tHeReS nO cReAtIvItY iN aI aRt 🙄

#aiart #invokeai

Honestly, I'm shocked this joke made runner-up. đŸ˜‰đŸ„š

https://www.instagram.com/p/DW4GlQSD1Ad/

#invokeai #aiart #arresteddevelopment #easter

InvokeAI 6.10 with Z-Image Turbo Support

The developers of InvokeAI were acqui-hired by Adobe a few months back, and this could have been the end of the project. But as an open source project, some of the other developers have picked up the ...

https://potentialx.ca/link/2026/01/06/invokeai-6-10-with-z-image-turbo-support/

#invokeai

Two lessons learned from the #InvokeAI acquisition announcement:

- You need to pause and think through both what you say, and how the public will react to it. Try to step outside your inner circle bubble and think about the greater community. Anticipate their questions and reactions and include that in the announcement -- don't just rush to the Discord #Announcements channel to show off how fat your bank account is going to be. A subsequent FAQ post in the hours after won't get nearly as much traction as the initial announcement. It's like a pebble being thrown into the wake of a motor boat.

- If you sell out, understand that WHO you sell out to will affect your reputation. Grudgingly, I accept that the desire for many is to make a thing and cash out, that being the 'win condition'. But #Adobe is rightly reviled in the modern era. The idea of them being anywhere near Invoke is a nightmare scenario. While the community edition may continue to be "open source and free", there's very little chance I'm going to want to contribute (in the wake of the core developer vacuum left by this) if it means my work is going downstream to help Adobe in any way. (Not everyone will feel that way, of course -- many happy PRs to you.)

Full announcement.

#aiart #invokeai #adobe

Welp, that was fun while it lasted... fuck #Adobe.

EDIT: The immediate response is, as expected.

#aiart #invokeai

A tool for #InvokeAi and to manage your images. / Un outils pour InvokeAi et gérer vos créations. #ia #ai #stablediffusion #flux #Invoke
GitHub - LuqP2/local-image-browser-for-invokeai https://github.com/LuqP2/local-image-browser-for-invokeai
GitHub - LuqP2/local-image-browser-for-invokeai

Contribute to LuqP2/local-image-browser-for-invokeai development by creating an account on GitHub.

GitHub
After a long time of using Microsoft Copilot/Designer as my primary AI image generator, I set up #InvokeAI on my desktop this afternoon to try out local image generation and editing.
Fan ou pas de l'IA, cet outil pour #Krita ringardise #Adobe #Photoshop. MĂȘme #InvokeAI ne doit pas faire mieux. Je vais tester ça rapidement, c'est local. (Compatible Linux/MacOS/Windows) L'Open source met une grosse claque Ă  Adobe #Firefly.
https://github.com/Acly/krita-ai-diffusion?tab=readme-ov-file
GitHub - Acly/krita-ai-diffusion: Streamlined interface for generating images with AI in Krita. Inpaint and outpaint with optional text prompt, no tweaking required.

Streamlined interface for generating images with AI in Krita. Inpaint and outpaint with optional text prompt, no tweaking required. - Acly/krita-ai-diffusion

GitHub
📱 VulnĂ©rabilitĂ© critique de dĂ©sĂ©rialisation dans l'API d'installation de modĂšles d'InvokeAI
📝 **CVE-2024-12029** est une vulnĂ©rabilitĂ© de dĂ©sĂ©rialisation critique dans l'API d'installation de modĂšles d'**InvokeAI** qui permet une **exĂ©c...
📖 cyberveille : https://cyberveille.ch/posts/2025-07-18-vulnerabilite-critique-de-deserialisation-dans-l-api-d-installation-de-modeles-d-invokeai/
🌐 source : https://www.offsec.com/blog/cve-2024-12029/
#CVE_2024_12029 #InvokeAI #Cyberveille
Vulnérabilité critique de désérialisation dans l'API d'installation de modÚles d'InvokeAI

CVE-2024-12029 est une vulnĂ©rabilitĂ© de dĂ©sĂ©rialisation critique dans l’API d’installation de modĂšles d’InvokeAI qui permet une exĂ©cution de code Ă  distance sans authentification. La faille provient de l’utilisation non sĂ©curisĂ©e de la fonction torch.load() de PyTorch lors du traitement des fichiers de modĂšles fournis par l’utilisateur. Les attaquants peuvent concevoir des fichiers de modĂšles malveillants contenant du code Python intĂ©grĂ© qui s’exĂ©cute lorsque le modĂšle est chargĂ© cĂŽtĂ© serveur. La vulnĂ©rabilitĂ© affecte les versions 5.3.1 Ă  5.4.2 d’InvokeAI et a reçu un score CVSS de 9.8. Les organisations doivent immĂ©diatement mettre Ă  jour vers la version 5.4.3 ou ultĂ©rieure et mettre en Ɠuvre une validation d’entrĂ©e appropriĂ©e ainsi que des contrĂŽles de segmentation rĂ©seau.

CyberVeille