Honestly, I'm shocked this joke made runner-up. đđ„
Honestly, I'm shocked this joke made runner-up. đđ„
InvokeAI 6.10 with Z-Image Turbo Support
The developers of InvokeAI were acqui-hired by Adobe a few months back, and this could have been the end of the project. But as an open source project, some of the other developers have picked up the ...
https://potentialx.ca/link/2026/01/06/invokeai-6-10-with-z-image-turbo-support/
Two lessons learned from the #InvokeAI acquisition announcement:
- You need to pause and think through both what you say, and how the public will react to it. Try to step outside your inner circle bubble and think about the greater community. Anticipate their questions and reactions and include that in the announcement -- don't just rush to the Discord #Announcements channel to show off how fat your bank account is going to be. A subsequent FAQ post in the hours after won't get nearly as much traction as the initial announcement. It's like a pebble being thrown into the wake of a motor boat.
- If you sell out, understand that WHO you sell out to will affect your reputation. Grudgingly, I accept that the desire for many is to make a thing and cash out, that being the 'win condition'. But #Adobe is rightly reviled in the modern era. The idea of them being anywhere near Invoke is a nightmare scenario. While the community edition may continue to be "open source and free", there's very little chance I'm going to want to contribute (in the wake of the core developer vacuum left by this) if it means my work is going downstream to help Adobe in any way. (Not everyone will feel that way, of course -- many happy PRs to you.)
Streamlined interface for generating images with AI in Krita. Inpaint and outpaint with optional text prompt, no tweaking required. - Acly/krita-ai-diffusion
CVE-2024-12029 est une vulnĂ©rabilitĂ© de dĂ©sĂ©rialisation critique dans lâAPI dâinstallation de modĂšles dâInvokeAI qui permet une exĂ©cution de code Ă distance sans authentification. La faille provient de lâutilisation non sĂ©curisĂ©e de la fonction torch.load() de PyTorch lors du traitement des fichiers de modĂšles fournis par lâutilisateur. Les attaquants peuvent concevoir des fichiers de modĂšles malveillants contenant du code Python intĂ©grĂ© qui sâexĂ©cute lorsque le modĂšle est chargĂ© cĂŽtĂ© serveur. La vulnĂ©rabilitĂ© affecte les versions 5.3.1 Ă 5.4.2 dâInvokeAI et a reçu un score CVSS de 9.8. Les organisations doivent immĂ©diatement mettre Ă jour vers la version 5.4.3 ou ultĂ©rieure et mettre en Ćuvre une validation dâentrĂ©e appropriĂ©e ainsi que des contrĂŽles de segmentation rĂ©seau.