gooner23
Luminary
- Joined
- Sep 2, 2023
- Posts
- 7,356
- Reputation
- 7,731
Summary
Mercor, peter thiel funded data annotation company that directly provides RLHF (Trade secrets to OpenAi, Anthropic, and google), 4TB of data might not seem like a lot but the auctioned data the 4TB leak auctioned by the Lapsus$ extortion group reportedly included:
Evaluation Rubrics: The exact grading sheets and internal rulebooks OpenAI and Anthropic give to experts to teach the AI logic and safety.
Prompts & Answering: The flawless, expert-written source code and reasoning chains used to fine-tune the models.
Could potentially jailbreak recent models with this information
Meta has indefinitely paused all work with Mercor. OpenAI started its own review. Anthropic has not publicly commented on its exposure. Google is understood to be assessing the breach’s scope.
What more could they have gotten
How it happened
.
I don't think the claude code leak was significant althought it did provide open source developers to create interesting tools like claw code
Should startups that handle this level of power even be using open source dependencies and how do you even handle something like this
captaincompliance.com
www.wired.com
^ Now verified by audits
Mercor, peter thiel funded data annotation company that directly provides RLHF (Trade secrets to OpenAi, Anthropic, and google), 4TB of data might not seem like a lot but the auctioned data the 4TB leak auctioned by the Lapsus$ extortion group reportedly included:
Evaluation Rubrics: The exact grading sheets and internal rulebooks OpenAI and Anthropic give to experts to teach the AI logic and safety.
Prompts & Answering: The flawless, expert-written source code and reasoning chains used to fine-tune the models.
Could potentially jailbreak recent models with this information
Meta has indefinitely paused all work with Mercor. OpenAI started its own review. Anthropic has not publicly commented on its exposure. Google is understood to be assessing the breach’s scope.
What more could they have gotten
How it happened
- The Initial Vector (March 19, 2026): TeamPCP compromised Trivy, an open-source vulnerability scanner maintained by Aqua Security that is used by thousands of development teams. The hackers poisoned Trivy's GitHub Actions, effectively turning a widely trusted security scanner into a credential-stealing malware tool.
- The LiteLLM Compromise (March 24, 2026): LiteLLM, a massive open-source AI gateway with millions of downloads, used Trivy in its own CI/CD security pipeline. When LiteLLM ran a routine automated security scan, TeamPCP's malware executed and stole LiteLLM's PyPI (Python Package Index) publishing tokens.
- The Payload: Armed with those tokens, TeamPCP published malicious updates of LiteLLM (versions 1.82.7 and 1.82.8). When developers or automated systems pulled the latest LiteLLM package, it installed a deeply embedded malware that swept their host machines for cloud credentials, API keys, .env files, and Kubernetes secrets.
I don't think the claude code leak was significant althought it did provide open source developers to create interesting tools like claw code
Should startups that handle this level of power even be using open source dependencies and how do you even handle something like this
Sued, Breached, and Betrayed: How Mercor's Trust in a Fraudulent Compliance Startup Exposed 40,000 People to Hackers
Schubert Jonckheer & Kolbe LLP, Edlesberg Law out of Aventure, Florida, and 3 other plaintiffs firms are investigating a data breach that led to unauthorized access to the sensitive information of individuals affiliated with Mercor.io. Below is a detailed breakdown of the scandal that ties in...
Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk
Major AI labs are investigating a security incident that impacted Mercor, a leading data vendor. The incident could have exposed key data about how they train AI models.
^ Now verified by audits