frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Knowledge of Organizational Operations Empowers and Alienates (2019) [pdf]

https://www.researchgate.net/publication/334063511_Moving_off_the_Map_How_Knowledge_of_Organizational_Operations_Empowers_and_Alienates
1•thunderbong•21s ago•0 comments

Show HN: Code Palettes – Free color theme generator for code and docs

https://www.codepalettes.com/
1•jakobhautop•2m ago•1 comments

"McKinsey in a Box": The End of Strategic Consulting?

https://knowledge.insead.edu/strategy/mckinsey-box-end-strategic-consulting
1•gfortaine•3m ago•0 comments

BCG models relocating Gazans to Somalia

https://www.ft.com/content/2206da63-4f50-4b74-9f1d-3cbf6b43e0e4
1•KnuthIsGod•11m ago•0 comments

Opensilvershowcase.com: A New Open-Source Hub for OpenSilver Developers

https://opensilvershowcase.com/
1•vasbu•11m ago•0 comments

Virtualbox.org Is Down

https://www.virtualbox.org/
1•dengolius•13m ago•1 comments

The secret to a good summer work party

https://www.ft.com/content/7d637f84-3a46-4bf8-956d-ff027fadfb76
1•woldemariam•14m ago•1 comments

New AI Coding Teammate: Gemini CLI GitHub Actions

https://blog.google/technology/developers/introducing-gemini-cli-github-actions/
1•michael-sumner•14m ago•0 comments

New GPU Software and IP Startup – OXPython for CUDA AI on Non-Nvidia GPUs

https://www.phoronix.com/news/Oxmiq-Labs
1•pjmlp•16m ago•0 comments

Perifractic Completes Commodore Acquisition Secured by Viewer Funding

https://www.guru3d.com/story/perifractic-completes-commodore-acquisition-secured-by-viewer-funding/
1•doener•18m ago•1 comments

Show HN: goforgo – Rustlings but for Learning Go

https://github.com/stonecharioteer/goforgo
1•stonecharioteer•19m ago•1 comments

Unicorn CEO: "IPO is not the goal" but maybe if you just worked a little harder

https://imgur.com/a/mI2HYIx
4•nowickcounter•19m ago•3 comments

China Revives Covid-Era Health Measures to Prevent Mosquito-Borne Virus

https://www.bloomberg.com/news/articles/2025-08-05/china-revives-covid-era-measures-to-battle-mosquito-borne-virus
2•mhga•20m ago•1 comments

Hackers Hijack Gemini AI with a Poisoned Calendar Invite, Take over a Smart Home

https://www.wired.com/story/here-come-the-ai-worms/
1•nokita•20m ago•0 comments

Rubio orders US diplomats to launch lobbying blitz against Europe's tech law

https://www.reuters.com/sustainability/society-equity/rubio-orders-us-diplomats-launch-lobbying-blitz-against-europes-tech-law-2025-08-07/
2•piva00•21m ago•0 comments

Musk pay goes up, Tesla results go down

https://apnews.com/article/tesla-musk-1abc89c2a3a4f36c376788d8cab99728
2•jqpabc123•21m ago•1 comments

Book: The inner workings of Large Language Models

https://leanpub.com/theinnerworkingsoflargelanguagemodels-howneuralnetworkslearnlanguage
1•sgt•24m ago•0 comments

Show HN: Screenbites – Share only part of your screen

https://screenbites.coolkit.app
1•qutek•25m ago•0 comments

Snowflake is ending password only logins. What is your team switching to?

https://old.reddit.com/r/dataengineering/comments/1mjnv2z/snowflake_is_ending_password_only_logins_what_is/
1•taubek•26m ago•0 comments

What Generative AI Reveals About the State of Software?

1•turkzilla•32m ago•0 comments

Plastic water bottle left in a hot car? Think twice before sipping from it

https://www.foxnews.com/food-drink/plastic-water-bottle-left-hot-car-think-twice-sipping-from
2•Bluestein•34m ago•0 comments

About AI

https://priver.dev/blog/ai/about-ai/
3•emil_priver•37m ago•0 comments

Show HN: Kubernetes Operator for Neon Postgres

https://molnett.com/blog/25-08-05-neon-operator-self-host-serverless-postgres
4•bittermandel•38m ago•0 comments

UK Deputy Prime Minister asks China to explain blanked-out embassy plans

https://www.bbc.co.uk/news/articles/ce932995ny2o
3•iamben•41m ago•0 comments

China asks Israel to lift siege on Gaza, renews push for independent Palestinian

https://www.aa.com.tr/en/asia-pacific/china-asks-israel-to-lift-siege-on-gaza-renews-push-for-independent-palestinian-state/3646017
5•mhga•48m ago•0 comments

Faced with £40B budget hole, UK public sector commits £9B to Microsoft

https://www.theregister.com/2025/08/07/uk_microsoft_spending/
2•nickcw•49m ago•0 comments

How Upsun built stateless mesh networking for high-density containers

https://devcenter.upsun.com/posts/how-upsun-built-stateless-mesh-networking-for-high-density-containers/
1•tlar•51m ago•0 comments

Covariant, Gauge-Invariant Metric-Based Gravitational-Waves in Numer. Relativity

https://arxiv.org/abs/2508.03799
1•raattgift•52m ago•0 comments

Thinking in Rust: Ownership, Access, and Memory Safety

https://cocoindex.io/blogs/rust-ownership-access/
1•badmonster•52m ago•0 comments

BRS-XSS – Professional XSS Scanner

1•easyprotech•52m ago•0 comments
Open in hackernews

Cracking the Vault: How we found zero-day flaws in HashiCorp Vault

https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
76•nihsy•2h ago

Comments

v5v3•2h ago
Fantastic work guys. Thank you.
maxall4•2h ago
Mmm AI writing gotta love it… /s
markasoftware•2h ago
it really does have that AI writing style, and these are the sorts of bugs I imagine an AI could have found...I wonder if that's what they did (though they claim it was all manual source code inspection).
darkwater•1h ago
Having the blog post explaining the findings written - or aided - by an AI doesn't necessarily mean that the findings themselves were found using AI.

Edit: even if the TLD they use is .ai and they heavily promote themselves as revolutionary AI security firm yadda yadda yadda

neomantra•38m ago
From reading it and mostly from the introduction, it felt like they rolled up their sleeves and really dug into the code. This was refreshing versus the vibe-coding zeitgeist.

I would be curious what AI tools assisted in this and also what tools/models could re-discover them on the unpatched code base now that we know they exist.

Cthulhu_•22m ago
I can imagine they could have used AI to analyze, describe and map out what exactly happens in the code. Then again, it's Go, following the flow of code and what exactly is being checked is pretty straightforward (see e.g. https://github.com/hashicorp/vault/blob/main/vault/request_h... which was mentioned in the article)
klas_segeljakt•2h ago
https://youtu.be/SbeNRICgzTA?si=YdLrozOEtCBTclW2
unwind•2h ago
This feels like a dupe of https://news.ycombinator.com/item?id=44821250.

Edit: replaced link with link to HN post, not the article in that post.

tiedemann•2h ago
TLDR: string parsing is hard and most of us are vulnerable to assumptions and/or never get around to do those fuzzy tests properly when checking that input is handled correctly.
compressedgas•1h ago
I don't see any parsing going on here. They failed to normalize the input values the way that the LDAP server does before applying rate limiting resulting in an effectively higher than expected login attempt rate limit.
procaryote•1h ago
A lot of these are on the pattern of normalising input as late as possible, which is an odd choice for a security product.
LtWorf•40m ago
I mean… it's hashicorp… did you expect sanity?

One of the vault backends has a size limit and so secret keys larger than 2048 bits would not fit. Amazing tool.

Cthulhu_•18m ago
I'd argue it's odd that they (or LDAP) normalise input in the first place. I can sort-of understand username normalization to avoid having both "admin" and "Admin" accounts, but that check only needs to be done when creating an account, when logging in it should not accept "Admin" as valid for account "admin".

But I'm neither a security person nor have I done much with authentication since my 2000's PHP hobbying. I suspect an LDAP server has to deal with or try and manage a lot of garbage input because of the sheer number of integrations they often have.

edoceo•1h ago
But does it affect Bao? Could test there since they are so closely related.
satoqz•1h ago
OpenBao maintainer here - The majority of these does affect us, more or less. Unfortunately it seems that we did not receive any prior outreach regarding these vulnerabilities before publication... make of that what you will. We've been hard at work the past days trying to get a security release out, which will likely land today.
Scandiravian•1h ago
Thanks for the great work and swift communication

I'm very disappointed to hear that the researchers did not disclose these findings to the OpenBao project before publishing them, so you now have to rush a release like this

Will you reach out to the researchers for an explanation after you've fixed the issues?

wafflemaker•1h ago
I can explain* researchers (and myself, though have nothing to do with it): We both learned about OpenBao today.

explanation ≠ excuse

Scandiravian•1h ago
Thank you for the explanation. It's obviously not great that this was missed, but finger-pointing now doesn't really help anyone, so I'll focus on what seems to me like the root issue

My impression is that there is an information gap about forked projects that lead to this issue

I'm on vacation right now, but when I'm back I'll try to setup a small site that lists forks of popular projects and maybe some information on when in time the project was forked

Hopefully something like that can make it more likely that these things are responsibly disclosed to all relevant projects

Scandiravian•1h ago
It sounds like these issues are from before the fork, in which case they will be

It also doesn't sound like the researchers made an effort to safely disclose these findings to the OpenBao project before publishing them, which I think would have been the right thing to do

procaryote•1h ago
> This default is 30 seconds, matching the default TOTP period. But due to skew, passcodes may remain valid for up to 60 seconds (“daka” in Hebrew), spanning two time windows.

Wait, why would I care this is "daka" in Hebrew? Is this a hallucination or did they edit poorly?

1a527dd5•1h ago
Yeah, it read slightly weird before I got to that point, and then it was obvious it was AI slop.
neom•1h ago
Maybe just being cute. Author is Yarden Porat from Cyata, an Israeli cybersecurity company.
tecleandor•47m ago
Also... what is "daka" ? 60 seconds? passcodes that remain valid for two time windows? I've been checking the dictionary and "daka" might mean "minute".
n4bz0r•13m ago
https://s3.amazonaws.com/LCG/40kconquest/ffg_WHK03_34.jpg
gtirloni•1h ago
Something feels odd reading the article. It's so verbose like it's trying to explain things like the reader is 5yo.
plantain•1h ago
AI written, or edited.
Cthulhu_•25m ago
I'd say edited, I did wonder if they used AI to find the issues in the first place but they would brag about that front and center and pivot to an AI-first security company within seconds. Then again, maybe they used AI to help them map out what happens in the code, even though it's Go code and should be pretty readable / obvious what happens.

That said, I think it's weird; the vulnerabilities seem to have been found by doing a thorough code review and comprehension, why then cut corners by passing the writeup through AI?

neom•1h ago
The post covers 9 CVEs May-June 2025 (Full chain from default user > admin > root > RCE):

CVE-2025-6010 - [REDACTED]

CVE-2025-6004 - Lockout Bypass https://feedly.com/cve/CVE-2025-6004

Via case permutation in userpass auth Via input normalization mismatch in LDAP auth

CVE-2025-6011 - Timing-Based Username Enumeration https://feedly.com/cve/CVE-2025-6011

Identify valid usernames

CVE-2025-6003 - MFA Enforcement Bypass https://feedly.com/cve/CVE-2025-6003

Via username_as_alias configuration in LDAP

CVE-2025-6013 - Multiple EntityID Generation https://feedly.com/cve/CVE-2025-6013

Allows LDAP users to generate multiple EntityIDs for the same identity

CVE-2025-6016 - TOTP MFA Weaknesses https://feedly.com/cve/CVE-2025-6016

Aggregated logic flaws in TOTP implementation

CVE-2025-6037 - Certificate Entity Impersonation https://feedly.com/cve/CVE-2025-6037

Existed for 8+ years in Vault

CVE-2025-5999 - Root Privilege Escalation https://feedly.com/cve/CVE-2025-5999

Admin to root escalation via policy normalization

CVE-2025-6000 - Remote Code Execution https://feedly.com/cve/CVE-2025-6000

First public RCE in Vault (existed for 9 years) Via plugin catalog abuse > https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vau...

neuralkoi•38m ago

    In non-CA mode, an attacker who has access to the private key of a pinned certificate can:

       Present a certificate with the correct public key

       Modify the CN in the client certificate to any arbitrary value

       Cause Vault to assign the resulting alias.Name to that CN
I agree that this is an issue, but if an attacker has access to the private key of a pinned certificate, you might have some bigger issues...
mike_hearn•31m ago
Impressive. It's worth reading despite the slight AI sheen to the writing, as it's unusually informative relative to most security articles. The primary takeaway from my POV is to watch out for "helpful" string normalization calls in security sensitive software. Strings should be bags of bytes as much as possible. A lot of the exploits boil down to trying to treat security identifiers as text instead of fixed numeric sequences. Also, even things that look trivial like file paths in error messages can be deadly.
progbits•23m ago
My take on the normalization is that it happens in the wrong place - you should not do it adhoc.

If your input from user is a string, define a newtype like UserName and do all validation and normalization once to convert it. All subsequent code should be using that type and not raw strings, so it will be consistent everywhere.