impact of Early-2025 AI on Experienced #OpenSource #Developer #Productivity

metr.org/blog/2025-07-10-early

metr.orgMeasuring the Impact of Early-2025 AI on Experienced Open-Source Developer Productivity
#llm#copilot#cursor
Leverage AI in Technical Due Diligence Engagements At Atomic, we offer a “Technical Due Diligence” service, often used by venture capital (VC) firms looking to fund startups. These engagements ...

#AI #for #Developers #artificial #intelligence #documentation #tools

Origin | Interest | Match
Atomic Spin · Leverage AI in Technical Due Diligence EngagementsAtomic offers a Technical Due Diligence service, often used by VC firms funding startups. Here's how we've added AI to that workflow.

The Solidity Language open-source package was used in a $500,000 crypto heist

A malicious extension for the Solidity programming language in the Cursor AI IDE led to a $500,000 cryptocurrency theft. The fake extension, downloaded 54,000 times, appeared higher in search results than the legitimate one due to ranking algorithm factors. It installed malware that downloaded PowerShell scripts, installed remote management software, and deployed data-stealing payloads. The attackers obtained wallet passphrases and stole cryptocurrency. Similar malicious packages were found targeting blockchain developers. The incident highlights the ongoing threat of malicious open-source packages in the crypto industry and the need for caution when downloading tools from package repositories.

Pulse ID: 6870b25f4c4c81689f7f0c75
Pulse Link: otx.alienvault.com/pulse/6870b
Pulse Author: AlienVault
Created: 2025-07-11 06:42:39

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

> When #developers are allowed to use #AI tools, they take 19% longer to complete issues—a significant slowdown that goes against #developer beliefs and expert forecasts. This gap between perception and reality is striking: developers expected AI to speed them up by 24%, and even after experiencing the slowdown, they still believed AI had sped them up by 20%.

metr.org/blog/2025-07-10-early

metr.orgMeasuring the Impact of Early-2025 AI on Experienced Open-Source Developer Productivity

macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App

A new variant of macOS.ZuRu malware has been discovered, targeting users through a trojanized version of the Termius app. This backdoor, initially noted in 2021, now uses a modified Khepri C2 framework for post-infection operations. The malware is delivered via a .dmg disk image containing a hacked version of Termius.app. It adds two executables to the embedded Termius Helper.app and uses a new method to trojanize legitimate applications. The malware installs persistence via a LaunchDaemon and includes an md5 updater mechanism. The payload obtained from the C2 is a modified Khepri beacon with capabilities for file transfer, system reconnaissance, and command execution. The threat actor continues to target developers and IT professionals, adapting their techniques to evade detection.

Pulse ID: 686ffe0e4f96bdedcb713829
Pulse Link: otx.alienvault.com/pulse/686ff
Pulse Author: AlienVault
Created: 2025-07-10 17:53:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.