frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

A Deep Dive into MCP and the Future of AI Tooling

https://a16z.com/a-deep-dive-into-mcp-and-the-future-of-ai-tooling/
1•emreb•1m ago•0 comments

Vibe coding ChatGPT apps [video]

https://www.youtube.com/watch?v=Zt-XNN1mxDA
1•ainiro•4m ago•0 comments

The Embarrassing Ruby/Rails Subreddit Chronicles 2025-10-09

https://andymaleh.blogspot.com/2025/10/the-embarrassing-rubyrails-subreddit.html
1•unripe_syntax•10m ago•0 comments

Database Client for Convex

https://pluk.sh
1•m2fauzaan•10m ago•0 comments

Show HN: Lo fi beats to vibe code to – infinite diffs and lo fi

https://vibecafe.briansunter.com/
1•bribri•12m ago•0 comments

Gemstone Software Design [video]

https://www.youtube.com/watch?v=oYxWHgO_Ogo
1•msuniverse2026•13m ago•0 comments

Easy Cloud Storage Solution for Individuals? – Try MeshDrive

1•hardikprl94•13m ago•0 comments

FramePack Studio

https://framepack.studio/
1•yuyu74189w•15m ago•0 comments

Vard – Zod-inspired prompt injection detection for TypeScript

https://github.com/andersmyrmel/vard
1•andersmyrmel•16m ago•0 comments

Parallelizing Cellular Automata with WebGPU Compute Shaders

https://vectrx.substack.com/p/webgpu-cellular-automata
3•ibobev•17m ago•0 comments

Show HN: Quick Share App:I built a app can share files via local Wi-Fi or LAN

https://quick-share.app/
2•jumpdong•18m ago•0 comments

More on Carmichael

https://www.johndcook.com/blog/2025/10/09/more-on-carmichael/
1•ibobev•18m ago•0 comments

Fermi Paradox Weakens

2•fym•21m ago•0 comments

Show HN: Pilot Kit – An all-in-one toolkit I built for private pilot training

https://air.club/
1•Michael9876•22m ago•0 comments

Instarid: Free and Add-Free Tool to Plan Your Instagram Feed

https://instagrid.siquemlabs.com/
1•theolouvel•23m ago•0 comments

H1: Bootstrapping LLMs to Reason over Longer Horizons via Reinforcement Learning

https://arxiv.org/abs/2510.07312
1•saynotocoffee•25m ago•0 comments

Truth-Aware Decoding: Program Logic for Factual LMs

https://arxiv.org/abs/2510.07331
2•HenryAI•27m ago•1 comments

US anti-fascism expert blocked from flying to Spain at airport

https://www.theguardian.com/us-news/2025/oct/09/anti-fascism-mark-bray-rutgers-university
4•saubeidl•30m ago•0 comments

Nobel Peace Prize 2025: Venezuelan Politician Maria Corina Machado

https://www.bbc.com/news/live/c1l80g1qe4gt
6•DDerTyp•33m ago•0 comments

Nobel Peace Prize 2025

https://www.nobelprize.org/prizes/peace/2025/machado/facts/
27•mitchbob•33m ago•0 comments

Microsoft hypes PCs with NPUs, still can't offer a good reason to buy one

https://www.theregister.com/2025/10/10/microsoft_npu_windows_opinion/
1•YeGoblynQueenne•34m ago•0 comments

Nobel Peace Prize 2025: María Corina Machado

https://www.nobelprize.org/prizes/peace/2025/summary/
69•pykello•34m ago•37 comments

Show HN: I invented a new generative model and got accepted to ICLR

https://discrete-distribution-networks.github.io/
2•diyer22•35m ago•0 comments

Nobel Peace Prize – María Corina Machado

https://www.nobelprize.org/prizes/peace/2025/press-release/
4•lode•36m ago•1 comments

Tangram for Linux Is a Browser Built for Web Apps

https://www.omglinux.com/tangram-web-app-browser-for-linux/
2•pickledoyster•36m ago•1 comments

Show HN: I extracted BASIC listings for Tim Hartnell's 1986 book

https://github.com/nzduck/hartnell-exploring-ai-book
1•nzduck•36m ago•0 comments

Heuristics Aren't Always a Good Thing: The Streetlight Effect

https://www.theolouvel.com/fieldnotes/Notions/Streetlight+Effect
1•theolouvel•39m ago•0 comments

The critical window of shadow libraries (2024)

https://annas-archive.org/blog/critical-window.html
1•huijzer•40m ago•0 comments

Live stream of comet flyby – 20th Octo 2025 17:30 UTC

https://www.virtualtelescope.eu/2025/10/08/comet-c-2025-a6-lemmon-c-2025-r2-swan-at-their-closest...
2•zh3•41m ago•0 comments

Datastar: Lightweight hypermedia framework for building interactive web apps

https://data-star.dev/
3•freetonik•51m ago•0 comments
Open in hackernews

The RubyGems "Security Incident"

https://andre.arko.net/2025/10/09/the-rubygems-security-incident/
124•semiquaver•6h ago

Comments

ChrisArchitect•6h ago
Related:

Rubygems.org AWS Root Access Event – September 2025

https://news.ycombinator.com/item?id=45530832

mbStavola•4h ago
One of the primary justifications given for the takeover was to secure the gems service and offer trustworthy stewardship. Reading this, I don't really get the sense that the new maintainers are really prepared to deliver on either.

That said, I really don't like the hand waving of the HTTP log thing in this post. Yeah sure, company names aren't as sensitive/radioactive as an SSN or an email, but selling usage data isn't exactly a noble endeavor.

I don't think anyone comes out of this looking good. Some are worse than others, sure, but this is just a mess from top to bottom.

plorkyeran•4h ago
My primary takeaway from all of this is that I do not want to be depending on infrastructure run by Ruby Central. Maybe it’ll turn out that the previous status quo was even worse and we just got incredibly lucky that it never exploded, but the people now running things have consistently failed to inspire confidence.
adamors•3h ago
That is my takeaway as well, this whole saga is a comedy of errors and the butt of the joke is the new RC.
darkwater•3h ago
> That said, I really don't like the hand waving of the HTTP log thing in this post

What "hand waving"? André explicitly mentioned he did not have any log or information.

mbStavola•2h ago
No but he was seeking it, from the email in the RubyCentral article and directly from TFA:

> I have no interest in any PII, commercially or otherwise. As my private email published by Ruby Central demonstrates, my entire proposal was based solely on company-level information, with no information about individuals included in any way.

Here Andre is downplaying his ask of the logs. Even if Andre didn't get them, the logs were desired. Had Ruby Central acquiesced the logs would've been parsed and sold. Might not be an issue for you but I am frankly not interested in having any data shared or sold like this.

darkwater•2h ago
Honestly, I can't really see what you are reading through the lines here. Are you by any chance involved with RubyGems / RubyCentral? In my case, I'm just a bystander and not even a Ruby developer (but I worked in a Ruby company in the past so I know the ecosystem).

EDIT: oh, you might be referring to the RubyCentral statement. I didn't read the original security incident text, so my bad here. Sorry.

mbStavola•1h ago
I am definitely not affiliated with either, moreso my opinion is considerably more negative of the new maintainers (both for the method of takeover and their handling of this incident). Quite frankly, I don't even know why you would even ask if I was.

I do not feel like I'm reading between any lines here-- Ruby Central directly showed that André Arko asked for the data to sell in order to cover the on-call fees. Yes, they have reason to smear him and shouldn't be trusted, but André confirms that he asked for the logs. None of that is up for debate, these are just the facts!

What we can argue about is 1) whether this is meaningfully different than what RC does already as noted by their ToS and 2) whether or not company names derived from the HTTP logs is sensitive or whatever. It is my position that neither André nor RC should be selling this sort of usage data, regardless of motivation. Personally I think the monetization of such data is bad in general, but I understand not everyone feels the same. It just gives me the ick.

EDIT: Immediately after submitting this, I saw that you issued a correction. Bad timing on my part I suppose!

Xylakant•2h ago
I don't even understand why RubyCentral included the proposal to use the log data in the post about a security incident. Whatever we may think of the proposal, the only purpose of including it in this place is to smear Andre.

The incident is clear cut and makes RubyCentral staff look incompetent. They cut off access to 1password and did not even consider that someone may have a copy of the credentials somewhere? As in "maybe in their head"? Rotating shared credentials in such a situation is security 101 and they failed. And when Andre notifies them that they failed, instead of quietly saying "Thanks, we've fixed that", they make it a security incident and include - without any further context - a single email from something that must have been a longer conversation.

bigiain•1h ago
> I don't even understand why RubyCentral included the proposal to use the log data in the post about a security incident.

Yeah you do. They're intentionally smearing him. (And they're no better at doing that than they are at security.)

mbStavola•1h ago
Without more details, it's hard for me to nail down the exact motivations at play here.

My current read is that RC majorly botched the takeover, demonstrated gaps in security know-how, and then retroactively framed everything as a problem with André. The details of the logs are mostly immaterial to the rest of the claims, but are still suspicious enough to spice up the announcement. I believe this because, at the moment, I don't see anything in the original RC post that wasn't satisfactorily explained by this post.

____mr____•1h ago
It was probably included as a motive for Andre to keep unauthorized access
deng•45m ago
> Had Ruby Central acquiesced the logs would've been parsed and sold.

Which the privacy policy of RubyCentral allows, so I don't get why they suddenly have ethical problems with that, apart of course from throwing shade on Andre. Parsing logs for company access is what basically everyone does, and frankly, I don't see the problem with getting leads from data like this. That has nothing to do with "selling PII".

bigiain•2h ago
They were all spitballing ideas about how to recover from the DHH-driven dropping of corporate sponsorship dollars, and how too keep the support lights on.

I think an offer of covering all the 2nd level support costs in return for the right - that Ruby Central's own T&Cs grant - to monetise company usage stats, is a reasonable offer.

The "other side's" alternative was to steal ownership and control of a whole bunch of volunteer gem authors work at the behest of a different corporate sponsor who was clearly demonstrating they wanted to be able to not only throw their weight around and force policies and priorities on RubyGems/RubyCentral, but also to make it personal by explicitly calling for long term contributors to be removed entirely on a whim.

tetha•1h ago
Mh, one of our security admins recently said something that's very fitting to the discussion: If you are removing an employee from a company, and you have to rely on their personal integrity instead of technical controls to avoid problems, you are doing very basic access control wrong. And if you're doing absolute fundamentals like that wrong, how much is your entire information security worth then?

And reading this, and the other disclosure from Ruby Central, they seem to be handling this maintainer/employee offboarding woefully incompetently at really, really basic levels. Obtaining control to secret management and doing a general secret rotation of management secrets isn't an obscure first step.

anon84873628•3h ago
In a comment under the submission for Ruby Central's post, I said Arko changing the AWS password was an inexcusable ethical violation.

This context does slightly soften my view, especially the part about multiple 1Password accounts being in play. However there is a big thing still missing to me... Why would Arko not immediately notify RC that he had changed the password due to these concerns?

If it was really a noble good faith action by the assigned on-call, giving a heads up to the remaining stakeholders would be the obligatory next step, no?

According to RC's timeline, the password reset happened on September 19, but Arko did not disclose the issue to RC until September 30. From what I can tell, he has not refuted that timeline or explained the gap.

bigiain•2h ago
To me it looks like he wasn't sure who was trustworthy at the time.

"The erratic and contradictory communication supplied by Marty Haught, and the complete silence from Shan and the board, made it impossible to tell exactly who had been authorized to take what actions. As this situation occurred, I was the primary on-call. My contractual, paid responsibility to Ruby Central was to defend the RubyGems.org service against potential threats. "

and

"Given Marty’s claims, the sudden permission deletions made no sense. Worried about the possibility of hacked accounts or some sort of social engineering, I took action as the primary on-call engineer to lock down the AWS account and prevent any actions by possible attackers."

and

"Within a couple of days, Ruby Central made an (unsigned) public statement, and various board members agreed to talk directly to maintainers. At that point, I realized that what I thought might have been a malicious takeover was both legitimate and deliberate, and Marty would never “fix the permissions structure”, or “follow up more” as he said. Once I understood the situation, I backed off to let Ruby Central take care of their “security audit”. I left all accounts in a state where they could recover access."

> According to RC's timeline, the password reset happened on September 19, but Arko did not disclose the issue to RC until September 30.

The password reset happened on September 19, and "within a few days" he realised it was an intentional/malicious takeover, and he walked away knowing they had the means to recover their own access - no longer his monkeys, no longer his circus. The 30 Sep date was when he was asked by someone if he still had access, and he discovered he did, and let them know immediately.

That all seems way more likely to be true and feels more plausible than anything Ruby Central has published over the last month or so...

rys•2h ago
He does explain it in his blog post. He changed it after the erratic communication and actions of RC leadership, then after realising what they were really doing, left them to complete their “security audit”, assuming they’d discover it themselves and take appropriate action as part of that. That never happened (which is wild), so he let them know.

They still don’t seem to be in complete control or understanding of the infrastructure they forcefully took control of.

mikeg8•2h ago
Ruby central looks so incompetent it’s not even funny. Bummer all around.
wgjordan•2h ago
I think the biggest missing piece in the opposing accounts of this incident is how exactly the production-access removal was communicated. There's a huge gap between how the two posts are framing the clarity of the communications that happened on Sept 18:

> September 18 2025 18:40 UTC: Ruby Central notifies Mr. Arko, via email, of the board’s decision to remove his RubyGems.org production access, and the termination of his on-call services.

> Marty Haught sent an email to the team within minutes, at 12:47pm PDT [19:47 UTC?], saying he was (direct quote) “terribly sorry” and “I messed up”. [...] the complete silence from Shan and the board, made it impossible to tell exactly who had been authorized to take what actions. As this situation occurred, I was the primary on-call.

André also mentioned that he disclosed further remaining production access a few days ago, on Oct 5. Looking forward to Ruby Central's followup post-incident review for this subsequent incident, which they failed to address or mention at all in their initial publication.

emmelaich•1h ago
So weird that Marty is using corporate speak to someone who I presume he's been working with for up to ten years.

All of them really, not just Marty H.

skywhopper•5m ago
Yeah, given that RC was willing to publish an email from Arko about an unrelated topic in their “security incident review”, it’s unfortunate they aren’t publishing how the access suspension was actually communicated to folks. Sounds like it was sudden enough and weird enough that Arko’s actions in response of locking down the AWS account were totally justified.
ethagnawl•2h ago
While I can't imagine how sad, stressful and confusing this all is for the people directly involved, it's also been hard to watch from the outside. For the past few years (decade, really) the community has been Ruby's biggest asset and seeing it torn apart like this is tragic.
lgleason•1h ago
Reading the tea leaves, I think this incident may have more to do with politics than it being a real incident per se.

For the past 10 years the Ruby community had been co-opted by political activists. Things like COC's and the Contributor Covenant etc. started in the Ruby community. The activists went after many top contributors in the community because of personal political beliefs etc, instead of behavior in the community itself. Some even called for ejecting DHH, the creator of rails, and Matz, the creator of the language, from the community.

When the Overton window finally stopped shifting to the left and started to move right, a lot of people who had remained quiet due to real threats of loss of business, work etc. finally started to speak up. DHH was one of them and has been very outspoken with his beliefs that open source software should be a-political and open to all instead of the political purity tests the activists were pushing.

From what I observed, when I was in involved in the Ruby community, Arko appeared to be a political activist. While there may have been an actual security concern here, my guess is that this had more to do with a desire to not have someone who may have been involved in trying to eject the top creators in the community being a point of failure for key infrastructure for the Ruby ecosystem.

watwut•1h ago
DHH is political activist, hardcore radical one. Always was. It is completely absurd how radical right wing gets labeled "apolitical" in these takes.
grim_io•1h ago
woah, got any references to back this up?

I've seen a lot of DHH content, and I'd never describe it as radical right wing.

noelwelsh•45m ago
Here's a right wing opinion: https://world.hey.com/dhh/as-i-remember-london-e7d38e64
jjgreen•1h ago
Cheerleading the fascist "Tommy Robinson" is not apolitical
noelwelsh•51m ago
Politics is unavoidable when groups of people get together, as politics is defined as how groups make decisions [1].

Therefore, "open source software should be a-political and open to all" is by definition both impossible (you cannot have a group without politics) and a political statement (as it is suggesting a decision making process.) Furthermore, don't mistake a conservative position (e.g. everything should stay the same) for an apolitical one.

[1]: For example:

> politics: “who gets what, where, when, and how”—the process for resolving disputes and allocating scarce resources"

https://openstax.org/books/introduction-political-science/pa...