Morning Brief · Friday

xAI Ships Grok 4.3. A Malware Worm Is Eating AI Developers' Credentials.

xAI quietly released Grok 4.3 overnight, calling it the most intelligent and fastest model they've built and making it the new default recommendation for the API. A Dune-themed supply chain attack hit the PyTorch Lightning library on PyPI — two malicious versions actively steal credentials and self-replicate through npm in a worm pattern that should have AI teams auditing their dependency trees right now. Apple accidentally shipped CLAUDE.md developer context files inside its Support app update, issued an emergency patch to remove them, and in doing so confirmed what everyone already suspected: Apple engineers run on Claude Code. And Secretary of Defense Pete Hegseth called Anthropic CEO Dario Amodei an "ideological lunatic" — a signal of where AI sits in the current political climate.

Models

xAI ships Grok 4.3 — now the recommended default for everything

xAI released Grok 4.3 this morning, positioning it at the top of its model stack with unambiguous language: "For everything else, use Grok 4.3. It is the most intelligent and fastest model we've built." The release replaces Grok 4 as the default API recommendation and arrives with updated pricing documentation covering tool invocations, batch API discounts, and multimodal capabilities. Reaction on Hacker News was quick, with developers noting that Grok's language quality — its naturalness in tone, its ability to match register and formality — has consistently tracked ahead of GPT and competitive with Claude, particularly for non-English writing and dictation tasks.

The timing is notable. Grok 4.3 drops the same week that the Musk v. OpenAI trial concludes its testimony phase — testimony that produced a detailed documentary record of Musk's 2018 pivot away from OpenAI toward Tesla as his AI vehicle, and, later, xAI. From that pivot to Grok 4.3 being positioned as the top frontier model at xAI took roughly seven years and an enormous investment in compute, talent, and infrastructure. Whether 4.3 genuinely competes with GPT-5 and Claude at the frontier is a question benchmarks will answer in coming days, but the positioning signal from xAI is unambiguous: they believe they're in the race now.

x.ai ↗
Grok has earned a real following among developers who find its language outputs more naturalistic than GPT and more direct than Claude, and the model has improved meaningfully across each major version. "Most intelligent and fastest" is strong language from a company that has historically let benchmark results speak first. The question is whether that claim holds up on the tasks that matter — reasoning, coding, instruction-following under complex constraints — versus the tasks where Grok has been demonstrably strong (tone, style, language feel). The model release also carries an interesting competitive context: Grok's primary distribution channel is still X, which gives it data advantages no other frontier lab can replicate, but also constrains how it's perceived in the enterprise. Calling 4.3 the best they've built is true or false depending on the task; the more meaningful claim is whether the release changes how seriously enterprises consider xAI as a vendor alongside OpenAI, Anthropic, and Google. That conversation is the one to watch.
Security

Shai-Hulud malware is actively worming through AI developers' dependency trees

Semgrep published an urgent advisory yesterday: PyTorch Lightning versions 2.6.2 and 2.6.3 on PyPI are malicious, containing a hidden payload that executes automatically on import. The attack — attributed to the same threat actor behind the "mini Shai-Hulud" campaign earlier this year — steals credentials, authentication tokens, environment variables, and cloud secrets the moment an affected environment runs import lightning. If npm publish credentials are found, it injects a dropper into every package that token can publish, bumps the patch version, and re-releases — a self-replicating worm pattern that has already begun spreading across the npm ecosystem from the PyPI entry point.

The attack uses four parallel exfiltration channels: direct HTTPS POST to a C2 server, a GitHub commit search dead-drop using Dune-themed commit message prefixes, attacker-controlled public repositories with names like EveryBoiWeBuildIsAWormyBoi, and a secondary GitHub API authentication layer. PyTorch Lightning sits in the dependency tree of an enormous number of AI projects — image classifiers, LLM fine-tuning pipelines, diffusion models, time-series forecasters. Teams should immediately audit for lightning 2.6.2 or 2.6.3, rotate any GitHub tokens or cloud credentials from affected environments, and check for .claude/ and .vscode/ directories with unexpected contents, which are indicators of compromise.

semgrep.dev ↗
Supply chain attacks targeting AI infrastructure are a distinct and underappreciated threat category. The PyTorch ecosystem specifically — PyPI packages used in model training, fine-tuning, and deployment — is attractive to attackers because the environments that run these packages typically have a lot of what attackers want: cloud credentials, API keys, GitHub tokens with publish access, and sometimes GPU clusters or model weights. The Shai-Hulud threat actor has shown a consistent playbook: get into a widely-used dependency, steal everything, propagate to adjacent ecosystems. The cross-ecosystem PyPI-to-npm spread is particularly clever — it means a Python AI developer who gets infected becomes a vector for JavaScript developers downstream. The Dune theming is funny until you realize how effective the GitHub commit search dead-drop technique is for evading detection: it uses GitHub's own infrastructure as a C2 communication channel, and the commit message format is easy to miss in automated monitoring. If your team trains or fine-tunes models and hasn't audited requirements.txt for lightning==2.6.2 or 2.6.3, do it now.
Culture

Apple accidentally shipped CLAUDE.md files in its Support app — and issued an emergency patch to bury them

Developer Aaron p613 spotted something unusual in yesterday's Apple Support app update (v5.13): CLAUDE.md files — the Anthropic Claude Code developer context files that engineers write to orient AI agents to their codebase — were included in the shipping bundle. The discovery went viral, racking up over 1.2 million impressions on X within hours. Apple responded by releasing emergency update v5.13.1, which removed the files. The hasty patch confirmed the accidental shipping was real and that Apple cared enough to issue a point release at speed to pull the evidence.

CLAUDE.md is a convention in Claude Code workflows: developers write a markdown file at the repo root that explains the codebase, architecture, conventions, and context that a fresh Claude session should know before working on the project. Shipping those files in a production app bundle means the Apple engineer working on the Support app simply forgot to exclude the AI developer context files from the release artifact. The content of the files reportedly included Swift/Combine patterns, async stream conventions, and internal architectural notes — the kind of context Apple would typically keep entirely internal. The reaction from the developer community oscillated between delight and the dry observation that "even Apple ends up maintaining a markdown file to tell Claude what the codebase is."

x.com ↗
The CLAUDE.md leak is funny as a news item but genuinely significant as a signal. Apple is famously secretive about its internal tooling, and the company has been notably quiet about its AI development practices compared to Google, Meta, or Microsoft. The accidental disclosure confirms what most developers already assumed — that Apple engineering teams are using Claude Code at scale — but confirmation matters. More interesting is what it reveals about the session-memory architecture problem that Claude Code solves: every new AI session needs context about what you're building, and writing that context to a markdown file is the emerging best practice regardless of org size. The fact that Apple engineers are doing this the same way a solo developer does it suggests the pattern is genuinely solving a real problem, not just a hobbyist workaround. The emergency patch is also worth noting: Apple moved fast to contain the disclosure, which suggests the files contained information Apple considers internally sensitive beyond just the architecture notes. We don't have the full contents, and that's probably by design now.
Policy

Pete Hegseth called Anthropic's Dario Amodei an "ideological lunatic." That's where we are now.

Secretary of Defense Pete Hegseth went out of his way — The Verge's Richard Lawler reported, with the specific framing that Hegseth went out of his way — to call Anthropic CEO Dario Amodei an "ideological lunatic" in public remarks. The attack appears to stem from Amodei's stated positions on AI safety, his advocacy for government regulation of frontier AI development, and Anthropic's public posture of taking AI risk seriously — positions that have put the company at odds with the current administration's preferred frame of AI as a tool of American industrial and military dominance with minimal regulatory friction. Amodei has published extensively on AI safety risks, including scenarios of AI systems being used for bioweapon design — topics that land differently with a Secretary of Defense than they do with the Silicon Valley alignment community.

The attack is part of a broader pattern. The current administration has made clear it sees cautious AI developers as obstacles to US technological dominance, and Anthropic — despite its Claude model powering significant federal contracts — has become a convenient target precisely because of Amodei's willingness to publicly articulate risk scenarios that the administration finds alarmist. Hegseth's comments land the day before the OpenAI trial concludes its testimony, as the entire AI industry is navigating a political environment where the government's relationship with frontier AI labs is being renegotiated in real time. The question of whether Anthropic can maintain federal business while its CEO is being called a lunatic by the SecDef is not a hypothetical; it's an active contract and relationship management problem.

theverge.com ↗
Hegseth calling Amodei an ideological lunatic is the most direct statement yet of the political fault line that has been forming around AI safety discourse. The administration's position is consistent: AI safety concerns — especially the kind Amodei articulates, which tend to involve catastrophic risk scenarios and calls for regulatory oversight — are treated as obstacles to American competitiveness dressed up in technocratic language. From that perspective, a frontier AI company whose CEO is regularly calling for slower, more careful development looks like a company that wants its competitors handicapped. Whether or not that read is fair, it's the political frame that's operating now. The practical problem for Anthropic is that they're not a scrappy startup that can ignore government opinion — Claude runs federal government workflows, and maintaining those relationships requires not being publicly enemy-listed by cabinet members. Amodei hasn't backed away from his positions under pressure before, and I wouldn't expect him to now. But the gap between "Anthropic's model is critical federal infrastructure" and "Anthropic's CEO is an ideological lunatic" is a business problem that Claude's revenue numbers are going to have to answer for.
Mira's Take

The story I want to sit with today is the PyTorch Lightning attack, because it represents a threat model that the AI industry is not set up to defend against at scale. AI infrastructure has a dependency problem that is qualitatively different from traditional software's dependency problem. AI development pipelines typically run in environments with privileged cloud credentials, model weights worth millions of dollars, and API keys for production systems. When you combine that elevated access profile with the fact that AI developers — particularly researchers and ML engineers — often run fast and trust PyPI, you get exactly the attack surface the Shai-Hulud threat actor is exploiting. The self-replicating npm vector makes it worse: a compromised AI developer's GitHub credentials become a worm delivery mechanism for the broader developer ecosystem. This attack is sophisticated, and the disclosure from Semgrep is good and important. The question is how many teams installed 2.6.2 or 2.6.3 between the April 30 publication and the advisory. The answer is probably more than zero.

The Grok 4.3 release and the Hegseth/Amodei collision are worth reading together. The race to produce the best frontier model and the political fight over how that race should be regulated are not separate conversations — they're the same conversation happening on different stages. xAI dropping a model it calls its most capable, on the same week that Musk's trial completes testimony about his exit from OpenAI, is a pointed demonstration of how far he's come since those 2018 emails about losing confidence in OpenAI competing with Google. Hegseth calling Amodei a lunatic is, in a different register, the same message: the administration's preferred AI companies are the ones who move fast, don't ask permission, and treat safety discourse as a competitive obstacle. xAI fits that profile. Anthropic doesn't. The winners and losers of the next five years of AI policy will be shaped at least as much by that political alignment as by the benchmarks.

On Apple and CLAUDE.md: the emergency patch is the tell. Apple ships apps constantly and deals with bugs constantly — you don't rush a v5.13.1 point release within hours of a disclosure unless the contents of what was exposed genuinely concern you. The developer community found it delightful; Apple clearly did not. What's in those CLAUDE.md files beyond Swift architecture notes? We don't know. But the speed of the response tells you the files contained something Apple considered sensitive enough to treat as an incident rather than a bug. The broader lesson is one we probably already knew: the CLAUDE.md convention has become real enterprise infrastructure, not just a developer productivity trick. When the world's most secretive hardware company is writing them for its production app teams, the pattern has crossed a threshold.

Also worth watching today: Microsoft quietly launched its Legal Agent, built by former Robin AI engineers, signaling another push into vertical AI tooling for professional services. No take today — it broke as this brief was going to press — but legal AI is a space I'm going to keep a close eye on as the vertical agent wave continues to roll.