Tech
OpenAI Is Asking Contractors to Upload Work From Past Jobs to Evaluate the Performance of AI Agents
OpenAI is asking third-party contractors to upload real assignments and tasks from their current or previous workplaces so that it can use the data to evaluate the performance of its next-generation AI models, according to records from OpenAI and the training data company Handshake AI obtained by WIRED.
The project appears to be part of OpenAI’s efforts to establish a human baseline for different tasks that can then be compared with AI models. In September, the company launched a new evaluation process to measure the performance of its AI models against human professionals across a variety of industries. OpenAI says this is a key indicator of its progress towards achieving AGI, or an AI system that outperforms humans at most economically valuable tasks.
“We’ve hired folks across occupations to help collect real-world tasks modeled off those you’ve done in your full-time jobs, so we can measure how well AI models perform on those tasks,” reads one confidential document from OpenAI. “Take existing pieces of long-term or complex work (hours or days+) that you’ve done in your occupation and turn each into a task.”
OpenAI is asking contractors to describe tasks they’ve done in their current job or in the past and to upload real examples of work they did, according to an OpenAI presentation about the project viewed by WIRED. Each of the examples should be “a concrete output (not a summary of the file, but the actual file), e.g., Word doc, PDF, Powerpoint, Excel, image, repo,” the presentation notes. OpenAI says people can also share fabricated work examples created to demonstrate how they would realistically respond in specific scenarios.
OpenAI and Handshake AI declined to comment.
Real-world tasks have two components, according to the OpenAI presentation. There’s the task request (what a person’s manager or colleague told them to do) and the task deliverable (the actual work they produced in response to that request). The company emphasizes multiple times in instructions that the examples contractors share should reflect “real, on-the-job work” that the person has “actually done.”
One example in the OpenAI presentation outlines a task from a “Senior Lifestyle Manager at a luxury concierge company for ultra-high-net-worth individuals.” The goal is to “Prepare a short, 2-page PDF draft of a 7-day yacht trip overview to the Bahamas for a family who will be traveling there for the first time.” It includes additional details regarding the family’s interests and what the itinerary should look like. The “experienced human deliverable” then shows what the contractor in this case would upload: a real Bahamas itinerary created for a client.
OpenAI instructs the contractors to delete corporate intellectual property and personally identifiable information from the work files they upload. Under a section labeled “Important reminders,” OpenAI tells the workers to “Remove or anonymize any: personal information, proprietary or confidential data, material nonpublic information (e.g., internal strategy, unreleased product details).”
One of the files viewed by WIRED document mentions an ChatGPT tool called “Superstar Scrubbing” that provides advice on how to delete confidential information.
Evan Brown, an intellectual property lawyer with Neal & McDevitt, tells WIRED that AI labs that receive confidential information from contractors at this scale could be subject to trade secret misappropriation claims. Contractors who offer documents from their previous workplaces to an AI company, even scrubbed, could be at risk of violating their previous employers’ non-disclosure agreements, or exposing trade secrets.
“The AI lab is putting a lot of trust in its contractors to decide what is and isn’t confidential,” says Brown. “If they do let something slip through, are the AI labs really taking the time to determine what is and isn’t a trade secret? It seems to me that the AI lab is putting itself at great risk.”
Tech
OpenClaw Users Are Allegedly Bypassing Anti-Bot Systems
In San Francisco, it feels like OpenClaw is everywhere. Even, potentially, some places it’s not designed to be. According to posts on social media, people appear to be using the viral AI tool to scrape websites and access information, even when those sites have taken explicit anti-bot measures.
One of the ways they are allegedly doing this is through an open source tool called Scrapling, which is designed to bypass anti-bot systems like Cloudflare Turnstile. While Scrapling, which was built with Python, works with multiple types of AI agents, OpenClaw users appear to be particularly fond of the software. On Monday, viral posts promoting Scrapling as a tool for OpenClaw users started to spread on X. Since its release, Scrapling has been downloaded over 200,000 times.
“No bot detection. No selector maintenance. No Cloudflare nightmares,” reads one viral post this week about the open source tool. “OpenClaw tells Scrapling what to extract. Scrapling handles the stealth.”
Cloudflare is not enthused. The company already blocked previous versions of Scrapling, since users of the open source software kept trying to get around anti-scraping protections. This week, the company was working on a patch for Scrapling’s most recent iteration. “We make changes, and then they make changes,” says Dane Knecht, chief technology officer at Cloudflare. He says the company’s trove of website data and its ability to track trends has given it the upper hand.
“We already had a signal that they’re starting to get a higher ability to get around us,” says Knecht. “The team of security operations engineers had already been working on a new set of mediations.”
Large language models were trained on the corpus of the internet—and the process involved a lot of scraping. In some sense, Scrapling users are following in the footsteps of the original model builders, but on a more individualized scale.
Over the past few years, website owners have attempted to put up additional anti-bot protections, either to block software like Scrapling or to find a way to make money off of the bots trying to access their sites. In turn, Cloudflare has been working overtime to keep blocking increasingly powerful bots attempting to get around these protections.
In July 2024, Cloudflare started to offer its customers additional tools that block AI crawlers, unless the bots pay for access. In less than the span of a year, the company claims to have blocked 416 billion unsolicited scraping attempts.
“I Didn’t Know What I was Getting Into”
As Scrapling gained traction in recent days, crypto enthusiasts capitalized on the attention by launching a $Scrapling memecoin. Karim Shoair, who claims to be the sole developer of Scrapling, posted about the memecoin on X (those posts have since been deleted). After the price skyrocketed for around five hours, $Scrapling quickly fell off a cliff as users sold off their stakes. “Bunch of fucking scammers,” reads one comment on the Pump.Fun site that hosts the coin.
“I didn’t know what I was getting into when people made that coin and I endorsed it,” says Shoair, in a direct message with WIRED. “But once I knew, I didn’t want any association with it and the money I withdrew before will go to charity, I won’t benefit from it in anyway. Or maybe just leave it to be wasted.”
In the fallout of this event, the unofficial GitHub Projects Community account, which has over 300,000 followers on X, deleted its posts from this week highlighting Scrapling’s open source software, and appeared to distance itself from the project. “We do not support, promote, or engage in crypto assets, token offerings, trading activity, or crypto-based fundraising,” it said in a post late Monday night.
Putting the crypto forays aside, most software leaders continue to see agents and autonomous AI tools as the future of the web. Even Knecht from Cloudflare, whose work includes blocking bots from nonconsensual scraping, wants to build toward a world where humans and agents benefit from online data and the wishes of website owners are respected. “I see a path forward for an internet that is both friendly to agents and humans,” he says.
This is an edition of Will Knight’s AI Lab newsletter. Read previous newsletters here.
Tech
The AirPods Pro 3 Are $20 Off
Looking for a new pair of earbuds to pair with your favorite iPhone or iPad? Right now, you can grab the Apple AirPods Pro 3 for just $229 on Amazon or Best Buy, a $20 break from their usual price. They’re our favorite wireless headphones for iPhone owners, with great noise-canceling, easy connectivity, and unique features like heart rate and live translation.
The active noise-canceling on the third generation AirPods Pro has improved a great deal, with our reviewer Parker Hall comparing them to the Bose QuietComfort Ultra 2 Earbuds when it comes to filtering out all but the highest frequency, loudest noises. The improved ear tips, now lined with foam, are more comfortable and fit better in smaller ears, with four different sizes to choose from. They also have better sound isolation, which improves the noise canceling and transparency mode performance noticeably.
While Android owners have a variety of choices when it comes to earbuds and headphones, iOS users will appreciate the extra features specifically built for anyone in the Apple ecosystem. If you’re into running with minimal devices, the AirPods Pro 3 can actually take your heart rate through your ears, a neat trick that we found surprisingly consistent with other fitness trackers. Another unique feature, live translation, will bring up the Translate app on iOS and relay what someone else is saying directly into your ears in your own language. Once again, we were impressed by how fast and accurate the system was, and as more languages are added it will become even more useful.
We really only had two minor complaints about the AirPods Pro 3, one of which was that the default EQ is a bit V-shaped, with a slightly overdone bass that’s either really appealing or slightly grating. Thankfully you can tweak your EQ in Spotify or Apple Music to dial in that experience. The other issue is that these have limited compatibility with Android devices, so if you’re on a Samsung or Pixel, you’ll want to check out our other favorite earbuds. For iPhone and iPad owners looking for the latest and greatest for their listening experience, the discounted AirPods Pro 3 are an excellent choice.
Tech
Cisco Catalyst SD-WAN users targeted in series of cyber attacks | Computer Weekly
The UK’s National Cyber Security Centre (NCSC) and its partner agencies in the Anglophone Five Eyes intelligence-sharing group have warned users of Cisco Catalyst Software Defined Wide Area Networks (SD-WAN) to take immediate action after identifying a cluster of threat activity targeting the widely used products.
The activity appears indiscriminate in its targeting, but the modus operandi is largely the same – following compromise, the as-yet-unnamed threat actors add a malicious rogue peer before conducting follow-on actions to achieve root access and maintain persistent access to the victim’s network.
“Our new alert makes clear that organisations using Cisco Catalyst SD-WAN products should urgently investigate their exposure to network compromise and hunt for malicious activity, making use of the new threat hunting advice produced with our international partners to identify evidence of compromise,” said NCSC chief technology officer (CTO) Ollie Whitehouse.
“UK organisations are strongly advised to report compromises to the NCSC, and to apply vendor updates and hardening guidance as soon as practicable to reduce the risk of exploitation,” he added.
The NCSC said the activity itself appeared to date back to 2023, and a series of vulnerabilities in Catalyst SD-WAN Manager and Catalyst SD-WAN Controller have now been patched by Cisco.
Chief among these issues, and of most concern to Cisco, is CVE-2026-20127, an authentication bypass vulnerability in Catalyst SD-WAN.
In an advisory, Cisco said the vulnerability arose due to a failure of the peering authentication mechanism on an affected system.
“An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric,” the supplier said.
“Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.”
Organisations with management interfaces exposed to the public internet appear to be at greatest risk of compromise – exposing management interfaces to the internet is extremely ill-advised.
Besides performing threat hunting for evidence of compromise as detailed in a newly-published Hunt Guide – available here – security teams should immediately update to the appropriate fixed latest versions of Catalyst SD-WAN Manager and Controller, and apply the Cisco Catalyst SD-WAN Hardening Guide now available from Cisco.
UK-based organisations that discover they may have been compromised are advised to immediately collect artefacts from the relevant device and report it to the NCSC.
In the US, the Cybersecurity and Infrastructure Security Agency (Cisa) has issued a parallel emergency directive instructing government organisations to take action by 23:59 EST (04:59 GMT) on Thursday 26 February, and to have fully applied the patches by 17:00 EST on Friday.
Threat actor targets CNI operators
Meanwhile, Cisco’s threat intel unit Talos has been tracking active exploitation of CVE-2026-20127, and has assigned the cluster the designation UAT-8616.
Talos said it was confident that UAT-8616 is a “highly sophisticated cyber threat actor” given the historical extent of its activity dating back to 2023, and additional investigation, which found that its hackers likely escalated to root user by downgrading the software version then exploiting another flaw – CVE-2022-20775 – in the Catalyst software command line interface (CLI) before restoring back to the original.
Talos said UAT-8616 demonstrated an ongoing trend of targeting network edge devices in order to establish beachheads at high-value organisations, such as operators of critical national infrastructure (CNI).
While it stopped short of attributing the activity outright, the targeting of utilities and similar organisations could indicate UAT-8616 is backed by a nation-state.
-
Entertainment1 week agoQueen Camilla reveals her sister’s connection to Princess Diana
-
Tech1 week agoRakuten Mobile proposal selected for Jaxa space strategy | Computer Weekly
-
Politics1 week agoRamadan moon sighted in Saudi Arabia, other Gulf countries
-
Entertainment1 week agoRobert Duvall, known for his roles in "The Godfather" and "Apocalypse Now," dies at 95
-
Business1 week agoTax Saving FD: This Simple Investment Can Help You Earn And Save More
-
Politics1 week agoTarique Rahman Takes Oath as Bangladesh’s Prime Minister Following Decisive BNP Triumph
-
Tech1 week agoBusinesses may be caught by government proposals to restrict VPN use | Computer Weekly
-
Fashion1 week agoAustralia’s GDP projected to grow 2.1% in 2026: IMF


