News & Intel
LiveDaily AI-curated intelligence on Palantir Foundry, Ontology, AIP, Apollo, contracts, and community feedback. Updated automatically via GitHub Actions every day at 7 AM UTC.
[palantir/conjure-typescript] 5.12.0
Palantir's `conjure-typescript` library released version 5.12.0. This update primarily fixes an omission by adding the essential 'type' field to all generated `package.json` files.
Publikacja fałszywych twierdzeń nt. Palantira i Rządu Szwajcarskiego przez czasopismo Die Republik
A recent article falsely asserted Palantir aggressively sought Swiss government contracts and was unilaterally rejected due to ethical and technological concerns, misrepresenting a 2024 assessment. This refutation clarifies the narrative's falsehood, emphasizing it negatively impacts crucial discussions on European software modernization and tech procurement.
Securing Agents in Production (Agentic Runtime, #1)
Palantir AIP's Agentic Runtime provides an integrated toolchain for building, deploying, and managing AI agents in mission-critical environments. It features a robust security architecture that blends marking-, purpose-, and role-based policies, dynamic lineage across data and logic, and integrated change management for both human and agentic workflows.
[palantir/conjure-typescript] 5.13.0
Palantir's conjure-typescript version 5.13.0 has been released, primarily delivering a crucial fix. This update addresses a Gradle build issue by bumping the gradle-jdks dependency.
Managing and Securing VS Code Extensions at Scale
Editor’s Note: In this blog post, Palantir’s Information Security (InfoSec) team shares their approach to implementing a comprehensive VS Code extension management program, demonstrating practical solutions to a frequently overlooked attack vector. Introduction Integrated development environments (IDEs) serve as the primary interface for authoring code and managing infrastructure, sitting at the heart of every software company. Despite their ubiquity, it’s easy to overlook the security risks they present. Nearly every IDE user relies on extensions — familiar tools like code debuggers, git add-ons, and custom color themes that enhance productivity. However, these seemingly helpful extensions pose potentially disastrous risks to both individuals and enterprises. While information security teams often focus on securing web browsers and their extensions, the IDE ecosystem presents an equally significant but less scrutinized attack surface. At Palantir, we’ve successfully implemented en
Correcting the Record: Response to the EFF January 15, 2026 Report on Palantir
Palantir is responding to a January 15, 2026 report by the Electronic Frontier Foundation (EFF) concerning its work with Immigration and Customs Enforcement (ICE). Palantir refutes EFF's allegations, particularly claims about ICE using Palantir tools that feed on Medicaid data, labeling them misleading and incorrect.
How Palantir AIP Accelerates Data Migration
Palantir AIP accelerates complex enterprise data migrations by leveraging AI-accelerated workflows and maintaining complete contextual awareness throughout the lifecycle. This approach drastically reduces migration time from years to months, enabling rapid legacy system retirement and activation of new, supercharged data workflows.
Introducing PFCS Forward
PFCS Forward extends Palantir's "authorize once, use many" model, enabling hardware-agnostic IL5/IL6 authorization for integrated systems from cloud to on-premises and tactical edge environments. This reduces authorization overhead, accelerating the deployment of critical capabilities to warfighters by allowing compute power at the edge to mitigate latency and improve decision quality.