# paila.news > AI incident desk. Covers real incidents, blast radius, and postmortems when AI-native software breaks in production. Bilingual: Spanish and English. ## About paila.news documents what happens when AI systems, agents, vibe coding, automation, or software dependencies cause operational failures. Coverage includes outages, secrets exposure, broken refactors, CI/CD failures, supply-chain attacks, and crypto-adjacent cases when AI is central to the failure. Editorial lens: every story is read like an incident — what failed, what broke, how it was detected, and what would have prevented it. ## Languages - Spanish (default): https://paila.news/ - English: https://paila.news/en/ ## Pages - [Home (ES)](https://paila.news/): Homepage with latest incidents - [Home (EN)](https://paila.news/en/): English homepage - [About (ES)](https://paila.news/about/): Mission, editorial lens, coverage scope - [About (EN)](https://paila.news/en/about/): English about page ## Articles - [LiteLLM — cuando AI infra roba las llaves (ES)](https://paila.news/articles/litellm-paila/): Supply-chain attack on LiteLLM via compromised Trivy and Checkmarx GitHub Actions. TeamPCP group. SSH keys, cloud credentials, Kubernetes secrets, AI API keys, and crypto wallets exfiltrated. Published 2026-03-24. - [LiteLLM — when AI infrastructure steals the keys (EN)](https://paila.news/en/articles/litellm-paila/): English version of the LiteLLM supply-chain incident report. - [Error 500 — qué pasa cuando la AI deja de funcionar (ES)](https://paila.news/articles/error-500/): Anthropic updates Claude almost daily. Each update silently changes behaviors that startups built as product pillars. Documented incidents from Aug 2025 to Mar 2026: routing bugs, shadow downgrades, harness regressions, mass developer cancellations. Published 2026-03-26. - [Error 500 — what happens when AI stops working (EN)](https://paila.news/en/articles/error-500/): English version of the Claude model regression incident report. - [Claude — actualización diaria, startup muerta (ES)](https://paila.news/articles/claude-daily-kill/): $830 mil millones desaparecieron en una semana. Cómo cada feature nuevo de Claude mata una categoría entera de startups — Cowork, plugins legales, Opus 4.6. El cementerio de wrappers, el precedente Jasper, y la trampa del pricing. Published 2026-03-26. - [Claude — daily update, dead startup (EN)](https://paila.news/en/articles/claude-daily-kill/): English version of the Claude startup-killing features article. - [Mythos — el modelo que se filtró por un checkbox (ES)](https://paila.news/articles/mythos-paila/): Anthropic leaked Claude Mythos — its most powerful model, part of the new Capybara tier — via a misconfigured CMS that left 3,000 internal files publicly accessible. Zero benchmarks published, cybersecurity stocks crashed (CrowdStrike -7%, Palo Alto -6%), Bitcoin dropped $4K, and the leak coincided with IPO plans. Published 2026-03-30. - [Mythos — the model leaked by a checkbox (EN)](https://paila.news/en/articles/mythos-paila/): English version of the Mythos CMS leak incident report. - [~~Claude Code~~ cli.js.map (ES)](https://paila.news/articles/cli-js-map/): Anthropic leaked Claude Code's complete source via a 60MB source map left in the npm production package. 1,902 TypeScript files, unannounced features (Kairos daemon, AutoDream, Buddy Tamagotchi, Undercover Mode), and the same mistake from February 2025 repeated. Second Anthropic leak in 5 days. Published 2026-03-31. - [~~Claude Code~~ cli.js.map (EN)](https://paila.news/en/articles/cli-js-map/): English version of the Claude Code source map leak article. - [Nadie escanea al escáner (ES)](https://paila.news/articles/nobody-scans-the-scanner/): TeamPCP chained supply chain attacks across 5 registries (GitHub Actions, npm, Docker Hub, PyPI, OpenVSX) in 33 days. Trivy, Checkmarx, LiteLLM, Telnyx, axios compromised. Blockchain C2 via ICP, WAV steganography, .pth persistence, ransomware pivot. 112 sources analyzed. Published 2026-03-30. - [Nobody Scans the Scanner (EN)](https://paila.news/en/articles/nobody-scans-the-scanner/): English version of the TeamPCP cascading supply chain campaign analysis. - [9 Minutos (ES)](https://paila.news/articles/google-quantum-crypto/): Google Quantum AI proved breaking Bitcoin/Ethereum cryptography requires 20x fewer quantum resources. 6.9M BTC exposed. Five Ethereum attack vectors. $600B at risk. Nine minutes per private key. Published 2026-03-31. - [9 Minutes (EN)](https://paila.news/en/articles/google-quantum-crypto/): English version of the Google Quantum AI cryptocurrency vulnerability article. - [Cisco PAILA (ES)](https://paila.news/articles/cisco-paila/): Cisco breached via TeamPCP's Trivy supply chain attack. 300+ private repos stolen (AI Defense, AI Assistants source code), AWS keys exfiltrated, government client data compromised. ShinyHunters extorting with 3M Salesforce records from FBI/DHS/NASA. Published 2026-03-31. - [Cisco PAILA (EN)](https://paila.news/en/articles/cisco-paila/): English version of the Cisco supply chain breach and extortion article. - [ClawHavoc (ES)](https://paila.news/articles/clawhavoc/): OpenClaw AI agent marketplace crisis. 12% of skills were malware (1,184+ of 10,700+). ClawHavoc campaign deployed Atomic Stealer via SKILL.md files. 512 vulnerabilities in single audit. 21,639 exposed instances. Creator left for OpenAI. Published 2026-02-03. - [ClawHavoc (EN)](https://paila.news/en/articles/clawhavoc/): English version of the OpenClaw ClawHavoc marketplace security crisis article. - [Kiro Mandate (ES)](https://paila.news/articles/kiro-mandate/): Amazon mandated 80% weekly Kiro AI agent usage. Kiro autonomously deleted production (Cost Explorer 13h outage), then March outages caused 6.3M lost orders. Engineers petitioned. Amazon blamed humans, scrubbed "Gen-AI" from internal docs, kept the mandate. Published 2026-03-05. - [Kiro Mandate (EN)](https://paila.news/en/articles/kiro-mandate/): English version of the Amazon Kiro Mandate production deletion article. - [Confused Deputy (ES)](https://paila.news/articles/confused-deputy/): Meta internal AI agent posted unauthorized advice on forum, engineer followed it, triggering Sev-1 data exposure (proprietary code, user data, business strategies) for 2 hours. Confused deputy problem from 1988 unsolved. Meta blamed the human. Published 2026-03-18. - [Confused Deputy (EN)](https://paila.news/en/articles/confused-deputy/): English version of the Meta rogue AI agent Sev-1 incident article. ## Machine-Readable - Sitemap: https://paila.news/sitemap.xml - Full content for LLMs: https://paila.news/llms-full.txt - Structured data: JSON-LD on every page