#Ultralytics

2025-03-27

AI (Computer Vision) для реальной жизни (или кто для кого готов)

Профессия "плотник" полезна в обычной жизни, а что можно сказать о "программисте"? Когда государственной политикой является цифровизация, то правительство должно понимать: цифра она везде цифра! И в обычной жизни придется учитывать и такие истории. Но сначала, чтоб не тратить время "продвинутых" хабберчан, краткое резюме: 1. уровень технической информации = junior 2. стек = python, ultralytics, YOLO (различных версий) 3. тема = распознование объектов, обучение модели 4. социальная польза = забота об экологии в городе Москва История эта началась в нулевых, когда в очередной раз проходя мимо круга разворота автобусов, что находится у дома, я заплутал между громадного их количества, стоящих с включенными двигателями и чадящим прямо под окнами жителей. детали под катом

habr.com/ru/articles/895048/

#python #ultralytics #computer_vision #YOLOv12

2024-12-23

Zarabianie kryptowalut za pomocą Github Actions? Jak wykorzystano atak na łańcuch dostaw do przejęcia biblioteki Python – ultralytics

Ataki na łańcuch dostaw nie są nowością w świecie IT security. Od książkowego Solarwinds, przez legendarny backdoor w SSH,  po ataki na infrastrukturę służącą do publikacji paczek Pythona – ten rodzaj zagrożenia wciąż powinien być traktowany poważnie. Zwłaszcza, że wykorzystywane są coraz bardziej pomysłowe sposoby na przemycenie niechcianego kodu do...

#WBiegu #Github #GithubActions #Python #Ultralytics

sekurak.pl/zarabianie-kryptowa

Ed W8EMV :radio_tower:w8emv@mastodon.radio
2024-12-10

@thomrstrom

The sneaky part of the #ultralytics attack was how it got in in the first place, via a weird branch name that got interpreted by Github Actions as something to be expanded and then executed in the CI. The branch didn't even change any files!

Sam Stepanyan :verified: 🐘securestep9@infosec.exchange
2024-12-09

Another day - another #SoftwareSupplyChain attack. This time #Ultralytics - an AI vision library downloaded 260,000+ times a day from #PyPI was compromised by a malicious code injection which installed cryptocurrency miner. Avoid versions 8.3.41 & 8.3.42:

bleepingcomputer.com/news/secu

2024-12-08

The maintainer of the #Ultralytics AI library for Python has confirmed some versions of the library contained malicious code

The code exists in versions 8.3.41 and 8.3.42 of the library. The malicious code mines cryptocurrency in the background.

Developers are advised to review all library dependencies and update to a patch version

#cybersecurity #supplychainattack

thehackernews.com/2024/12/ultr

2024-12-06

There is an excellent writeup by @yossarian of the #ultralytics attack, starting from the Github Actions compromise ("Beware of weird branch names") and continuing through with token exfiltration and a cache poisoning attack on the pip cache.

blog.yossarian.net/2024/12/06/ has the microscope and tweezers details.

some discussion also at infosec.exchange/@yossarian/11

An associated static analysis tool for Github Actions is "zizmor"

github.com/woodruffw/zizmor

cc @990000 @neilk @steiza

2024-12-06

Ein Krypto-Miner wurde in einigen Versionen des Pip-Pakets ultralytics gefunden. Betroffen sind die Versionen v8.3.41 und v8.3.42 des ultralytics pip-Pakets auf Mac und Linux.
Updaten!
blog.comfy.org/comfyui-stateme
#DASS #DassNews #ultralytics #cryptominer

ComfyUl statement on the Ultralytics crypto miner situation. A crypto miner was found in some versions of the ultralytics pip package.
2024-12-06

Beware of weird branch names

Sanitize your inputs

Some references for the #ultralytics attack, which saw a crafted branch name inject a crypto miner into a PyPi package via unsanitized Github Actions variables.

vielmetti.typepad.com/logbook/

#github #infosec

cc @990000 @neilk

2024-12-05

@mgorny

It looks like this is one of the offending PRs

github.com/ultralytics/ultraly

and you'll note that the branch name has a shell injection attack in it, so it's probably that

unclear as of yet exactly the path through the system that left a branch name unsanitized, but I'm betting there's other repos at risk

cc @steiza

#github #ultralytics #infosec

mgorny-nyan (on) :autism:🙀🚂🐧mgorny@pol.social
2024-12-05

Dzisiejsze wieści z GitHuba: projekt #Ultralytics ma problem skompromitowanego procesu CI, przez który na PyPI trafiały zmodyfikowane wydania. 8.3.41 i 8.3.42 zawierały złośliwą koparkę kryptowalut. Wygląda na to, że nie ma jeszcze informacji, w jaki sposób dokładnie do tego doszło.

github.com/ultralytics/ultraly

#GitHub #kryptowaluty

mgorny-nyan (he) :autism:🙀🚂🐧mgorny@treehouse.systems
2024-12-05

Today's #GitHub fun: #Ultralytics had its release pipeline compromised, creating compromised release artifacts and uploading them to PyPI. 8.3.41 and 8.3.42 contained a #cryptocurrency miner. Apparently there's still no clear explanation of how exactly it was compromised.

github.com/ultralytics/ultraly

#security

just a💧in my 🍺Gboeer@det.social
2024-12-05

Attention the #python PyPI package of the popular object detection model #YOLO in its implementation by #Ultralytics has been compromised.

There is an angoing investigation about the matter:

github.com/ultralytics/ultraly

For now it would be best do uninstall the package.

#ComputerVision

2024-04-01

Screw #Ultralytics.

github.com/blakeblackshear/fri

An #AGPL licensed program outputs a binary file, that is now licensed under AGPL as well?

And these automated answers are just an insult.
github.com/ultralytics/ultraly

Dont use anything from them.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst