frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Unsolved Problems in MLOps

https://queue.acm.org/detail.cfm?id=3762989
1•aarghh•1m ago•0 comments

Show HN: A Cyberpunk Tuner

https://un.bounded.cc
1•hirako2000•3m ago•0 comments

Education in a Post Text World

https://anandsanwal.me/education-post-text-world/
1•herbertl•3m ago•0 comments

macOS 26 Tahoe review: Power under glass

https://sixcolors.com/post/2025/09/macos-26-tahoe-review-power-under-glass/
1•herbertl•4m ago•0 comments

Tips for Faster Rust Compile Times

https://corrode.dev/blog/tips-for-faster-rust-compile-times/
1•itzlambda•4m ago•0 comments

Bored Games

https://nik.art/bored-games/
1•herbertl•4m ago•0 comments

The Company Man

https://www.lesswrong.com/posts/JH6tJhYpnoCfFqAct/the-company-man
1•chlorokin•5m ago•0 comments

Delphi-2M LLM uses medical records, lifestyle to provide risks for 1k+ diseases

https://www.nature.com/articles/d41586-025-02993-x
1•rntn•5m ago•0 comments

Golang, JavaScript and C++ dancing together

https://github.com/sait/pdfmakego
1•igtztorrero•11m ago•1 comments

Aleph raises a $29M Series B to accelerate AI adoption in FP&A

https://www.getaleph.com/blog/series-b
1•mattkruk•12m ago•0 comments

Works in Progress is now in print

https://www.worksinprogress.news/p/works-in-progress-is-now-in-print
2•ortegaygasset•13m ago•0 comments

Microplastics May Trigger Alzheimer's-Like Brain Damage

https://scitechdaily.com/microplastics-may-trigger-alzheimers-like-brain-damage/
1•01-_-•13m ago•0 comments

Famous cognitive psychology experiments that failed to replicate

https://buttondown.com/aethermug/archive/aether-mug-famous-cognitive-psychology/
2•PaulHoule•15m ago•1 comments

The Case for an Iceberg-Native Database

https://www.warpstream.com/blog/the-case-for-an-iceberg-native-database-why-spark-jobs-and-zero-c...
1•ordinarily•17m ago•0 comments

Such a Classic

https://blog.hermesloom.org/p/debunking-the-myth-of-agi
1•sigalor•19m ago•0 comments

Smallest, Slimmest and Lightest Smartphones

https://phonesized.com/charts/
1•mgh2•19m ago•0 comments

Agent Process Intelligence – Map work and ground agents in reality

https://www.clearwork.io/clearwork-agent-process-intelligence
2•abrooks43•19m ago•1 comments

Show HN: AI Virtual Try-On and Garment Design Tool (No Login, Free)

https://tryon.aivory.space
1•aivoryZen•20m ago•0 comments

GuardDog is a CLI tool to Identify malicious PyPI and NPM packages

https://github.com/DataDog/guarddog
1•jmsmtn•24m ago•0 comments

Optimizing ClickHouse for Intel's 280 core processors

https://clickhouse.com/blog/optimizing-clickhouse-intel-high-core-count-cpu
3•ashvardanian•24m ago•0 comments

The "Debate Me Bro" Grift: How Trolls Weaponized the Marketplace of Ideas

https://www.techdirt.com/2025/09/17/the-debate-me-bro-grift-how-trolls-weaponized-the-marketplace...
36•toomanyrichies•24m ago•7 comments

TraceFind – Email Osint Information Gathering Tool – 300 Modules

https://tracefind.info/
1•codinglive•26m ago•0 comments

Chimps likely ingest equivalent of several alcoholic drinks every day

https://news.berkeley.edu/2025/09/17/in-the-wild-chimps-likely-ingest-the-equivalent-of-several-a...
2•geox•27m ago•0 comments

The Hacker Who Helped Score a $243M Verdict Against Tesla

https://www.pcmag.com/articles/hacker-who-helped-score-243-million-verdict-against-tesla
2•fortran77•28m ago•0 comments

Ask HN: How do you choose what phone to buy

1•snjy7•30m ago•2 comments

Fed delivers normal-sized rate cut, sees steady pace of further reductions

https://www.reuters.com/business/fed-delivers-normal-sized-rate-cut-sees-steady-pace-further-redu...
4•SilverElfin•33m ago•1 comments

AI's ability to displace jobs is advancing quickly, Anthropic CEO says

https://www.axios.com/2025/09/17/anthropic-amodei-ai
2•jmsflknr•33m ago•0 comments

LLMs can't solve production issues

https://clickhouse.com/blog/llm-observability-challenge
3•mikeshi42•34m ago•1 comments

Faster Rust Builds on Mac

https://nnethercote.github.io/2025/09/04/faster-rust-builds-on-mac.html
1•itzlambda•35m ago•0 comments

Marimo: Is building data apps easier now?

https://www.lovelydata.cz/en/blog/marimo-is-building-data-apps-easier-now/
1•lovelydata•35m ago•0 comments
Open in hackernews

Tinycolor supply chain attack post-mortem

https://sigh.dev/posts/ctrl-tinycolor-post-mortem/
69•STRiDEX•1h ago

Comments

drdrey•1h ago
> A while ago, I collaborated on angulartics2, a shared repository where multiple people still had admin rights. That repo still contained a GitHub Actions secret — a npm token with broad publish rights. This collaborator had access to projects with other people which I believe explains some of the other 40 initial packages that were affected.

> A new Shai-Hulud branch was force pushed to angulartics2 with a malicious github action workflow by a collaborator. The workflow ran immediately on push (did not need review since the collaborator is an admin) and stole the npm token. With the stolen token, the attacker published malicious versions of 20 packages. Many of which are not widely used, however the @ctrl/tinycolor package is downloaded about 2 million times a week.

I still don't get it. An admin on angulartics2 gets hacked, his Github access is used to push a malicious workflow that extracts an npm token. But why would an npm token in angulartics2 have publication rights to tinycolor?

STRiDEX•1h ago
Sorry if that wasn't clear. This was a token with global publish rights to my npm packages.
Scaevolus•51m ago
I was confused too. Was it your npm token stored in angulartics2 as a Github Actions secret, so it could publish new angulartics2 versions?
STRiDEX•47m ago
Yes, exactly.
tetha•1h ago
> But why would an npm token in angulartics2 have publication rights to tinycolor?

Imo, this is one of the most classical ways organizations get pwned: That one sin from your youth years ago comes to bite you in the butt.

We also had one of these years ago. It wasn't the modern stack everyone was working to scan and optimize and keep us secure that allowed someone to upload stuff to our servers. It was the editor that had been replaced years and years ago, and it's replacement had also been replaced, the way it was packaged wasn't seen by the build-time security scans, but eventually someone found it with a URL scan. Whoopsie.

Terr_•29m ago
Thinking of biology, the reason often given for the disappearance of "unused" genes is that there's a metabolic cost to keeping them around and copying them on every cell division.

I wonder if someday we'll find there's also an active process that resembles "remove old shit because it may contain security vulnerabilities."

rectang•1h ago
Two-factor auth for publishing is helpful, but requiring cryptographically signed approval by multiple authors would be more helpful. Then compromising a single author wouldn't be enough.
tcoff91•1h ago
Many packages have only 1 author.
chrisweekly•1h ago
and (as in this case), that 1 author may use a single token to authz publishing many packages
rectang•46m ago
The conclusion I'm coming to is that depending on packages which only have a single author is problematic. There are too many ways that packages published by one person can be compromised.

Packages which don't have approval and review by a reliable third party shouldn't be visible by default in a package manager.

Hackbraten•36m ago
How are you supposed to gain collaborators for a project that no one can possibly find?
rectang•32m ago
There are ways, but at a high level, I don't care. I hate how modern package managers have come to value author convenience over downstream user security.
bikeshaving•1h ago
> Local 2FA based publishing isn’t sustainable...

Why is local 2FA unsustainable?! The real problem here is automated publishing workflows. The overwhelming majority of NPM packages do not publish often enough or have complicated enough release steps to justify tokens with the power to publish without human intervention.

What is so fucking difficult about running `npm publish` manually with 2FA? If maintainers are unwilling to do this for their packages, they should reconsider the number of packages they maintain.

STRiDEX•1h ago
That's fair, I'm referring to the number of mistakes that happen with local publishing. Publishing the wrong branch, not building from latest etc
skydhash•32m ago
So add a wrapper for that, a quick script that checks which branch and revision you are publishing from. The issue here is publishing from a CI you do not control that well and with automated events.
paxys•23m ago
You can run the exact same script locally as you do in CI, with the only difference being the addition of a 2FA prompt.
indigodaddy•59m ago
Anyone know of a published tool/script to check for the existence of any of the vulnerable npm packages? I don't see anything like that in the stepsecurity page.
retlehs•2m ago
This won’t protect against everything, but it still seems like a good idea to implement:

https://github.com/danielroe/provenance-action

cyberax•58m ago
> exfiltrated a npm token with broad publish rights

I freaking HATE tokens. I hate them.

There should be a better way to do authentication than a glorified static password.

An example of how to do it correctly: Github as a token provider for AWS: https://aws.amazon.com/blogs/security/use-iam-roles-to-conne... But this is an exception, rather than a rule.

er4hn•45m ago
Well the idea behind tokens is that they should be time and authZ limited. In most cases they are not so they degrade to a glorified static password.

Solutions like generating them live with a short lifetime, using solutions like oauth w/ proper scopes, biscuits that limit what they can do in detail, etc, all exist and are rarely used.

chatmasta•43m ago
These machine-to-machine OIDC flows seem secure, and maybe they are when they’re implemented properly, but they’re really difficult to configure. And I can’t shake the feeling that they’re basically just “tokens with more moving parts,” at least for a big chunk of exploitation paths. Without a human in the loop, there’s still some “thing” that gets compromised, whether it’s a token or something that generates time-limited tokens.

In the case of this worm, the OIDC flow wouldn’t even help. The GitHub workflow was compromised. If the workflow was using an OIDC credential like this to publish to npm, the only difference would be the npm publish command wouldn’t use any credential because the GitHub workflow would inject some temporary identity into the environment. But the root problem would remain: an untrusted user shouldn’t be able to execute a workflow with secret parameters. Maybe OIDC would limit the impact to be more fine-grained, but so would changing the token permissions.

tetha•2m ago
Hence you need to start thinking about threat models and levels of compromise, even in your build system.

If I control the issuing and governance of these short-lived secrets, they very much help against many attacks. Go ahead and extract an upload token for one project which lives for 60 seconds, be my guest. Once I lose control how these tokens are created, most of these advantages go away - you can just create a token every minute.

If I maintain control about my pipeline definition, I can again do a lot of work to limit damage. For example, if I am in control, I can make sure the stages running untrusted codes have as little access to secrets as possible, and possibly isolate them in bubblewrap, VMs, ..., minimize the code with access to publishing rights. Once I lose control about the pipeline structure, all that goes away.

To me, this has very much raised questions about keeping pipeline definitions and code in one repository. Or at least, to keep a publishing/release process in there. I don't have a simple solution there, especially for OSS software with little infrastructure - it's not an easy topic. But with these supply chain attacks coming hot and fast every 2 weeks, it's something to think about.

undecidabot•33m ago
Trusted publishing is a thing now for many package registries, including npm: https://github.blog/changelog/2025-07-31-npm-trusted-publish...
skydhash•27m ago
As another sibling have put it, it probably should be short lived or behind a manual verification (passphrase, 2fa,…)