frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Grounding with Google Maps: Now Available in the Gemini API

https://blog.google/technology/developers/grounding-google-maps-gemini-api/
2•gfortaine•4m ago•0 comments

Retinal Implant Restores Central Vision in Patients with Advanced AMD

https://www.upmc.com/media/news/102025-retinal-implant
1•bcye•4m ago•1 comments

Claude Code Sandboxing

https://www.anthropic.com/engineering/claude-code-sandboxing
1•strzalek•4m ago•0 comments

More streaming video is bad

https://www.slowboring.com/p/more-streaming-video-is-bad
1•cjbarber•6m ago•0 comments

Adherence of traffic-related particles to human red blood cells in vivo

https://publications.ersnet.org/content/erjor/early/2025/09/04/2312054100767-2025
1•PaulHoule•7m ago•0 comments

China claims America is biggest bit burglar

https://www.theregister.com/2025/10/20/china_accuses_us_cyber_warfare/
1•elsewhen•8m ago•0 comments

I turned my CV into an AI chatbot

https://iamluismarcos.com/
1•thunderbong•9m ago•0 comments

Elixir-like pipes in Ruby (oh no not again)

https://zverok.space/blog/2024-11-16-elixir-pipes.html
1•bmacho•10m ago•0 comments

Aegaeon: Effective GPU Pooling for Concurrent LLM Serving on the Market

https://dl.acm.org/doi/pdf/10.1145/3731569.3764815
1•vigneshv59•10m ago•0 comments

Figma is reporting service disruptions

https://status.figma.com
2•ffb7c5•10m ago•0 comments

Bitcoiners for Privacy

https://njump.me/nevent1qqsvu5xv9r3f9nvsdtns38hps5yq3flnlsusuwfdwp0cvnngncgn2jqpz3mhxue69uhhyetvv...
1•VanHoy•11m ago•1 comments

The internet just had another major global outage. Why does this keep happening?

https://www.rnz.co.nz/news/world/576516/the-internet-just-had-another-major-global-outage-why-doe...
4•billybuckwheat•12m ago•0 comments

How to train your team to say "I was wrong" without drama

https://leadthroughmistakes.substack.com/p/how-to-train-your-team-to-say-i-was
1•birdculture•12m ago•0 comments

Show HN: A Fast JSON Formatter

https://github.com/usebruno/fast-json-format
2•helloanoop•17m ago•0 comments

All Things Open Has More in Store for 2025, Including an Added Measure of AI

https://fossforce.com/2025/10/all-things-open-has-more-in-store-for-2025-including-an-added-measu...
1•amcclure•17m ago•0 comments

People are using AI to talk to God

https://www.bbc.com/future/article/20251016-people-are-using-ai-to-talk-to-god
3•BeetleB•18m ago•2 comments

Why Do Grains Defy Gravity? [video]

https://www.youtube.com/watch?v=F2M2aRXI8lc
1•rzk•21m ago•0 comments

Carving a Niche in the Cloud: The Modal Approach

https://middlelayer.substack.com/p/carving-a-niche-in-the-cloud-the
1•logan1085•21m ago•1 comments

Penguin and Club bars can no longer be described as chocolate

https://www.bbc.co.uk/news/articles/c86737yg3jlo
3•lifeisstillgood•21m ago•0 comments

App for Activists

https://apps.apple.com/us/app/libertyguard/id6753902370
2•thedanperry•21m ago•1 comments

Might Look Good on You

https://addons.mozilla.org/en-US/firefox/addon/hacker-news-mods/
1•Toby1VC•22m ago•0 comments

ATM fraud nearly brought down British banking

https://www.theregister.com/2005/10/21/phantoms_and_rogues/
2•bediger4000•23m ago•0 comments

The Death of Thread per Core

https://buttondown.com/jaffray/archive/the-death-of-thread-per-core/
2•ibobev•24m ago•0 comments

Grandmaster, Popular Commentator Daniel Naroditsky Tragically Passes Away at 29

https://www.chess.com/news/view/grandmaster-daniel-naroditsky-dies-at-29
1•robertlagrant•24m ago•1 comments

Measuring the Moon with a Tungsten Cube [video]

https://www.youtube.com/watch?v=PPEQ4jVs2ic
1•AdamH12113•26m ago•0 comments

Deep Learning 33 Years Ago (Karpathy) (2022)

http://karpathy.github.io/2022/03/14/lecun1989/
2•highfrequency•26m ago•0 comments

Physically Based Content

https://irradiance.ca/posts/pbr/
1•ibobev•26m ago•0 comments

Khronos Vulkan Tutorial

https://docs.vulkan.org/tutorial/latest/00_Introduction.html
2•ibobev•28m ago•0 comments

Supertuxkart 1.5

https://blog.supertuxkart.net/2025/10/supertuxkart-15-release.html
1•pentagrama•30m ago•0 comments

Show HN: Omegle for Devs

https://codemegle.vercel.app/
1•rodgetech•30m ago•0 comments
Open in hackernews

First Self-Propagating Worm Using Invisible Code Hits OpenVSX and VS Code

https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace
36•dnslavin•2h ago

Comments

kulahan•1h ago
For anyone else curious WTH “invisible code” is…

> invisible Unicode characters that make malicious code literally disappear from code editors.

rictic•49m ago
So, they have a custom decode function that extracts info from unprinted characters which they then pass to `eval`. This article is trying to make this seem way fancier than it is. Maybe GitHub or `git diff` don't give a sense of how many bits of info are in the unicode string, but the far scarier bit of code is the `eval(atob(decodedString))` at the bottom. If your security practices don't flag that, either at code review, lint, or runtime then you're in trouble.

Not to say that you can't make innocuous looking code into a moral equivalent of eval, but giving this a fancy name like Glassworm doesn't seem warranted on that basis.

moffkalast•25m ago
Makes you wonder why unicode has invisible characters in the first place and why a compiler would interpret them at all.
fxtentacle•1h ago
I call bullshit on this: "The attacker is using a public blockchain - immutable, decentralized, impossible to take down - as their C2 server."

"There's no hosting provider to contact, no registrar to pressure, no infrastructure to shut down. The Solana blockchain just... exists. "

Yes, but you still need to connect to it. Blocking access to *.solana.com is enough to stop the trojan from accessing its 2nd stage.

"Connections to Solana RPC nodes look completely normal. Security tools won't flag it. "

Then your security tools are badly configured. Lots of crypto traffic should be treated as a red flag in almost any corporate environment.

"there's literally no way to take it down"

There is, you just have to accept that Solana goes down with it. Why is A-OK in a work environment.

maccam912•1h ago
There's also the backup C2 path though, via google calendar. Wayyy less of a red flag.
fxtentacle•59m ago
I'm surprised that Google hasn't deactivated the link in the 24+ hours since that article went online.
dns_snek•45m ago
That should tell you (everyone) how much these companies actually care about our security the next time they claim to be stripping away our freedoms "for our security".
throwaway48476•27m ago
Google is a malware services company. They make money when someone creates malware OBS and pays Google for it to be the top result.
knallfrosch•21m ago
That blocks Solana only on your corporate network.
djmips•9m ago
Obviously... SMH - what a tough read this blog post was.
nawgz•1h ago
Cool write-up. Seems pretty unintuitive to me that Unicode would allow someone to serialize normal code as invisible characters and that something like an IDE or a git diff has never been hardened against that at all.

In my mind it's one thing to let a string control whitespace a bit versus having the ability to write any string in a non-renderable format. Can anyone point me to some more information about why this capability even exists?

clscott•9m ago
The issue does not lie with Unicode.

It's just a custom string encoder/decoder whose encoded character set is restricted to non-printables.

Many editors and IDEs have features (or plugins) to detect these characters.

VSCode: https://marketplace.visualstudio.com/items?itemName=YusufDan...

VIM: https://superuser.com/questions/249289/display-invisible-cha...

gary_0•58m ago
If all you're interested in is which extensions have been infected:

Compromised OpenVSX Extensions:

    codejoy.codejoy-vscode-extension@1.8.3
    codejoy.codejoy-vscode-extension@1.8.4
    l-igh-t.vscode-theme-seti-folder@1.2.3
    kleinesfilmroellchen.serenity-dsl-syntaxhighlight@0.3.2
    JScearcy.rust-doc-viewer@4.2.1
    SIRILMP.dark-theme-sm@3.11.4
    CodeInKlingon.git-worktree-menu@1.0.9
    CodeInKlingon.git-worktree-menu@1.0.91
    ginfuru.better-nunjucks@0.3.2
    ellacrity.recoil@0.7.4
    grrrck.positron-plus-1-e@0.0.71
    jeronimoekerdt.color-picker-universal@2.8.91
    srcery-colors.srcery-colors@0.3.9
    sissel.shopify-liquid@4.0.1
    TretinV3.forts-api-extention@0.3.1
Compromised Microsoft VSCode Extensions:

    cline-ai-main.cline-ai-agent@3.1.3
DiabloD3•53m ago
And this is why you don't use VSCode.
dist-epoch•39m ago
Do you also not use SSH? Because that was also infected last year (XZ)
agile-gift0262•35m ago
and this is why you must minimise and be extra careful with the extensions you install in your editor of choice.
afishhh•38m ago
Using non-printable characters to encode malicious code is creative, but I wouldn't say it "breaks our security model".

I would be pretty suspicious if I saw a large string of non-printable text wrapped in a decode() function during code review... Hard to find a legitimate use for encoding things like this.

Also another commenter[1] said there's an eval of the decoded string further down the file, and that's definitely not invisible.

Has no one thought to review the AI slop before publishing?

[1] https://news.ycombinator.com/item?id=45649224

TheServitor•38m ago
"Here's the thing - this technique completely breaks traditional code review. You can't spot what you can't see. GitHub's diff view? Shows nothing suspicious. Your IDE's syntax highlighting? All clear. Manual code inspection? Everything looks normal.

The invisible code technique isn't just clever - it's a fundamental break in our security model. We've built entire systems around the assumption that humans can review code. GlassWorm just proved that assumption wrong."

This is pure Claude talk.

dingnuts•15m ago
it sure is and it's complete bullshit too!

that screenshot looks suspicious as hell, and my editor (Emacs) has a whitespace mode that shows unprintable characters sooooo

if GitHub's diff view displays unprintable characters like this that seems like a problem with GitHub lol

"it isn't just X it's Y" fuck me, man. get this slop off the front page. if there's something useful in it, someone can write a blog post about it. by hand.

1bpp•14m ago
Claude, remember to always replace em-dashes with a single dash
burkaman•12m ago
Yeah the whole article is awful to read. Everything the LLM added is completely useless fluff, sometimes misleading, and always painful to get through.
wrs•20m ago
That's clever, but if your code review missed the perfectly visible line

    eval(atob(decodedString))
then they didn't really need invisible characters to get past you, did they?
vemv•15m ago
What are the specific "Unicode variation selectors" in question?

I'd like to implement some simple linting against them.

lennartkoopmann•13m ago
I was always afraid of browser extensions and now I'm also afraid of IDE extensions. Recently came across SecureAnnex[0] and it looks promising to get some control over it.

[0] https://secureannex.com/

sublinear•4m ago
> Let me say that again: the malware is invisible. Not obfuscated. Not hidden in a minified file. Actually invisible to the human eye.

I stopped reading at this point. This is not only false, but yet another strong reason to lint out the silly nonsense people argued for on here years ago. No emoji, no ligatures, etc.