frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: I Made Quantify AI – Co-Pilot for Trading Charts Analysis

https://quantify-ai.co/
1•alexii05•1m ago•0 comments

Show HN: Mazinger – AI that tries to break into your web app

https://github.com/ayman8jebari/MAZINGER
1•solosquad•2m ago•0 comments

Unity Offers Game-Makers New Payment Options to Avoid Apple

https://www.bloomberg.com/news/articles/2025-10-22/unity-offers-game-makers-new-payment-options-t...
1•josvdwest•3m ago•0 comments

Modern Cats (1874)

https://www.theatlantic.com/magazine/archive/1874/06/modern-cats/631201/
1•JumpCrisscross•3m ago•0 comments

China's 5G-for-drones, 6G appetite is envy of Ericsson

https://www.lightreading.com/6g/china-s-5g-for-drones-and-6g-appetite-is-the-envy-of-ericsson
1•JeanKage•7m ago•0 comments

OpenAI Atlas Browser Out Surveils Chrome

https://www.washingtonpost.com/technology/2025/10/22/chatgpt-atlas-browser/
2•verdverm•8m ago•0 comments

Reddit sues AI company Perplexity, others for industrial-scale scraping comments

https://apnews.com/article/reddit-perplexity-ai-copyright-scraping-lawsuit-3ad8968550dd7e11bcd285...
3•randycupertino•9m ago•1 comments

The Carry-on-Baggage Bubble Is About to Pop

https://www.theatlantic.com/technology/archive/2024/02/airplane-carry-on-luggage-crisis-conspirac...
1•JumpCrisscross•9m ago•1 comments

Ticketmaster vows crackdown on scalper accounts that buy up most tickets

https://www.cbc.ca/news/investigates/ticketmaster-crackdown-scalpers-9.6948616
2•uladzislau•10m ago•0 comments

We tested if a magnetic powder could remove microplastics from drinking water

https://theconversation.com/we-tested-if-a-specialised-magnetic-powder-could-remove-microplastics...
3•PaulHoule•11m ago•0 comments

Any decent error message is a kind of oracle

https://digitalseams.com/blog/any-decent-error-message-is-a-kind-of-oracle
1•bobbiechen•12m ago•0 comments

Dreamcast.rs: Rust environment for Dreamcast development

https://dreamcast.rs/setup.html
2•klaussilveira•12m ago•0 comments

Service Degradation – Agent Chat

https://status.cursor.com/incidents/qpkksd1kmq3h
1•xyzzy9563•14m ago•0 comments

Trump to DOJ: Pay Up

https://www.theatlantic.com/ideas/archive/2025/10/trump-doj-corruption-shakedown-unitary-executiv...
5•breve•14m ago•0 comments

Dane Stuckey (OpenAI CISO) on Prompt Injection Risks for ChatGPT Atlas

https://simonwillison.net/2025/Oct/22/openai-ciso-on-atlas/
1•coloneltcb•15m ago•0 comments

YASA beats own power density record pushing electric motor to 59kW/kg benchmark

https://yasa.com/news/yasa-smashes-own-unofficial-power-density-world-record-pushing-state-of-the...
1•breve•15m ago•0 comments

Google flags Immich sites as dangerous

https://immich.app/blog/google-flags-immich-as-dangerous
2•janpio•16m ago•0 comments

Crusoe to become first cloud operator in space

https://www.crusoe.ai/resources/newsroom/crusoe-to-become-first-cloud-operator-in-space-through-p...
2•virtuosarmo•19m ago•1 comments

Apollo 13: What Went Wrong [video]

https://www.youtube.com/watch?v=uCObwsXbSeU
1•rodmena•20m ago•0 comments

Roskomnadzor has "partially restricted" WhatsApp and Telegram

https://meduza.io/feature/2025/10/22/roskomnadzor-chastichno-ogranichil-whatsapp-i-telegram-v-34-...
2•doener•20m ago•0 comments

Reddit Inc. vs. SerpApi LLC (S.D.N.Y. 1:25-CV-08736) [pdf]

https://storage.courtlistener.com/recap/gov.uscourts.nysd.651592/gov.uscourts.nysd.651592.1.0_1.pdf
2•1vuio0pswjnm7•21m ago•1 comments

Rethinking CQRS: An Interview on OpenCQRS

https://docs.eventsourcingdb.io/blog/2025/10/23/rethinking-cqrs-an-interview-on-opencqrs/
2•goloroden•24m ago•0 comments

Tesla Q3 2025 Update

https://www.sec.gov/Archives/edgar/data/1318605/000162828025045861/exhibit991.htm
4•JumpCrisscross•25m ago•2 comments

Orange: No-code data mining, visualization and machine learning toolbox

https://github.com/biolab/orange3
2•merqurio•26m ago•0 comments

The CRISPR baby scandal gets worse by the day

https://www.theatlantic.com/science/archive/2018/12/15-worrying-things-about-crispr-babies-scanda...
5•fanf2•28m ago•2 comments

Pre-Sputnik Sky Survey Anomalies Correlate with Nuclear Tests and UAP Reports

https://www.nature.com/articles/s41598-025-21620-3
1•hooo•28m ago•1 comments

Provider Variance: Introducing Exacto

https://openrouter.ai/announcements/provider-variance-introducing-exacto
2•voiper1•30m ago•1 comments

Memphis' Battle Against Elon Musk's XAI Data Center

https://time.com/7308925/elon-musk-memphis-ai-data-center/
1•randycupertino•31m ago•0 comments

The Science of Satiety per Calorie

https://www.dietdoctor.com/satiety/science
2•rzk•34m ago•0 comments

Enterprise-Grade ShortForm Trends API

https://dev.virlo.ai/
1•bolcoto•35m ago•0 comments
Open in hackernews

Mass Assignment Vulnerability Exposes Max Verstappen Passport and F1 Drivers PII

https://ian.sh/fia
99•galnagli•2h ago

Comments

intheitmines•1h ago
Just out of interest have you had any legal threats etc from this kind of probing if they don't have explicit bug bounty programs? Also do you ever get offered bounties in on reporting where there wasn't a program?
forgotaccount22•46m ago
When I was still in university I reported a vulnerability and when the company started threatening me with legal action, my professor wrote a strongly worded email and they dropped it. Haven't had it since in 8 years. Feels like many companies understand what we do now, atleast compared to 10 years ago.
iancarroll•40m ago
Actual legal threats are uncommon but I have seen some companies try to offer a bribe disguised as a retroactive bug bounty program, in exchange for not publishing. Obviously it is important to decline that.
zozbot234•7m ago
The kind of probing they did and described in the blogpost, with the attempt to raise their privileges to admin, is legally fishy AIUI. Usually this kind of thing would be part of a formal, agreed-to "red teaming" or "penetration testing" exercise, precisely to avoid any kind of legal liability and establish necessary guidelines. Calling an attempted access "ethical" after the fact is not enough.
luxuryballs•1h ago
well at least it was a password hash :D
dmitrygr•50m ago
Don't get too excited. They never said what kind of hash. Given the rest of the site's security design, might have easily been unsalted md5
Group_B•30m ago
There's probably another rockyou out there waiting to happen
GEBBL•1h ago
Strange, the site is run by an Ian Carroll, but the examples show Sam Curry, who is a very famous bug bounty hunter.
captnasia•1h ago
if you look at his other posts, it looks like they collaborate often.
gregschlom•31m ago
From the post:

"Having been able to attend these events by hoarding airline miles and schmoozing certain cybersecurity vendors, Gal Nagli, Sam Curry, and I thought it would be fun to try and hack some of the different supporting websites for the Formula 1 events."

cathalc•1h ago
That is shamefully poor security.
gnerd00•31m ago
wait until you see the party footage
whatever1•57m ago
Just use a framework to build your site. Don’t reinvent the wheel!
ChaseRensberger•44m ago
i respectfully disagree with this sentiment. i think that in general, reinventing the wheel can be a great learning opportunity in understanding how the wheel works.
AnimalMuppet•43m ago
It can. But it can be very bad at producing wheels that don't break.
adamtaylor_13•34m ago
Not if you understand how the wheel works. That's the whole point.
motorest•36m ago
> Just use a framework to build your site. Don’t reinvent the wheel!

How do you arrive at that conclusion after reading an article on how an API had a broken access control vulnerability?

renewiltord•35m ago
He’s being sarcastic and suggesting using some out of the box rbac thing.
forgotaccount22•50m ago
Archaic company has archaic security. Well done on the RD, but boy does it not surprise me one bit. Would almost be willing to bet that the hash was MD5 too.
veqq•35m ago
What hash do you use?
scq•28m ago
bcrypt is the industry standard.
zozbot234•21m ago
It's an F1 racing site, their job is literally to move fast and break things. https://xkcd.com/1428/
olyjohn•5m ago
[delayed]
LorenDB•23m ago
Ian, it would be great to see an RSS feed on your website if you want to gain another regular reader :)
galnagli•22m ago
Ian is a great writer
jacquesm•22m ago
That's not just one vulnerability, that's a whole slew of failures. For instance there is absolutely no need to keep those documents on the live server for applicants once they have been used for their intended purpose. Blast radius reduction and all that.

I hope you got at least free tickets for life out of this.