frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Tell HN: Security Incident at Porter (YC S20)

5•leetrout•6h ago
Hug ops to the team. Justin is great and I know they have to be stressed from all of this.

Email I got from Porter follows, trimmed for HN character limit. Full text at https://gist.github.com/leetrout/2d172d2b95e8d24af0f3de0d0b03561e

---

What happened

On April 13th, 2026, the Porter team detected unauthorized activity originating from a stale AWS access key in our infrastructure. Upon detection, we immediately revoked all affected credentials and engaged our incident response processes, which included a comprehensive investigation.

Since April 13th, we have seen no further evidence of unauthorized activity within Porter networks and systems. Working closely with Cloudflare and Amazon, we have substantially completed the investigation of our environment and are continuing to prioritize supporting customers in their response efforts.

We have determined that the threat actor operated between 03:23 UTC April 11, 2026 and 15:24 UTC April 13, 2026. During this window, the threat actor leveraged IAM role chaining from Porter's infrastructure to access 21 customer cloud accounts. A few customers within the targeted group confirmed successful retrieval of on-cluster secrets. For these users, we currently have no evidence that secrets were abused or that other actions were taken beyond secret retrieval through this role chain. In particular, there was no evidence of any unauthorized modification of customer infrastructure for any of these users. Via the same initial access, the threat actor accessed credentials for the Porter GitHub App. Working with the GitHub team, we learned that requests were made to GitHub API endpoints for some users. We have since received confirmation that three customer repositories were cloned. User-configured Helm overrides and credentials for Porter integrations, including Slack and AI integrations for a limited number of users, were also exposed. All users with such credentials were directly informed this week.

[snip]

In the days since, we have:

Rotated all remaining Porter AWS access keys, including those not known to be affected Deployed additional logging and monitoring across all Porter AWS accounts Established endpoint detection and response, additional real-time alerting, an incident response retainer, and 24x7 monitoring with an outside security firm

Further restricted ingress network traffic

Engaged Cloudflare, Latacora, and AWS to audit our configurations

We will cover the full scope of our ongoing remediation, including elimination of long-lived access keys, least-privilege enforcement, role chaining restrictions, and expanded threat detection in a detailed write-up to follow.

What Porter customers should do

We have communicated tailored action items to all customers based on their levels of exposure. The following general steps apply to everyone:

Review GitHub activity logs

[snip]

Key events to look for:

Unexpected repository clones ("git.clone" events)

New deploy keys or SSH keys added to repositories

OAuth application authorizations you don't recognize

Changes to branch protection rules or webhook configurations

Rotate third-party credentials

Rotate credentials for any Porter integrations, including Slack, alerting services, and AI support, that have not been updated since April 14, 2026.

Engage a security firm if needed

[snip]

What comes next

The incident resulted from a stale, overprivileged access key. Our remediation is focused on eliminating the conditions that made this compromise possible, not just the specific vector that was exploited.

We will share a detailed write-up in the coming weeks covering our remediation and ongoing efforts to harden our infrastructure. We also intend to establish regular transparency updates on our security posture moving forward.

[snip]

Gmail label bridge on Claude Cowork just broke

4•mangoe•5h ago•2 comments

Do I Stop Learning Coding? DSA?

4•s_u_d_o•4h ago•9 comments

Ask HN: Building a solo business is impossible?

35•fnoef•20h ago•57 comments

Stop using naive RAG – adding relationships to AI context

3•eduardobenck•5h ago•0 comments

Ask HN: Who is using OpenClaw?

333•misterchocolat•2d ago•374 comments

Tell HN: Security Incident at Porter (YC S20)

5•leetrout•6h ago•0 comments

Tell HN: Fiverr left customer files public and searchable

819•morpheuskafka•3d ago•230 comments

Ask HN: How do you search the web programmatically these days?

2•coreyp_1•9h ago•3 comments

Tell HN: 48 absurd web projects – one every month

75•absurdwebsite•1d ago•25 comments

Ask HN: Teaching life skills through games, am I crazy?

2•shivaniShimpi_•11h ago•2 comments

Ask HN: How do you maintain flow when vibe coding?

29•fny•1d ago•29 comments

Ask HN: Getting depressed day by day, how to cope?

15•throwaw12•16h ago•14 comments

Ask HN: How did you get your first users with zero audience?

14•arikusi•1d ago•8 comments

Aliens.gov Resolves – To a WordPress "Site Not Found" Error

11•ascarola•1d ago•5 comments

Ask HN: How do you find motivation to do stuff?

24•RockstarSprain•2d ago•22 comments

Ask HN: How are you using LLMs in production?

8•Anon84•1d ago•10 comments

Advice for tracking down a listening device?

8•comrade1234•1d ago•5 comments

Opus 4.7 is horrible at writing

16•limalabs•1d ago•19 comments

Ask HN: Who is your favourite Entrepreneur/Visionary?

13•wasimsk•1d ago•31 comments

Durable Object alarm loop: $34k in 8 days, zero users, no platform warning

27•thewillmoss•2d ago•2 comments

Ask HN: How are you actively keeping your thinking sharp while using LLMs daily?

12•smonk108•1d ago•10 comments

Tell HN: Anthropic no longer allows you to fix to specific model version

25•baobabKoodaa•2d ago•2 comments

Ask HN: Is Claude Getting Worse?

9•sahli•2d ago•19 comments

Ask HN: How to highlight talent from untraditional backgrounds?

6•etherus•1d ago•4 comments

Ask HN: As an Australian, is it possible to get a remote US role?

4•apatheticonion•2d ago•8 comments

GitHub gave webhook secrets away in webhook call

12•time4tea•3d ago•1 comments

Ask HN: SeedLegals Partnerships in London, worth it?

2•pain_perdu•1d ago•1 comments

Ask HN: LeetCode, anyone still doing it?

19•kwar13•3d ago•14 comments

Tell HN: GitHub might have been leaking your webhook secrets. Check your emails.

43•ssiddharth•3d ago•12 comments

Any engineers here with experience of clinical data standards?

2•kalturnbull•2d ago•0 comments