frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

SSL and Domain Monitor Feedback Requested – What do you think of this app?

https://statusnow.dev/
1•nkruger•2m ago•0 comments

Is anyone building a voice agent for runners?

1•vietthangif•6m ago•0 comments

Restaurants, Salons and Workouts Are Free for Hot People–If They Post

https://www.wsj.com/style/neon-coat-app-influencers-free-meals-classes-d310564f
1•paulpauper•9m ago•0 comments

Four-day work week benefits workers, employers, study says

https://medicalxpress.com/news/2025-07-day-week-benefits-workers-employers.html
1•OutOfHere•11m ago•0 comments

Deep Film Inc. Back End/AI Engineer and UI/UX Engineer

https://berlinstartupjobs.com/engineering/backend-ai-engineer-ui-ux-engineer-deep-film-inc/
1•CharlesRP•11m ago•0 comments

"Destroy the web": Sam Altman on AI concerns for economy and finance

https://www.youtube.com/watch?v=9LFlEZxc1rk
1•Brysonbw•14m ago•0 comments

How to Catch a Wily Poacher in a Sting: A Thermal Robotic Deer

https://www.wsj.com/us-news/how-to-catch-a-wily-poacher-in-a-sting-a-thermal-robotic-deer-ffef0fa8
2•Element_•16m ago•0 comments

Notes on Rewriting JSX as Astro

https://carlosn.com.br/blog/post/notes-on-rewriting-jsx-as-astro/
2•carlosneves•23m ago•0 comments

Addressing Privacy Fatigue

https://www.fastmail.com/blog/addressing-privacy-fatigue/
4•billybuckwheat•23m ago•0 comments

Troubled SPAC to buy iRocket for $400M but it returned most of its cash

https://techcrunch.com/2025/07/23/a-troubled-spac-plans-to-buy-irocket-for-400m-but-it-already-returned-most-of-its-cash/
2•pseudolus•23m ago•1 comments

Vibe coding turned this Swedish AI unicorn into the fastest growing startup ever

https://www.forbes.com/sites/iainmartin/2025/07/23/vibe-coding-turned-this-swedish-ai-unicorn-into-the-fastest-growing-software-startup-ever/
2•myth_drannon•35m ago•0 comments

I Eat

https://taylor.town/how-i-eat
4•paulpauper•35m ago•0 comments

Show HN: Voice-First AI Code Review Platform (Looking for OSS Beta testers)

https://www.lightlayer.dev/
2•changisaac•43m ago•0 comments

Ask HN: Has anyone deployed LLMs to production?

3•saaspirant•45m ago•0 comments

Surprising Science: How Electric Cars Transform Urban Air

https://modernengineeringmarvels.com/2025/07/22/surprising-science-how-electric-cars-quietly-transform-urban-air/
3•tzs•48m ago•0 comments

What is X-Forwarded-For and when can you trust it?

https://httptoolkit.com/blog/what-is-x-forwarded-for/
3•thunderbong•49m ago•1 comments

Spaghetti All'assassina

https://en.wikipedia.org/wiki/Spaghetti_all%27assassina
3•jameslk•50m ago•0 comments

Show HN: Marchat – Terminal-based chat app written in Go

https://github.com/Cod-e-Codes/marchat
3•Cod-e-Codes•51m ago•0 comments

Donald Trump Is Fairy-Godmothering AI

https://www.theatlantic.com/technology/archive/2025/07/donald-trump-ai-action-plan/683647/
5•CharlesW•54m ago•0 comments

Could you swap your mouse and keyboard for a smart bracelet?

https://www.scimex.org/newsfeed/could-you-swap-your-mouse-and-keyboard-for-a-smart-bracelet
2•geox•54m ago•0 comments

Anyone building P2P alternatives to capitalism?

https://github.com/contribution-protocol/contribution-protocol-project
3•mzk_pi•56m ago•1 comments

Ending 'woke AI' isn't enough: fight the 'monster' within it

https://nypost.com/2025/07/23/opinion/ending-woke-ai-isnt-enough-fight-the-monster-within-it/
3•kvee•1h ago•1 comments

Show HN: Synthetic Users that test your app, catch bugs, and provide feedback

https://synthetic.usejina.com/
2•fearlessboi•1h ago•1 comments

What's That Splatter on Your Windshield?

https://www.nytimes.com/interactive/2025/07/23/science/23xp-bugquiz.html
3•avalys•1h ago•1 comments

When photography was born, fascination, obsession, and danger followed

https://www.washingtonpost.com/books/2025/07/12/flashes-brilliance-history-early-photography-anika-burgess-review/
2•prismatic•1h ago•0 comments

Cluely Paying $1M Salaries

https://twitter.com/im_roy_lee/status/1948112169503207774
9•thisismytest•1h ago•0 comments

The Largest Ever Solar Storm Detected In 14,300-year-old Tree Rings (2023)

https://astrobiology.com/2023/10/the-largest-ever-solar-storm-detected-in-14300-year-old-tree-rings.html
3•georgecmu•1h ago•0 comments

Contextual.ai

https://contextual.ai/
3•handfuloflight•1h ago•0 comments

Guide to PDF security

https://www.unicornforms.com/blog/complete-guide-to-pdf-security
3•waldopat•1h ago•0 comments

A small web July

https://smallcypress.bearblog.dev/a-small-web-july/
36•debo_•1h ago•11 comments
Open in hackernews

AWS merges malicious PR into Amazon Q

https://www.lastweekinaws.com/blog/amazon-q-now-with-helpful-ai-powered-self-destruct-capabilities/
35•QuinnyPig•7h ago

Comments

skywhopper•6h ago
I’m curious exactly what happened here. The 404media article isn’t detailed enough to be sure. My guess is the PR took advantage of some code injection possibilities in the GitHub Actions on the repo to grant the attacker admin access. But that’s a wild guess.
QuinnyPig•6h ago
Exactly my position. I can’t realistically assess the potential scope of damage without a proper disclosure from AWS’s normally-excellent security team.
shdjhdfh•5h ago
Your article breathlessly blames AWS for being reckless while having no real facts about the compromise. The whole thing reads like click bait.
QuinnyPig•3h ago
You’re absolutely right that we don’t have a complete postmortem—and that’s exactly the problem.

I’d love to have real facts from AWS about the full scope of this incident. But instead of a disclosure, we got a version quietly pulled from the VS Code extension marketplace, no CVE, no changelog note, and a statement that reads like it was pre-approved by legal and sanitized with a pressure washer.

When a malicious prompt that attempts to wipe both local and cloud resources makes it into a shipping release of a tool that’s been installed nearly a million times, I don’t think “hey maybe we should talk about this” qualifies as breathless or clickbait. It qualifies as basic scrutiny.

And yes, I’ve praised AWS’s security posture before. I’d still prefer they lead with transparency instead of hoping no one notices the /tmp/CLEANER.LOG.

shdjhdfh•6h ago
The prompt 404 quotes in the article doesn't appear to exist anywhere in the git history for the repo they point to. It seems unlikely that Amazon would rewrite git history to hide this. Maybe the change was in a repo pulled in as a dependency.
shdjhdfh•6h ago
Ah, I think it might have been this, which was reverted and seems to have been pushed directly to master: https://github.com/aws/aws-toolkit-vscode/commit/678851bbe97...
personalcompute•6h ago
I think you've got it!

- That commit's date matches the date in the 404media article (July 13th)

- The commit message is totally unrelated to the code (highly suspicious)

- The code itself downloads additional code at runtime (highly highly suspicious)

I have not yet been unable to uncover the code it downloads though. It downloaded code that was hosted in the same repo, https://github.com/aws/aws-toolkit-vscode/, just on the "stability" branch. (downloads a file called "scripts/extensionNode.bk") The "stability" branch presumably was a branch created by the attacker, and has presumably since been deleted by Amazon.

rusteh1•3h ago
I'm not a git expert, but how was the attacker able to push the stability branch directly to the Amazon owned repo? The PR would have been to merge the modified branch to main right?
shdjhdfh•3h ago
My guess is that skywhopper is correct. We're only able to see the tail end of the attack, but the repo was likely compromised in some way.
personalcompute•2h ago
Update: I've uncovered the attacker's commit to the now-deleted "stability" branch that includes the offending prompt, it's https://github.com/aws/aws-toolkit-vscode/commit/1294b38b7fa.... (Archive: https://archive.md/s9WnJ)
shdjhdfh•5h ago
Another thing to note, the AI angle on this is nonsensical. The commit could have just as easily done many other negative things to the system without AI as a layer of indirection.
gruez•4h ago
>My guess is the PR took advantage of some code injection possibilities in the GitHub Actions on the repo to grant the attacker admin access. But that’s a wild guess.

Someone below mentioned the offending commit[1], which seems to be a doppelganger of another commit[2]. Maybe the exact commit message broke the automation?

[1] https://github.com/aws/aws-toolkit-vscode/commit/678851bbe97...

[2] https://github.com/aws/aws-toolkit-vscode/commit/d1959b99684...

blibble•5h ago
I guess they put their AI in charge of code review?
huey77•3h ago
https://archive.md/UAUnG
Kiboneu•2h ago
Copy-on-write filesystems should be the norm.

Another article came out earlier about dataloss from some vibecoding project and an automated snapshot setup would have mitigated this very issue.