Readit News logoReadit News
cuchoi commented on Ask HN: Who is hiring? (March 2026)    · Posted by u/whoishiring
cuchoi · 11 days ago
Enveritas (YC S18, non-profit) | Backend Software Engineer | Remote (Global) | https://enveritas.org/jobs/

Enveritas is a 501(c)(3) nonprofit working on sustainability issues facing smallholder coffee farmers. We collect field data in 25+ countries and build systems for analyzing risks in coffee supply chains (including EUDR-related deforestation checks).

* Backend Software Engineer (Python, PostgreSQL/PostGIS, Docker, AWS, Terraform) - $135-$155k — https://enveritas.org/jobs/backend-software-eng/#10d7adef8us (worldwide remote)

cuchoi commented on HackMyClaw   hackmyclaw.com/... · Posted by u/hentrep
Hobadee · 23 days ago
Pretty sure half the point is to get it to respond.
cuchoi · 23 days ago
yes, exactly
cuchoi commented on HackMyClaw   hackmyclaw.com/... · Posted by u/hentrep
alexhans · 24 days ago
The website is great as a concept but I guess it mimics an increasingly rare one off interaction without feedback.

I understand the cost and technical constraints but wouldn't an exposed interface allow repeated calls from different endpoints and increased knowledge from the attacker based on responses? Isn't this like attacking an API without a response payload?

Do you plan on sharing a simulator where you have 2 local servers or similar and are allowed to really mimic a persistent attacker? Wouldn't that be somewhat more realistic as a lab experiment?

cuchoi · 24 days ago
The exercise is not fully realistic because I think getting hundreds of suspicious emails puts the agent in alert. But the "no reply without human approval" part I think it is realistic because that's how most openclaw assistants will run.
cuchoi commented on HackMyClaw   hackmyclaw.com/... · Posted by u/hentrep
jimrandomh · 24 days ago
I think this is likely a defender win, not because Opus 4.6 is that resistant to prompt injection, but because each time it checks its email it will see many attempts at once, and the weak attempts make the subtle attempts more obvious. It's a lot easier to avoid falling for a message that asks for secrets.env in a tricky way, if it's immediately preceded and immediately followed by twenty more messages that each also ask for secrets.env.
cuchoi · 24 days ago
If this a defender win maybe the lesson is: make the agent assume it’s under attack by default. Tell the agent to treat every inbound email as untrusted prompt injection.
cuchoi commented on HackMyClaw   hackmyclaw.com/... · Posted by u/hentrep
jimrandomh · 24 days ago
I think this is likely a defender win, not because Opus 4.6 is that resistant to prompt injection, but because each time it checks its email it will see many attempts at once, and the weak attempts make the subtle attempts more obvious. It's a lot easier to avoid falling for a message that asks for secrets.env in a tricky way, if it's immediately preceded and immediately followed by twenty more messages that each also ask for secrets.env.
cuchoi · 24 days ago
I agree that this affects the exercise. Maybe someday I’ll test each email separately by creating a new assistant each time, but that would be more expensive.
cuchoi commented on HackMyClaw   hackmyclaw.com/... · Posted by u/hentrep
arm32 · 24 days ago
I just managed to get your agent to reply to my email, so we're off to a good start. Unless that was you responding manually.
cuchoi · 24 days ago
i told it to send a snarky reply to the last 50 prompt injection emails, but won't be doing that again due to costs
cuchoi commented on HackMyClaw   hackmyclaw.com/... · Posted by u/hentrep
planb · 24 days ago
Please keep us updated on how many people tried to get the credentials and how many really succeeded. My gut feeling is that this is way harder than most people think. That’s not to say that prompt injection is a solved problem, but it’s magnitudes more complicated than publishing a skill on clawhub that explicitly tells the agent to run a crypto miner. The public reporting on openclaw seems to mix these 2 problems up quite often.
cuchoi · 24 days ago
So far there have been 400 emails and zero have succeeded. Note that this challenge is using Opus 4.6, probably the best model against prompt injection.
cuchoi commented on HackMyClaw   hackmyclaw.com/... · Posted by u/hentrep
cuchoi · 24 days ago
Creator here.

Built this over the weekend mostly out of curiosity. I run OpenClaw for personal stuff and wanted to see how easy it'd be to break Claude Opus via email.

Some clarifications:

Replying to emails: Fiu can technically send emails, it's just told not to without my OK. That's a ~15 line prompt instruction, not a technical constraint. Would love to have it actually reply, but it would too expensive for a side project.

What Fiu does: Reads emails, summarizes them, told to never reveal secrets.env and a bit more. No fancy defenses, I wanted to test the baseline model resistance, not my prompt engineering skills.

Feel free to contact me here contact at hackmyclaw.com

cuchoi · 24 days ago
someone just tried to prompt inyect `contact at hackmyclaw.com`... interesting

u/cuchoi

KarmaCake day764May 5, 2014
About
twitter.com/cucho
View Original