Tag: Open Source
-
LoRA and QLoRA: Fine-Tuning Large Models on One GPU
LoRA fine-tunes 70B models on one GPU using low-rank weight updates. The intrinsic dimension proof, rsLoRA scaling fix, and where LoRA falls short.
-
Generative AI for Small Molecule Drug Discovery: How It Works and What the Evidence Shows
Generative AI is producing novel molecules from VAEs, GANs, and diffusion models. Machine learning virtual screening shows 75% hit validation rates against 106M-compound libraries. Why no AI-designed drug…
-
RFdiffusion and ProteinMPNN: How AI Now Designs Proteins From Scratch
RFdiffusion generates protein backbones. ProteinMPNN designs the sequences that fold into them. Together they achieved sub-Angstrom accuracy at influenza binding interfaces. How the two-step pipeline works, why AI-generative…
-
Evo 2: The Genomic Foundation Model Trained on 9.3 Trillion DNA Bases
Evo 2 from Arc Institute is a 40B-parameter genomic foundation model trained on 9.3 trillion DNA bases spanning all domains of life. How the 128K context architecture works,…
-
ESM3: The Protein Language Model That Unifies Sequence, Structure and Function
ESM3 from EvolutionaryScale is a 98B-parameter generative protein language model that reasons across sequence, structure, and function simultaneously. How the VQ-VAE structural tokenization works, what the GFP design…
-
How Stalkerware Bypasses End-to-End Encryption
Stalkerware captured 86,859 screenshots from a celebrity’s phone, including WhatsApp messages. Here is how it defeats encryption and what you can do about it.
-
MiniMax M2.7 Optimized Its Own Training Harness 100 Times. Here Is the Loop.
MiniMax M2.7 ran an internal agent that modified its own training scaffold 100 times in a row without human input and gained 30% on internal evaluations. Here is…
-
WebMCP Is Not MCP: What Chrome’s modelContext Actually Ships
Chrome 146 shipped navigator.modelContext in February. It looks like MCP in a browser. It is not. Wire protocol, auth model, and security all differ.
-
Open-Weight LLM Rankings, April 2026: MMLU Is Saturated, Here’s What to Use Instead
MMLU is saturated. In April 2026, the metrics that matter are SWE-bench Verified, GPQA Diamond, and RULER’s effective context window. Chinese labs hold 4 of the top 5…
-
SmolVM: Firecracker-Backed MicroVM Sandbox for AI Agent Code Execution
SmolVM gives AI agents a hardware-isolated disposable VM using Firecracker. Here’s why Docker containers are the wrong sandbox for LLM-generated code, how the snapshot-fork pattern works, and how…
-
Bitwarden CLI Was a Supply Chain Bomb. Checkmarx Lit the Fuse.
The Checkmarx supply chain breach reached Bitwarden’s CLI in 93 minutes on April 22. Here’s how bw1.js stole CI/CD secrets and why security-tool supply chains fail in the…
-
LMDeploy CVE-2026-33626: SSRF Weaponized in 13 Hours
LMDeploy SSRF bug CVE-2026-33626 was exploited 13 hours post-disclosure. Full attack chain, AWS credential blast radius, and why AI inference servers are unusually dangerous SSRF targets.
-
98.4% of Claude Code Is Operational Infrastructure. A New arXiv Paper Maps All of It.
A source-code analysis of Claude Code’s 512,000-line TypeScript codebase finds 98.4% is operational infrastructure, not AI. Here is the five-layer compaction pipeline, the 17% comprehension decline finding, the…
-
Darkbloom Has 8 Security Layers, Not 4: What the Press Missed
Eigen Labs launched Darkbloom on April 15 as a decentralized inference network routing requests to idle Apple Silicon Macs. Every outlet has covered the four-layer privacy architecture. The…
-
Obsidian’s Plugin Model Delivered a Cross-Platform RAT. The Sovereignty Tradeoff Just Came Due.
Elastic Security Labs disclosed REF6598 on April 14, a targeted social engineering campaign that weaponizes Obsidian’s community plugin ecosystem to deliver a cross-platform RAT called PHANTOMPULSE. The attack…
-
ToolHijacker Prompt Injection Hijacks LLM Agent Tool Selection 96.7% of the Time. Every Published Defense Failed.
ToolHijacker, published at NDSS 2026, is the first prompt injection attack designed to hijack the tool selection layer of LLM agents. A single malicious tool document fools the…
-
GLM-5.1 Ran Autonomously for 8 Hours Across 6,000 Tool Calls. How It Beat Claude Opus 4.6 on SWE-Bench Pro and Lost on Verified.
Z.ai released GLM-5.1 open-source under MIT on April 7, 2026. The 744B-parameter MoE scored 58.4 on SWE-Bench Pro, beating Claude Opus 4.6 and GPT-5.4. It also ran 655…
-
Claude Code “String to Replace Not Found in File”: The Three Root Causes, the Diagnostic Protocol, and the Structural Fix
Claude Code’s Edit tool fails with “String to replace not found in file” for three distinct mechanical reasons, not one. Tab-to-space normalization, stale-buffer races with format-on-save, and CRLF…
-
One Developer Improved 15 LLMs at Coding by Changing the Edit Tool. Grok Went From 6.7% to 68.3%.
Security researcher Can Boluk changed the edit tool in his open-source coding agent and re-ran a benchmark across 16 models. Grok Code Fast 1 jumped from 6.7% to…
-
An AI Agent Rejected by Matplotlib Published a Hit Piece on the Maintainer. The SOUL.md File That Caused It Is 25 Lines Long.
An OpenClaw agent autonomously researched a matplotlib maintainer’s personal information, constructed a psychological profile, and published a 1,100-word hit piece after he rejected its pull request. The operator’s…



















You must be logged in to post a comment.