Fallthrough

Supply Chain Reaction

Apr 18, 2026
They dissect post-Mythos hype and counter-narratives about access and tokenized models. The conversation shows why existing supply-chain weaknesses already enable many attacks. They argue for signatures, layered attestations, cooldowns and better tooling UX over forking or vendoring. The show ends with an infinite-mindset view that supply-chain security is ongoing work.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Mythos Hype Versus Practical Reality

  • Mythos/Glasswing felt overhyped because much of the security value could be achieved with existing models and human effort.
  • Kris and Jamie note Anthropics' token giveaways and limited visibility made the announcement look like timed marketing, not a clear industry gamechanger.
INSIGHT

Existing Supply Chain Holes Matter More Than New LLMs

  • Many attackers don't need advanced LLMs because the software supply chain already exposes many trivial vectors.
  • Jamie and Kris reference wrench attacks and Log4J toasters as reminders that legacy weaknesses are often sufficient to compromise targets.
ADVICE

Prefer Dependencies Over Local Vendoring

  • Use more explicit dependencies instead of vendoring or copying code to keep provenance trackable.
  • Jamie argues for tracking dependencies with tools like Renovate rather than forking and silently maintaining copies.
Get the Snipd Podcast app to discover more snips from this episode
Get the app