frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Revocation of Validated End-User Authorizations in China for Intel, Samsung, SK [pdf]

https://public-inspection.federalregister.gov/2025-16735.pdf
1•impish9208•2m ago•0 comments

FTC claims Gmail filtering Republican emails threatens "American freedoms"

https://arstechnica.com/tech-policy/2025/08/ftc-claims-gmail-filtering-republican-emails-threaten...
2•morkalork•2m ago•0 comments

Moving Fast vs. Root Cause Culture – How Teams Grow

https://codecube.net/2025/8/team-series-root-cause/
1•CodeCube•2m ago•1 comments

UN human rights staff urge leadership to declare Israel's war in Gaza a genocide

https://www.theguardian.com/world/2025/aug/29/un-human-rights-staff-urge-leadership-to-declare-is...
1•NomDePlum•2m ago•0 comments

JPMorgan Restricts Employees from Using ChatGPT

https://www.wsj.com/articles/jpmorgan-restricts-employees-from-using-chatgpt-2da5dc34
4•1vuio0pswjnm7•2m ago•0 comments

Show HN: Build a SaaS Website Using Nano Banana (Free Tier Included)

https://nanobananaimage.app/
1•tanduorou•4m ago•0 comments

Short History of the Business Card, from Versailles to Microsoft Word

https://themalin.co/journal/the-casual-archivists-short-history-of-the-business-card/
2•ChrisArchitect•7m ago•0 comments

GenAI Misinformation, Trust, & News Consumption-Evidence from a Field Experiment

https://www.nber.org/papers/w34100
1•malshe•7m ago•0 comments

Building a Yolox Plate Detector: Setup, Fine-Tuning, Metrics, Dashcam Inference

https://www.youtube.com/watch?v=xPJqoX0EYKE
1•alvises•7m ago•1 comments

How Many Iconic Computing Numbers Can You Recognize?

https://numbers.arhan.sh/
1•Voklen•7m ago•0 comments

Steam Adding UK Age Verification via a credit card as a payment method

https://help.steampowered.com/en/faqs/view/292B-3DA3-CFC8-97F6
2•speckx•8m ago•0 comments

US to stop Palestinians attending UN meeting in New York

https://www.bbc.com/news/articles/cjdym32z9v7o
2•abdusco•9m ago•1 comments

Simply read for pleasure to optimize well being

https://arnoldspumpclub.com/blogs/newsletter/the-15-minute-daily-habit-that-reduces-stress-by-68
1•DaveZale•9m ago•0 comments

Were B.C. teen's remains missed because coroner attended site virtually?

https://globalnews.ca/news/11353655/coroner-missed-bodies-osoup/
2•rolph•9m ago•0 comments

IBM and AMD on Hybrid Classical-Quantum Supercomputers

https://www.nextplatform.com/2025/08/27/ibm-and-amd-tag-team-on-hybrid-classical-quantum-supercom...
1•timlatim•14m ago•0 comments

Microsoft says recent Windows update didn't kill your SSD

https://www.bleepingcomputer.com/news/microsoft/microsoft-says-recent-KB5063878-windows-update-di...
5•kPwn•16m ago•0 comments

Effective Writing for Software Developers

https://refactoringenglish.com
1•gtirloni•16m ago•0 comments

Mitsubishi-led groups to withdraw from three offshore wind projects in Japan

https://www.reuters.com/business/energy/mitsubishi-led-groups-withdraw-three-offshore-wind-projec...
3•CGMthrowaway•16m ago•0 comments

Show HN: A one-click Read.CV alternative

https://www.heyhunter.com/
1•phemartin•17m ago•0 comments

Plants you wear: LivingLoom weaves seeds into textiles

https://news.cornell.edu/stories/2025/05/plants-you-wear-livingloom-weaves-seeds-textiles
1•ohjeez•18m ago•0 comments

Is AI a "Normal Technology"?

https://www.oreilly.com/radar/is-ai-a-normal-technology/
1•thinkingemote•19m ago•0 comments

Deputy Director

https://www.fsf.org/resources/jobs/fsf-deputy-director
1•infognu•20m ago•0 comments

The promise that wasn't kept

https://whitep4nth3r.com/blog/the-promise-that-wasnt-kept/
1•antondd•21m ago•0 comments

List of Shibboleths

https://en.wikipedia.org/wiki/List_of_shibboleths
2•klaussilveira•21m ago•0 comments

LazyLog: A New Shared Log Abstraction for Low-Latency Applications [pdf]

https://ramalagappan.github.io/pdfs/papers/lazylog.pdf
1•PaulHoule•22m ago•0 comments

Cooperation and the evolution of hunter-gatherer storytelling

https://www.nature.com/articles/s41467-017-02036-8
1•cjbarber•23m ago•0 comments

Way to Advertise a Language

https://www.stylewarning.com/posts/write-programs/
1•Bogdanp•24m ago•0 comments

Ask HN: I made a new kind of AI, how do I make money from it?

1•ikishade•24m ago•6 comments

A review of 19B passwords reveals people are still bad at them

https://mashable.com/article/password-study-data-bad-19-billion
1•ohjeez•25m ago•0 comments

Lessons 'unlearned': 20 years after Katrina, disaster readiness lags in the US

https://www.aljazeera.com/news/longform/2025/8/29/lessons-unlearned-20-years-after-katrina-disast...
3•Qem•26m ago•0 comments
Open in hackernews

Tell HN: Crazy sloppiness in X.com Content Security Policy

4•plehoux•2h ago
TL;TR Just uncovered a backdoor into http://X.com’s stack... or more likely some giant sloppiness.

First let's define CSP, Content Security Policy. In simple terms, CSP is a browser-side firewall: it lets websites tell the browser exactly which domains it may load scripts, images, or exchange data with; blocking rogue code and data leaks. In my book, it’s one of the greatest inventions of the modern web.

When configured well, CSP can make your web app practically immune to XSS and data exfiltration.

A few weeks ago I was pondering if allowing “.yourdomain.com” or “.thirdparty.com” wildcards in CSP was risky, especially if you run side projects on sub-domains. A marketing microsite left to rot for years, with user upload capability could become an attacker’s exfil gateway.

Curious, I wondered how the big players handled their CSP. Were they whitelisting entire subdomain trees? I opened the dev console. First check: X… and to my surprise, I found hundreds of domains in their CSP.

I pasted the list into Grok and asked it to flag anything suspicious, and indeed, it found a few "connect-src" directives whitelisting three SnappyTV sub-domains, an old video product Twitter shut down in 2019.

The gotcha is that the domain expired in 2023 and is now controlled by unrelated third party pushing Korean casino ads. (see screenshots here https://x.com/plehoux/status/1961170683439853875)

That means if the new owner of this domain is a bad actor, with the right XSS, they can exfiltrate data from X, all with CSP's blessing.

I reported the finding through X's bug-bounty program. Their verdict: “best practice, not a vulnerability.” Maybe true in isolation, but still crazy they are not cleaning the mess (reported 45 days ago).

“Not exploitable today” can become “critical tomorrow” when conditions align.

I mean X threat model must include state actors...

I would suggest a business to:

1. Never let any business domain name expire. 2. Have their most conspiracist developer review their CSP on a recurring basis.

I'm crazy or, shouldn't this be fixed ASAP?

Comments

yyyk•1h ago
You're not crazy, and they should fix it. But remember the web existed before CSP was ubiquitous and plenty of sites still don't use it (even though they should). It's a very important defense but not the only one. You've identified something that could be the first step in a hack - but it doesn't necessary mean there is a hack.