frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Abusing Entra OAuth for fun and access to internal Microsoft applications

https://research.eye.security/consent-and-compromise/
59•the1bernard•2h ago

Comments

gjsman-1000•1h ago
Now remember these dimwits are bragging that 30% of their code is now written by AI; and have mandated Microsoft Accounts, set up OneDrive backup by default, and are providing infrastructure to OpenAI who is currently required to preserve even deleted chats. They also own LinkedIn.

This totally has no foreseeable potential consequences. It would be a real shame if some foreign hostile government with nuclear weapons managed to connect MS Account, LinkedIn Profile, and OpenAI accounts together by shared emails and phone numbers. Is it really worth starting a war for the crime of depantsing the nation?

jychang•24m ago
To be fair, I’m pretty sure the code here was written before modern AI was a thing, back when dinosaurs roamed the earth.
gjsman-1000•23m ago
Yes, but Microsoft hasn’t put together that AI making mistakes, is perfect plausible deniability for intentional “mistakes.”
muststopmyths•54m ago
Move to the cloud they said. It will be more secure then your intranet they said. Only fools pay for their own Ops team they said.

I’m so old and dumb that I don’t even understand why an app for internal Microsoft use is even accesible from outside its network.

jameskilton•51m ago
The last decade has seen an increase push in what Google started calling "Zero Trust"[0] and dropping VPNs entirely. The issue being that once someone got into a VPN it was much, much harder to prevent them from accessing important data.

So everything "internal" is now also external and required to have its own layer of permissions and the like, making it much harder for, e.g. the article, to use one exploit to access another service.

[0] https://cloud.google.com/learn/what-is-zero-trust

ronbenton•47m ago
Does having a VPN/intranet preclude zero trust? It seems you could do both with the private network just being an added layer of security.
AWebOfBrown•40m ago
It doesn't, but from my perspective the thinking behind zero trust is partly to stop treating networking as a layer of security. Which makes sense to me - the larger the network grows, the harder to know all its entry-points and the transitive reach of those.
nicce•42m ago
I don’t see that really as an argument for this. You still should use VPN as an additional layer of security, assuming that you use some proper protocol. Then zero trust applies to internal network.
gjsman-1000•41m ago
Rule #1 of business, government, or education: Nobody, ever, ever, does what they “should.”

Even here: Hacker News “should” support 2 factor authentication, being an online forum literally owned by a VC firm with tons of cash, but they don’t.

glitchc•9m ago
The zero trust architechture implies (read: requires) that authentication occurs at every layer. Token reuse constitutes a replay attack that mandatory authentication is supposed to thwart. Bypass it and the system's security profile reverts back to perimeter security, with the added disadvantage of that perimeter being outside your org's control.
medhir•32m ago
ohhhh the gifts multi-tenant app authorization keeps giving!

(laid off) Microsoft PM here that worked on the patch described as a result of the research from Wiz.

One correction I’d like to suggest to the article: the guidance given is to check either the “iss” or “tid” claim when authorizing multi-tenant apps.

The actual recommended guidance we provided is slightly more involved. There is a chance that when only validating the tenant, any service principal could be granted authorized access.

You should always validate the subject in addition to validating the tenant for the token being authorized. One method for this would be to validate the token using a combined key (for example, tid+oid) or perform checks on both the tenant and subject before authorizing access. More info can be found here:

https://learn.microsoft.com/en-us/entra/identity-platform/cl...

reactordev•15m ago
Assume every token is forged. Secure by default. Even if it wastes cpu, validate each and every field. Signatures only work if verified. While you're at it, validate it against your identity database as well. Double check, triple check if you must. This is what I taught my devs.

Tenant, User, Group, Resource - validate it all before allowing it through.

therein•29m ago
Did he really get no bounties out of this? The guy found a way into build boxes retail Windows is built on, potentially found the private key that would be used to generate license keys, likely could have dived in a little bit more after getting RCE on the build box to exfil the latest Windows 11 source code. He even found a way to issue rewards. They still gave him nothing?

Show HN: Hacker5News is now web available

https://hacker5news.duckdns.org/
1•lafalce•2m ago•0 comments

Where Are They? (2008)

https://nickbostrom.com/papers/where-are-they/
1•doughnutstracks•6m ago•0 comments

Efficient Strategies for Microglia Replacement in the Central Nervous System

https://www.sciencedirect.com/science/article/pii/S2211124720310263
1•bookofjoe•9m ago•0 comments

Show HN: AI Coloring Pages Generator

https://www.colori.io/
1•iliaddh•13m ago•1 comments

EPA Registers Novel(dsRNA) Pesticide Technology for Potato Crops

https://www.epa.gov/pesticides/epa-registers-novel-pesticide-technology-potato-crops
1•bookmtn•19m ago•0 comments

Nanowhisker glue uses ultrasound to form resilient bonds

https://phys.org/news/2025-07-naturally-sourced-nanowhisker-ultrasound-resilient.html
1•PaulHoule•20m ago•0 comments

Just Buy Nothing: A fake online store to combat shopping addiction

https://justbuynothing.com/
4•Improvement•21m ago•0 comments

Tiny Awards 2025 voting is now open

https://tinyawards.net/
1•CharlesW•23m ago•0 comments

Musicians do not demonstrate long-believed advantage in processing sound

https://www.michiganmedicine.org/health-lab/musicians-do-not-demonstrate-long-believed-advantage-processing-sound
1•geox•24m ago•1 comments

GPT-5: Overdue, overhyped and underwhelming. And that's not the worst of it

https://garymarcus.substack.com/p/gpt-5-overdue-overhyped-and-underwhelming
49•kgwgk•26m ago•13 comments

Interactive UI Components for Django using Htmx

https://github.com/edelvalle/djhtmx
1•8organicbits•27m ago•0 comments

Steve Wozniak's Perforated Pads of $2 Bills

https://www.coinbooks.org/esylum_v18n36a40.html
3•CharlesW•28m ago•3 comments

Ask HN: How do you pronounce "gradlew"?

1•higgins•30m ago•2 comments

Show HN: Connective, Back to the Roots

https://www.connective-app.com
1•joacon•30m ago•0 comments

Fitness Landscape

https://baku89.com/2021/01/10/fitness-landscape
2•mrcgnc•34m ago•1 comments

The Welfare Costs of Low-Friction Idea Production

https://www.gojiberries.io/costs-of-llms/
1•neehao•37m ago•0 comments

From GPT-2 to GPT-OSS: Analyzing the Architectural Advances

https://magazine.sebastianraschka.com/p/from-gpt-2-to-gpt-oss-analyzing-the
1•mdp2021•46m ago•0 comments

Show HN: PromptMap – map .NET solutions into AI-friendly context

https://github.com/christopherdkeith/prompt-map
1•chrisdkeith•51m ago•0 comments

The End of Violence: Why it is a disease and how it can be cured (2026)

https://www.penguin.co.uk/books/454978/the-end-of-violence-by-slutkin-gary/9781911709121
1•rendx•52m ago•1 comments

California man's plane keeps getting stolen, taken, repaired and returned

https://www.the-independent.com/news/world/americas/crime/california-plane-stolen-returned-mystery-b2804617.html
1•CharlesW•53m ago•1 comments

About SimulateAI (Quick Overview)

https://www.youtube.com/watch?v=xtl52SQiSuI
2•CitizenOfEarth•57m ago•0 comments

Your LLM Knows the Future

https://machinelearning.apple.com/research/prediction-potential
3•birriel•58m ago•0 comments

Prompt injection engineering for attackers: Exploiting GitHub Copilot

https://blog.trailofbits.com/2025/08/06/prompt-injection-engineering-for-attackers-exploiting-github-copilot/
1•agentictime•1h ago•0 comments

Roo Code Workflow: An Advanced LLM-Powered Development Setup

https://gist.github.com/livecodelife/6c97dc64ee1a12687a554ada9dd579dd
1•indigodaddy•1h ago•0 comments

Suitely – Your C-Suite, Reimagined by AI

https://suitely.prisen.co/
3•virgildotcodes•1h ago•2 comments

Keep the Terminal Relevant: Patterns for AI Agent Driven CLIs – InfoQ

https://www.infoq.com/articles/ai-agent-cli/
1•rbanffy•1h ago•0 comments

The rise of the AI native employee

https://www.elenaverna.com/p/the-rise-of-the-ai-native-employee
1•Jun8•1h ago•0 comments

How Streamplace Works: No Microservices

https://blog.stream.place/3lvyv4tkh622f
2•iameli•1h ago•0 comments

Show HN: Math4Fun – Generate kids' math worksheets from their favorite topics

https://app.math4fun.io
1•johngorse•1h ago•0 comments

GPTs and Feeling Left Behind

https://whynothugo.nl/journal/2025/08/06/gpts-and-feeling-left-behind/
11•Bogdanp•1h ago•1 comments