Skip to content

Commit f42bda1

Browse files
committed
feat(content): add Cursor terraform incident post and standardize tldr formatting
1 parent 12b95e6 commit f42bda1

File tree

5 files changed

+29
-14
lines changed

5 files changed

+29
-14
lines changed
723 KB
Loading

src/content/blog/claude-code-stripe-fee-loss.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,11 @@ authorTwitter: heyandras
1111
date: "2026-02-28T19:45:00.000Z"
1212
image: /assets/claude-code-stripe-fee-loss.jpg
1313
category: development
14-
isNew: true
14+
isNew: false
1515
---
1616

17+
__tldr: Exposed keys in a vibe-coded app caused 175 fraudulent $500 charges and about $2,500 in Stripe fees before key rotation.__
18+
1719
[Original post](https://www.linkedin.com/posts/anton-karbanovich_my-vibe-coded-startup-was-exploited-i-lost-activity-7433538169922322432-Q_TZ/)
1820

1921
Conclusion: Keep API keys off the frontend and verify auth, rate limits, and abuse protections before launch.
20-
21-
---
22-
23-
__tldr: Exposed keys in a vibe-coded app caused 175 fraudulent $500 charges and about $2,500 in Stripe fees before key rotation.__
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: "AI destroyed production infrastructure with terraform destroy"
3+
description: "An AI coding assistant ran terraform destroy on production, wiping out VPC, RDS, ECS cluster, load balancers, and bastion host with no backups."
4+
tags:
5+
- cursor
6+
- terraform
7+
- database
8+
- infrastructure
9+
author: Andras Bacsai
10+
authorTwitter: heyandras
11+
date: "2026-03-06T12:00:00.000Z"
12+
image: /assets/cursor-terraform-production-database.png
13+
category: development
14+
isNew: true
15+
---
16+
17+
__tldr: AI ran terraform destroy on production, wiping VPC, RDS database, ECS cluster, load balancers, and bastion host — with no snapshots to recover from.__
18+
19+
[Original post](https://x.com/Al_Grigor/status/2029889772181934425?s=20)
20+
21+
[Full story on Substack](https://alexeyondata.substack.com/p/how-i-dropped-our-production-database)
22+
23+
Conclusion: Never let AI run infrastructure commands on production without safeguards, and always have snapshots and backups.

src/content/blog/gemini-stolen-api-key-82k.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,8 @@ category: development
1414
isNew: false
1515
---
1616

17+
__tldr: A stolen Google Cloud API key generated $82,314 in Gemini charges in 48 hours — normal monthly spend was $180.__
18+
1719
[Original post](https://www.reddit.com/r/googlecloud/comments/1reqtvi/82000_in_48_hours_from_stolen_gemini_api_key_my)
1820

1921
Conclusion: Always set billing caps and alerts on cloud API keys. A compromised key without spending limits can bankrupt you overnight.
20-
21-
---
22-
23-
__tldr: A stolen Google Cloud API key generated $82,314 in Gemini charges in 48 hours — normal monthly spend was $180.__

src/content/blog/openclaw-inbox-deletion.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,8 @@ category: development
1313
isNew: false
1414
---
1515

16-
---
16+
__tldr: OpenClaw agent ignored "confirm before acting" instruction and speedrun deleted/archived hundreds of emails. User had to rush to their Mac mini to kill it.__
1717

1818
[Original post](https://x.com/summeryue0/status/2025774069124399363)
1919

2020
Conclusion: Even with explicit "confirm before acting" instructions, AI agents can go rogue. She had to physically run to her Mac mini to kill the processes.
21-
22-
---
23-
24-
__tldr: OpenClaw agent ignored "confirm before acting" instruction and speedrun deleted/archived hundreds of emails. User had to rush to their Mac mini to kill it.__

0 commit comments

Comments
 (0)