frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

AI-Mediated Misrepresentation Risk

https://www.aivojournal.org/ai-mediated-misrepresentation-risk/
1•businessmate•30s ago•1 comments

Teaching Quality

https://hollisrobbinsanecdotal.substack.com/p/teaching-quality
1•paulpauper•39s ago•0 comments

Hyper-Util Composable Pools

https://seanmonstar.com/blog/hyper-util-composable-pools/
2•todsacerdoti•3m ago•0 comments

The case for taking the giving what we can pledge

https://benthams.substack.com/p/a-life-that-cannot-be-a-failure
1•paulpauper•3m ago•0 comments

A Governance Innovation Crisis

https://www.overcomingbias.com/p/a-governance-innovation-crisis
1•paulpauper•5m ago•0 comments

The Scramble for the Seafloor

https://www.nybooks.com/online/2025/12/10/the-scramble-for-the-seafloor/
1•mitchbob•8m ago•1 comments

Hashcards: A Plain-Text Spaced Repetition System

https://borretti.me/article/hashcards-plain-text-spaced-repetition
1•thomascountz•8m ago•0 comments

Ask HN: What Are You Working On? (December 2025)

2•david927•8m ago•0 comments

Elon Musk Is Wrong About Basic Income and Crime: Here Is the Evidence He Ignored

https://scottsantens.substack.com/p/elon-musk-is-wrong-about-universal-basic-income-ubi-and-crime
1•2noame•9m ago•0 comments

Nippon Steel's Acquisition of US Steel: A $15B Deal

https://imaa-institute.org/blog/nippon-steels-acquisition-of-us-steel/
1•eatonphil•10m ago•0 comments

Job apocalypse? Humbug AI is creating new occupations

https://www.economist.com/business/2025/12/14/job-apocalypse-humbug-ai-is-creating-brand-new-occu...
1•edward•11m ago•0 comments

The Twelve Slices of Christmas: How Vasco Chained the Chaos

https://perladvent.org/2025/2025-12-14.html
1•oalders•13m ago•1 comments

Inside The Dark and Predatory World of Crypto Casinos

https://www.nytimes.com/interactive/2025/12/09/us/crypto-casinos-gambling-streamers.html
1•thm•14m ago•0 comments

The next version of the web will be built for machines, not humans

https://www.economist.com/interactive/science-and-technology/2025/12/10/the-next-version-of-the-w...
1•edward•14m ago•0 comments

The best software podcast episodes I ever heard

https://thundergolfer.com/ten-best-software-podcast-episodes
2•jonobelotti•15m ago•0 comments

I added native time awareness to CrewAI to fix LLM date hallucinations

https://github.com/crewAIInc/crewAI/pull/4082
1•sherwin27•15m ago•1 comments

What Does Hadolint Do?

https://hadolint.com/what-does-hadolint-do/
1•mooreds•16m ago•0 comments

The Creation of America's Car Culture [audio]

https://thewaroncars.org/2025/11/11/episode-161-the-creation-of-americas-car-culture/
1•mooreds•17m ago•0 comments

Show HN: Llmwalk – explore the answer-space of open LLMs

https://github.com/samwho/llmwalk
1•samwho•19m ago•0 comments

Record $4.4B flows into Israeli cybersecurity as global VCs outpace locals in 25

https://www.ynetnews.com/business/article/rjggjusz11g
1•myth_drannon•22m ago•0 comments

Rust Coreutils 0.5.0 Release: 87.75% compatibility with GNU Coreutils

https://github.com/uutils/coreutils/releases/tag/0.5.0
3•maxloh•23m ago•1 comments

Carlito's Way

https://zmef.freeshell.org/carlitoway.html
2•zmef•26m ago•1 comments

Could a 5-day RTO be around the corner for Big Tech?

https://blog.pragmaticengineer.com/the-pulse-could-a-5-day-rto-be-around-the-corner-for-big-tech/
3•srijan4•27m ago•0 comments

A basic implementation of a virtual continuum fingerboard

https://continuum.awalgarg.me
1•todsacerdoti•27m ago•0 comments

Kaniko – Build Container Images in Kubernetes

https://github.com/osscontainertools/kaniko
1•bixilon•32m ago•0 comments

In Defense of Papyrus

https://designforhackers.com/blog/papyrus-font/
1•thimabi•33m ago•0 comments

FamFS Hopes to Go Upstream in 2026

https://www.phoronix.com/news/FamFS-2026-Upstream-Hopes
1•Bender•35m ago•0 comments

Transmutation Challenge

https://vinyasi.substack.com/p/transmutation-challenge
1•vinyasi•35m ago•0 comments

Show HN: CodeContext – Cut developer onboarding time from months to weeks

https://github.com/sonii-shivansh/CodeContext
1•shivanshsonii•36m ago•0 comments

FDA drug trials exclude a widening slice of Americans

https://medicalxpress.com/news/2025-12-fda-drug-trials-exclude-widening.html
3•bikenaga•36m ago•1 comments
Open in hackernews

Shai-Hulud compromised a dev machine and raided GitHub org access: a post-mortem

https://trigger.dev/blog/shai-hulud-postmortem
69•nkko•6h ago

Comments

moh_quz•6h ago
Really appreciate the transparency here. Post-mortems like this are vital for the industry.

I'm curious was the exfiltration traffic distinguishable from normal developer traffic?

We've been looking into stricter egress filtering for our dev environments, but it's always a battle between security and breaking npm install

robinhoodexe•2h ago
Wouldn’t the IP allowlist feature on the GitHub organisation work wonders for this kind of attack?
zozos•2h ago
I have been thinking about this. How do I make my git setup on my laptop secure? Currently, I have my ssh key on the laptop, so if I want to push, I just use git push. And I have admin credentials for the org. How do I make it more secure?
noman-land•2h ago
You can add a gpg key and subkeys to a yubikey and use gpg-agent instead of ssh-agent for ssh auth. When you commit or push, it asks you for a pin for the yubikey to unlock it.
esseph•2h ago
You can put the ssh privkey on the yubikey itself and protect it with a pin.

You can also just generate new ssh keys and protect them with a pin.

larusso•1h ago
There is the FIDO feature which means you don’t need to hackle with gpg at all. You can even use an ssh key as signing key to add another layer of security on the GitHub side by only allowing signed commits.
larusso•1h ago
1 store my ssh key in 1Password and use the 1Password ssh agent. This agents asks for access to the key(s) with Touch ID. Either for each access or for each session etc. one can also whitelist programs but I think this all reduces the security.
benoau•2h ago
You can set up your repo to disable pushing directly to branches like main and require MFA to use the org admin account, so something malicious would need to push to a benign branch and separately be merged into one that deploys come from.
sallveburrpi•2h ago
Pushing directly to main seems crazy - for anything that is remotely important I would use a pull request/merge request pattern
esseph•2h ago
Depends on the use case of the repo.
t0mas88•1h ago
But the attacker could just create a branch, merge request and then merge that?
CGamesPlay•2h ago
Add a password or hardware 2-factor to your ssh key. And get a password manager with the same for those admin credentials.
madeofpalk•1h ago
I’ve started to get more and more paranoid about this. It’s tough when you’re running untrusted code, but I think I’ve improved this by:

not storing SSH keys on the filesystem, and instead using an agent (like 1Password) to mediate access

Stop storing dev secrets/credentials on the filesystem, injecting them into processes with env vars or other mechanisms. Your password manager could have a way to do this.

Develop in a VM separate from your regular computer usage. On windows this is essential anyway through using WSL, but similar things exist for other OSs

anthonyryan1•45m ago
One approach I started using a could of years ago was storing SSH private keys in the TPM, and using it via PKCS11 in SSH agent.

One benefit of Microsoft requiring them for Windows 11 support is that nearly every recent computer has a TPM, either hardware or emulated by the CPU firmware.

It guarantees that the private key can never be exfiltrated or copied. But it doesn't stop malicious software on your machine from doing bad things from your machine.

So I'm not certain how much protection it really offers on this scenario.

Linux example: https://wiki.gentoo.org/wiki/Trusted_Platform_Module/SSH

macOS example (I haven't tested personally): https://gist.github.com/arianvp/5f59f1783e3eaf1a2d4cd8e952bb...

otterley•19m ago
Your SSH private key must be encrypted using a passphrase. Never store your private key in the clear!
nottorp•18m ago
And what do you do with the passphrase, store it encrypted with a passphrase?
0xbadcafebee•14m ago
You memorize it, or keep it in 1Password. 1Password can manage your SSH keys, and 1Password can/does require a password, so it's still protected with something you know + something you have.
fwip•10m ago
One option is to remember it.
otterley•9m ago
This is what agents are for. You load your private key into an agent so you don't have to enter your passphrase every time you use it. Agents are supposed to be hardened so that your private key can't be easily exfiltrated from them. You can then configure `ssh` to pass requests through the agent.

There are lots of agents out there, from the basic `ssh-agent`, to `ssh-agent` integrated with the MacOS keychain (which automatically unlocks when you log in), to 1Password (which is quite nice!).

mr_mitm•1m ago
This is a good defense for malware that only has read access to the filesystem or a stolen hard drive scenario without disk encryption, but does nothing against compromised dev machine.
0xbadcafebee•17m ago
1) Get 1Password, 2) use 1Password to hold all your SSH keys and authorize SSH access [1], 3) use 1Password to sign your Git commits and set up your remote VCS to validate them [2], 4) use GitHub OAuth [3] or the GitHub CLI's Login with HTTPS [4] to do repository push/pull. If you don't like 1Password, use BitWarden.

With this setup there are two different SSH keys, one for access to GitHub, one is a commit signing key, but you don't use either to push/pull to GitHub, you use OAuth (over HTTPS). This combination provides the most security (without hardware tokens) and 1Password and the OAuth apps make it seamless.

Do not use a user with admin credentials for day to day tasks, make that a separate user in 1Password. This way if your regular account gets compromised the attacker will not have admin credentials.

[1] https://developer.1password.com/docs/ssh/agent/ [2] https://developer.1password.com/docs/ssh/git-commit-signing/ [3] https://github.com/hickford/git-credential-oauth [4] https://cli.github.com/manual/gh_auth_login

snickerbockers•5m ago
password-protect your key (preferably with a good password that is not the same password you use to log in to your account). If you use a password it's encrypted; otherwise its stored on plaintext and anybody who manages to get a hold of your laptop can steal the private key.
mr_mitm•3m ago
There is no defense against a compromised laptop. You should prevent this at all cost.

You can make it a bit more challenging for the attacker by using secure enclaves (like TPM or Yubikey), enforce signed commits, etc. but if someone compromised your machine, they can do whatever you can.

Enforcing signing off on commits by multiple people is probably your only bet. But if you have admin creds, an attacker can turn that off, too. So depending on your paranoia level and risk appetite, you need a dedicated machine for admin actions.

getnormality•2h ago
I am loving the ancient Lovecraftian horror vibe of these exploit names. Good for raising awareness, I guess!
dnpls•2h ago
AFAIK Shai-Hulud is the sandworm in Frank Herbert's Dune (but also an American metalcore band)
snickerbockers•11m ago
Shai Hulud is the god that lives inside the sandworms in Dune.
getnormality•9m ago
Noted!
Etheryte•2h ago
The approach the attacker took makes little sense to me, perhaps someone else has an explanation for it? At first they monitored what's going on and then silently exfiltrated credentials and private repos. Makes sense so far. But then why make so much noise with trying to force push repositories? It's Git, surely there's a clone of nearly everything on most dev machines etc.
chuckadams•2h ago
Malware sometimes suffers from feature creep too.
sync•2h ago
That’s weird, pnpm no longer automatically runs lifecycle scripts like preinstall [1], so unless they were running a very old version of pnpm, shouldn’t they have been protected from Shai-Hulud?

1: https://github.com/pnpm/pnpm/pull/8897

e40•2h ago
Yeah, I thought that was the main reason to use pnpm. Very confused.
pverheggen•1h ago
Maybe the project itself had a postinstall script? It doesn't run lifecycle scripts of dependencies, but it still runs project-level ones.
ItsHarper•1h ago
At the end of the article, they talk about how they've since updated to the latest major version of pnpm, which is the one with that change
debarshri•1h ago
> This incident involved one of our engineers installing a compromised package on their development machine, which led to credential theft and unauthorized access to our GitHub organization.

The org only has 4-5 engineers. So you can imagine the impact a large org will have.

rvz•1h ago
NPM post-install scripts considered harmful.

There has to be a tool that allows you (or an AI) to easily review post-install scripts before you install the package.

madeofpalk•59m ago
As mentioned in the article, good NPM package managers just do this now.

pnpm does it by default, yarn can be configured. Not sure about npm itself.

chuckadams•41m ago
Got any pointers on how to configure this for yarn? I'm not turning anything up in the yarn documentation or in my random google searches.

npm still seems to be debating whether they even want to do it. One of many reasons I ditched npm for yarn years ago (though the initial impetus was npm's confused and constantly changing behaviors around peer dependencies)

skrebbel•1h ago
Points for an excellent post-mortem.
KomoD•1h ago
> stored in our database which was not compromised

Personally I don't really agree with "was not compromised"

You say yourself that the guy had access to your secrets and AWS, I'd definitely consider that compromised even if the guy (to your knowledge) didn't read anything from the database. Assume breach if access was possible.

nsonha•1h ago
There are logs for accessing aws resources and if you don't see the access before you revoke it then the data is safe
MrDarcy•58m ago
Unless the attacker used any one of hundreds of other avenues to access the AWS resource.

Are you sure they didn’t get a service account token from some other service then use that to access customer data?

I’ve never seen anyone claim in writing all permutations are exhaustively checked in the audit logs.

otterley•25m ago
It depends on what kind of access we're talking about. If we're talking about AWS resource mutations, one can trust CloudTrail to accurately log those actions. CloudTrail can also log data plane events, though you have to turn it on, and it costs extra. Similarly, RDS access logging is pretty trustworthy, though functionality varies by engine.
bspammer•1h ago
Given that all the stolen credentials were made public, I was hoping that someone would build a haveibeenpwned style site. We know we were compromised on at least a few tokens, but it would be nice to be able to search using a compromised token to find out what else leaked. We’ve rotated everything we could think of but not knowing if we’ve missed something sucks.
KomoD•1h ago
Doesn't it publish the repos to your Github account? Just clone and look at what was stolen.
solrith•38m ago
On the follow up Wiz blog they suggested that the exfiltration was cross-victim https://www.wiz.io/blog/shai-hulud-2-0-aftermath-ongoing-sup...
solrith•41m ago
The Torvalds commits were a common post infection signature, common in the random repos that published secrets (Microsoft documented https://www.microsoft.com/en-us/security/blog/2025/12/09/sha...)

It was a really noisy worm though, and it looked like a few actors also jumped on the exposed credentials making private repos public and modifying readmes promoting a startup/discord.