Advertisement Β· 728 Γ— 90

Posts by Dominik Kundel

Thank you 😊

1 year ago 2 0 0 0
Preview
Dominik Kundel on LinkedIn: It's surreal to write this after almost 9 years, but today is my last day… | 22 comments It's surreal to write this after almost 9 years, but today is my last day at Twilio. It's been an unbelievable ride and I'm so grateful for all the… | 22 comments on LinkedIn

It's absolutely surreal but today is my last day at Twilio after almost 9 years and it's been a wild ride that I will forever be grateful for ❀️

www.linkedin.com/posts/dkunde...

1 year ago 9 0 1 0
Picture of the wait times at SFO with general queue being 8 minutes and TSA Precheck 10 minutes.

Picture of the wait times at SFO with general queue being 8 minutes and TSA Precheck 10 minutes.

SFO is the only airport I know where Precheck has a longer line than regular security πŸ˜…

1 year ago 13 0 0 0

πŸ“Œ

1 year ago 8 0 0 0

Incredible photos πŸ‘πŸ‘

1 year ago 7 0 1 0

Happy "unsubscribe from all the stores you didn't know you still consented to getting marketing emails from" day πŸ˜„

1 year ago 5 0 0 0

For example labelers like the Pronoun labeler or the GitHub Contributor labeler are fun:
bsky.app/profile/pron...

1 year ago 3 0 1 0

Bluesky is an excellent rabbit hole of potential πŸ˜‚

1 year ago 1 0 1 0
Advertisement

I just use the pinned feed :) it's not great but works πŸ˜…

blueskydirectory.com/feeds/pins

1 year ago 1 0 1 0

Hi, so I've spent the past almost-decade studying research uses of public social media data, like e.g. ML researchers using content from Twitter, Reddit, and Mastodon.

Anyway, buckle up this is about to be a VERY long thread with lots of thoughts and links to papers. 🧡

1 year ago 964 452 59 123

I love the concept of building real apps with real users. Building apps like Twilio Barista was one of the best ways for me to learn all the edge cases of our products and also try products I hadn't tried yet.

1 year ago 5 0 0 0

Have you looked into custom feeds yet? They are great as well! I love the Quiet Posters one for example and I love that you can build your own

1 year ago 1 0 1 0

I love the house analogy!

1 year ago 1 0 0 0

πŸ’Έ No. 10 - Unbounded Consumption

Unrestricted LLM usage can lead to denial-of-service attacks or excessive costs.

πŸ” Mitigation tips: Implement rate limits, monitor resource usage, and throttle requests.

1 year ago 0 0 0 0

πŸ€₯ No. 9 - Misinformation

LLMs may propagate false or harmful content from biased or unverified sources.

πŸ” Mitigation tips: Use fact-checking workflows and curate trusted data sources.

1 year ago 0 0 1 0

πŸ”’ No. 8 - Vector and Embedding Weaknesses

Unsecured embeddings may expose models to poisoning or unauthorized access.

πŸ” Mitigation tips: Encrypt embeddings, validate inputs, and restrict database access.

1 year ago 0 0 1 0
Advertisement

πŸ” No. 7 - System Prompt Leakage

Exposure of system prompts can reveal application logic or sensitive information.

πŸ” Mitigation tips: Avoid storing sensitive data in prompts; encrypt or obfuscate key instructions.

1 year ago 0 0 1 0

πŸͺ“ No. 6 - Excessive Agency

Granting too much autonomy to LLMs can enable harmful or unintended actions.

πŸ” Mitigation tips: Limit permissions, add user oversight, and enforce action constraints.

1 year ago 0 0 1 0

🀝 No. 5 - Improper Output Handling

Unsanitized outputs can lead to XSS, SQL injection, or system-level attacks.

πŸ” Mitigation tips: Sanitize outputs and enforce encoding based on context (HTML, SQL, etc.).

1 year ago 0 0 1 0

☠️ No. 4 - Data and Model Poisoning

Compromised datasets or tampered models lead to biased outputs or hidden backdoors.

πŸ” Mitigation tips: Vet datasets, track transformations, and validate outputs against trusted sources.

1 year ago 0 0 1 0

⛓️ No. 3 - Supply Chain Risks

Third-party dependencies or tampered models can introduce vulnerabilities in LLMs.

πŸ” Mitigation tips: Audit dependencies, enforce provenance checks, and validate model integrity.

1 year ago 0 0 1 0

🀐 No. 2 - Sensitive Information Disclosure

LLMs can leak private data or proprietary information via crafted queries or poor sanitization.

πŸ” Mitigation tips: Mask sensitive data, restrict access, and monitor logs for leaks.

1 year ago 0 0 1 0

πŸ’‰ No. 1 - Prompt Injection

Attackers manipulate LLM prompts to alter behavior, bypass security, or gain unauthorized control.

πŸ” Mitigation tips: Use input validation, output constraints, and enforce principle of least privilege.

1 year ago 0 0 1 0
LLMRisks Archive - OWASP Top 10 for LLM & Generative AI Security

The new @owasp.org 2025 Top 10 Risk & Mitigations for LLMs and Gen AI Apps was released and there are some great updates in there! Highly recommend giving it a read.

If you are strapped for time, check the thread 🧡 for a short summary on each.

genai.owasp.org/llm-top-10/

1 year ago 2 0 1 0
Advertisement

Moin

1 year ago 1 0 0 0

You should turn them into a starter pack as well so it's easier for people to follow them πŸ™‚

1 year ago 0 0 0 0

A bummer! I will see you at re:invent then I assume πŸ™‚

1 year ago 1 0 1 0

Aw man I was going to come but ended up getting last minute concert tickets. Are you going to AI Tinkerers on Thursday?

1 year ago 0 0 1 0
Preview
How AI Agents Will Reshape Your Growth Marketing Strategy Twilio posts cloud communications trends, customer stories, and tips for building scalable voice and SMS applications with Twilio's APIs.

If you are looking for a written version instead check out my blog post on the Twilio blog about the same topic:

www.twilio.com/en-us/blog/a...

1 year ago 0 0 0 0
Twilio AI Assistants
Twilio AI Assistants YouTube video by AI User Group

My talk from the "AI for Marketers" User Group just went live! In it I cover what an AI Agent is and how agents will change different aspects of Growth Marketing and Marketing at large.

youtu.be/2gU72m_kyAo?...

1 year ago 2 0 1 0