frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

GitHub delays GHA price increase

https://twitter.com/github/status/2001372894882918548
1•timvdalen•2m ago•0 comments

Ask HN: Is there an open source "turbopuffer"?

1•koconder•5m ago•0 comments

Calculate founder dilution across funding rounds

https://angelmatch.io/resources/cap-table-calculator
2•educated_panda•6m ago•0 comments

Ask HN: How to spend L&D/Training funds before the end of the year?

1•jamestimmins•7m ago•1 comments

Obscure Polish company launches 122.88TB PCIe 5.0 immersion cooled SSD

https://www.techradar.com/pro/obscure-polish-company-quietly-launches-massive-122-88tb-pcie-5-0-i...
1•piterrro•8m ago•0 comments

State of Radicle CI in 2025

https://blog.liw.fi/posts/2025/radicle-ci-status-quo/
1•aiw1nt3rs•8m ago•0 comments

Backprop in Rust ML lib blogpost

https://cant.bearblog.dev/we-need-to-go-back-to-the-gradient/
1•TuckerBMorgan•10m ago•1 comments

Oliver Sacks put himself into his case studies – what was the cost?

https://www.newyorker.com/magazine/2025/12/15/oliver-sacks-put-himself-into-his-case-studies-what...
3•barry-cotter•12m ago•51 comments

WorldPlay: Real-Time Interactive World Modeling

https://arxiv.org/abs/2512.14614
2•avaer•14m ago•0 comments

North Korean infiltrator caught at Amazon due to 110ms keystroke lag

https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working...
7•bns•15m ago•1 comments

Protecting the well-being of our users

https://www.anthropic.com/news/protecting-well-being-of-users
1•amrrs•15m ago•0 comments

Maintaining an open source software during Hacktoberfest

https://crocidb.com/post/maintaining-an-oss-during-hacktoberfest/
2•birdculture•18m ago•0 comments

Show HN: High-Performance Domain-Agnostic Rule Engine with AI-Powered Config

https://ayushmaanbhav.github.io/Product-FARM/
1•ayushmaanbhav•19m ago•3 comments

Minecraft office job mod by fingees

https://www.youtube.com/watch?v=EWlVF2tYXqI
1•seism•22m ago•1 comments

Show HN: analog.watch – read 3 analog clocks as fast as you can!

https://analog.watch
1•ezekg•22m ago•1 comments

The Fleece Vest Apocalypse

https://gregscaduto.substack.com/p/the-fleece-vest-apocalypse
1•ricksunny•22m ago•1 comments

YouTube Shuts Down Channels Using AI Making Fake Movie Trailers Seen by Millions

https://deadline.com/2025/12/youtube-terminates-screen-culture-kh-studio-fake-ai-trailer-1236652506/
3•randycupertino•22m ago•1 comments

Scientists skip key US meetings – and seize on smaller alternatives

https://www.nature.com/articles/d41586-025-04083-4
1•robtherobber•24m ago•0 comments

Geerling: Apple didn't have to go this hard - Testing LLMs using RDMA [video]

https://www.youtube.com/watch?v=x4_RsUxRjKU
2•GeekyBear•24m ago•0 comments

London Part 1: The City's Micromobility Story

https://micromobility.io/news/london-part-1-the-citys-micromobility-story
1•prabinjoel•25m ago•0 comments

Supporting FLOSS: My end-of-year donations

https://tzovar.as/supporting-floss/
1•gedankenstuecke•26m ago•0 comments

Ask HN: Why are some innovations from previous AI cycles forgotten about?

2•dch82•27m ago•0 comments

In which our protagonist dreams of laurels

https://wingolog.org/archives/2025/12/17/in-which-our-protagonist-dreams-of-laurels
2•nsm•28m ago•0 comments

Show HN: Eval based agent builder (pls roast us)

https://github.com/seer-engg/seer
1•akshay326•28m ago•1 comments

Trump signs executive order to reschedule cannabis from Schedule I to III

https://www.whitehouse.gov/presidential-actions/2025/12/increasing-medical-marijuana-and-cannabid...
5•hua•30m ago•1 comments

GoGPU – Pure Go WebGPU Implementation

https://github.com/gogpu/wgpu
1•whou•31m ago•0 comments

Lovable bags €330M at €6.6B valuation in Europe's biggest AI builder bet

https://techfundingnews.com/lovable-raises-330m-series-b-6-6b-valuation-builder-ai/
1•vinnyglennon•36m ago•1 comments

Show HN: Local WYSIWYG Markdown, mockup, data model editor powered by Claude Code

https://nimbalyst.com
1•wek•38m ago•0 comments

2.8 days to disaster: Why we are running out of time in low earth orbit

https://phys.org/news/2025-12-days-disaster-earth-orbit.html
2•smartmic•39m ago•0 comments

Dataset of 33k human evaluations across 33 AI models

https://huggingface.co/spaces/ProlificAI/humaine-leaderboard
1•bradfeh•45m ago•2 comments
Open in hackernews

We pwned X, Vercel, Cursor, and Discord through a supply-chain attack

https://gist.github.com/hackermondev/5e2cdc32849405fff6b46957747a2d28
234•hackermondev•1h ago

Comments

normie3000•1h ago
Cool bug. Bug bounty money is pathetic.
FloorEgg•1h ago
Supply and demand I guess.

Pathetic for a senior SE but pretty awesome for a 16 year old up and coming hacker.

tuesdaynight•1h ago
You are right, but that could (probably not) make them go for the bad route because they would get way more money that way. 4k for a bug that could take control of your customer account sounds disrespectful to me.
finghin•42m ago
Yeah, my read is that the teenage hacker confronted with this ridiculous payslip sees two ways forward: accept the pay cut for the CV benefit of working with bug bounties, or get a bit better at hiding your ass and make them really pay.
finghin•43m ago
I hope I'm not assuming too much but I'm really hope the up and coming hacker is smart enough to know that his work was worth more than $4,000. That's 1-2% of an annual SE salary for someone with similar skillset.
ascorbic•34m ago
And this will help them land that six figure job
MeetingsBrowser•33m ago
> That's 1-2% of an annual SE salary for someone with similar skillset.

I agree $4,000 is way too low, but a $400k salary is really high, especially for security work.

tuesdaynight•1h ago
What is the reason for the low values? I would understand if it was a small company, but we are talking about Discord here.
charlesabarnes•1h ago
Supply and demand. Selling via grey markets is an option, but many white hats don't go that route due to risk. There's plenty of people that will also find vulnerabilities without any money attached.
tptacek•34m ago
What "grey market" are you talking about? How specific can you be about it?
jfindper•20m ago
I know you love asking people this question, so sorry to spoil your fun, but you know just as well as I do that there isn't really a "grey market".
tptacek•7m ago
There absolutely is. I'm just not familiar with one that buys these vulnerabilities.
bytecauldron•1h ago
I was going to ask. Isn't 4k from Discord pretty low for the work conducted here? I'm not familiar with bounty payouts. I'm hoping these companies aren't taking advantage of them.
oxandonly•53m ago
4k is sadly discords highest bounty they give out (screenshot from their bugcrowd program: https://imgur.com/a/KNIdeXh) even more critical issues then this one get paid the same amount out
babelfish•1h ago
Sounds like you pwned Mintlify!
padjo•1h ago
Seems like such a tiny amount of money for a bug that can be used to completely own your customers accounts. Also not much excuse for xss these days.
da_grift_shift•58m ago
>Also not much excuse for xss these days.

XSS is not dead, and the web platforms mitigations (setHTML, Trusted Types) are not a panacea. CSP helps but is often configured poorly.

So, this kind of widespread XSS in a vulnerable third party component is indeed concerning.

For another example, there have been two reflected XSS vulns found in Anubis this year, putting any website that deploys it and doesn't patch at risk of JS execution on their origin.

Audit your third-party dependencies!

https://github.com/TecharoHQ/anubis/security/advisories/GHSA...

https://github.com/TecharoHQ/anubis/security/advisories/GHSA...

azemetre•51m ago
Is it really fair to compare an open source project that desperately wants only $60k a year to hire a dev with companies that have collectively raised over billions of dollars in funding?
noirscape•23m ago
I'd say it's probably worse in terms of scope. The audience for some AI-powered documentation platform will ultimately be fairly small (mostly corporations).

Anubis is promoting itself as a sort of Cloudflare-esque service to mitigate AI scraping. They also aren't just an open source project relying on gracious donations, there's a paid whitelabel version of the project.

If anything, Anubis probably should be held to a higher standard, given many more vulnerable people (as in, vulnerable against having XSS on their site cause significant issues with having to fish their site out of spam filters and/or bandwidth exhaustion hitting their wallet) are reliant on it compared to big corporations. Same reason that a bug in some random GitHub project somewhere probably has an impact of near zero, but a critical security bug in nginx means that there's shit on the fan. When you write software that has a massive audience, you're going to have to be held to higher standards (if not legally, at least socially).

Not that Anubis' handling of this seems to be bad or anything; both XSS attacks were mitigated, but "won't somebody think of the poor FOSS project" isn't really the right answer here.

tptacek•35m ago
This comes up on every story about bug bounties. There is in general no market at all for XSS vulnerabilities. That might be different for Twitter, Facebook, Instagram, and TikTok, because of the possibility of monetizing a single strike across a whole huge social network, and there's maybe a bank-shot argument for Discord, but you really have to do a lot of work to generate the monetization story for any of those.

The vulnerabilities that command real dollars all have half-lives, and can't be fixed with a single cluster of prod deploys by the victims.

jijijijij•13m ago
If a $500 drone is coming for your $100M factory, the price limit for defense considerations isn't $500.

In the end, you are trying to encourage people not to fuck with your shit, instead of playing economic games. Especially with a bunch of teenagers who wouldn't even be fully criminally liable for doing something funny. $4K isn't much today, even for a teenager. Thanks to stupid AI shit like Mintlify, that's like worth 2GB of RAM or something.

It's not just compensation, it's a gesture. And really bad PR.

dllu•1h ago
The fact that SVG files can contain scripts was a bit of a mistake. On one hand, the animations and entire interactive demos and even games in a single SVG are cool. But on the other hand, it opens up a serious can of worms of security vulnerabilities. As a result, SVG files are often banned from various image upload tools, they do not unfurl previews, and so on. If you upload an SVG to discord, it just shows the raw code; and don't even think about sharing an SVG image via Facebook Messenger, Wechat, Google Hangouts, or whatever. In 2025, raster formats remain way more accessible and easily shared than SVGs.

This is very sad because SVGs often have way smaller file size, and obviously look much better at various scales. If only there was a widely used vector format that does not have any script support and can be easily shared.

nightski•1h ago
Does it need to be as complicated as a new format? Or would it be enough to not allow any scripting in the provided SVGs (or stripping it out). I can't imagine there are that many SVGs out there which take advantage of the feature.
culi•1h ago
Do other vector formats have the same vulnerabilities?
bobbylarrybobby•1h ago
Would it be possible for messenger apps to simply ignore <script> tags (and accept that this will break a small fraction of SVGs)? Or is that not a sufficient defense?
demurgos•52m ago
I looked into it for work at some point as we wanted to support SVG uploads. Stripping <script> is not enough to have an inert file. Scripts can also be attached as attributes. If you want to prevent external resources it gets more complex.

The only reliable solution would be an allowlist of safe elements and attributes, but it would quickly cause compat issues unless you spend time curating the rules. I did not find an existing lib doing it at the time, and it was too much effort to maintain it ourselves.

The solution I ended up implementing was having a sandboxed Chromium instance and communicating with it through the dev tools to load the SVG and rasterize it. This allowed uploading SVG files, but it was then served as rasterized PNGs to other users.

FeepingCreature•59m ago
If only there was a widely used vector format that had script support and also decades of work on maintaining a battle-tested security layer around it with regular updates on a faster release cycle than your browser. That'd be crazy. Sure would suck if we killed it because we didn't want to bother maintaining it anymore.

(Yes I'm still salty about Flash.)

lambdaone•57m ago
SVG without <script> would do just fine.
JoshTriplett•46m ago
> because we didn't want to bother maintaining it anymore

That wasn't the only reason. Flash was also proprietary, and opaque, and single-vendor, among many other problems with it.

ajross•8m ago
Uh... Flash was a genuine firehose of security flaws. I mean, yeah, they patched them. So "battle tested security layer" isn't wrong in a technical sense. But, yikes, no.
poorman•57m ago
All SVGs should be properly sanitized going into a backend and out of it and when rendered on a page.

Do you allow SVGs to be uploaded anywhere on your site? This is a PSA that you're probably at risk unless you can find the few hundred lines of code doing the sanitization.

Note to Ruby on Rails developers, your active storage uploaded SVGs are not sanitized by default.

ivw•53m ago
just run them through `svgo` and get the benefits of smaller filesizes as well
poorman•51m ago
GitLab has some code in their repo if you want to see how to do it.
nradov•22m ago
Is there SVG sanitization code which has been formally proven correct and itself free of security vulnerabilities?
SV_BubbleTime•54m ago
> On one hand, the animations and entire interactive demos and even games in a single SVG are cool. But on the other hand

Didn’t we do this already with Flash? Why would this lesson not have stuck?

fainpul•50m ago
"The script doesn't run unless the file is directly opened (you can't run scripts from (<img src="/image.svg">)."
username223•34m ago
It's wild how often we rediscover that executing untrusted code leads to decades of whack-a-mole security. Excel/Word plus macros, HTML plus JavaScript, SVG plus JavaScript, ...
eastbound•5m ago
It’s wild how often specs are ok for 9 versions, and then at version 10, standard bodies decide to transform them into a trojan firehose.

It’s so regular like clockwork that it has to be a nation state doing this to us.

aidenn0•34m ago
External entities in XML[1] were a similar issue back when everyone was using XML for everything, and parsers processed external-entities by default.

1: https://owasp.org/www-community/vulnerabilities/XML_External...

hinkley•30m ago
At least with external entities you could deny the parser an internet connection and force it to only load external documents from a cache you prepopulated and vetted. Turing completeness is a bullshit idea in document formats.
aydyn•28m ago
There is: PDF. You may not like it or adobe, but its there and widely supported.
Shared404•18m ago
PDF also has script support unfortunately.
msie•27m ago
Wow, I learned one thing today!
HPsquared•2m ago
Could there be a limited format that excludes the scripting element? Like in Excel: xlsx files have no macros, but xlsm (and the old xls) can contain macros.
devrupt•1h ago
$11k in bounties. Might have got more from the onion.
vablings•51m ago
Stupid, especially because he is a kid and young in his career. His lifetime earnings and ability to score a better paying job is worth way more than an extra couple thousand dollars selling this kind of exploit to criminals. It's why NDA's for security vulnerabilities are harmful because it doesn't allow a kind of social credit accumulation
azemetre•49m ago
Back in the day the US government would give you $20k-60k cash in a nice briefcase for this type of exploit. Just another thing big tech has ruined I suppose.
tptacek•34m ago
Can you cite a source for that claim? The USG paying mid-5-figures for an XSS vulnerability? That's news to me.
0xbadcafebee•26m ago
I can't imagine intelligence agencies/DoD not doing this with their gargantuan black budgets, if it's relevant to a specific target. They already contract with private research centers to develop exploits, and it's not like they're gonna run short on cash
bri3d•1h ago
Proxying from the "hot" domain (with user credentials) to a third party service is always going to be an awful idea. Why not just CNAME Mintlify to dev-docs.discord.com or something?

This is also why an `app.` or even better `tenant.` subdomain is always a good idea; it limits the blast radius of mistakes like this.

pverheggen•55m ago
I think the reason companies do this for doc sites is so they can substitute your real credentials into code snippets with "YOUR_API_KEY". Seems like a poor tradeoff given the security downside.
Illniyar•57m ago
Nice discovery and writeup. Let alone for a 16 yo!.

I've never heard an XSS vulnerability described as a supply-chain attack before though, usually that one is reserved for package managers malicious scripts or companies putting backdoors in hardware.

dfedbeef•56m ago
JFC bug bounty money is pathetic now. This would have destroyed this company's reputation, downstream effects for customer reputations and data.
llmslave2•56m ago
This feels so emblematic of our current era. VC funded vibe coded AI documentation startup somehow gets big name customers who don't properly vet the security of the platform, ship a massive vulnerability that could pwn millions of users and the person who reports the vulnerability gets...$5k.

If I recall last week Mintlify wrote a blog post showcasing their impressive(ly complicated) caching architecture. Pretending like they were doing real engineering, when it turns out nobody there seems to know what they're doing, but they've managed to convince some big names to use them.

Man, it's like everything I hate about modern tech. Good job Eva for finding this one. Starting to think that every AI startup or company that is heavily using gen-ai for coding is probably extremely vulnerable to the simplest of attacks. Might be a way to make some extra spending money lol.

tptacek•37m ago
I don't think anybody in SFBA-style software development, both pre- and post-LLM, is really resilient against these kinds of attacks. The problem isn't vibe coding so much as it is multiparty DLL-hell dependency stacks, which is something I attribute more to Javascript culture than to any recent advance in technology.
llmslave2•13m ago
You're right that it's a specific programming culture that is especially vulnerable to it. And for the same reasons they were vulnerable to the same thing to a lesser degree before the rise of LLMs.

But like, this case isn't really a dependency or supply chain attack. It's just allowing remote code execution because, idk, the dev who implemented it didn't read the manual and see that MDX can execute arbitrary code or something. Or maybe they vibe coded it and saw it worked and didn't bother to check. Perhaps it's a supply-chain attack on Discord et al to use Mintlify, if thats what you meant then I apologize.

I think you're right that I have an extreme aversion to SFBA-style software development, and partly because of how gen-ai is used there.

michaelt•4m ago
One might consider this a supply chain attack because the title of the post is “We pwned X, Vercel, Cursor, and Discord through a supply-chain attack”
bluetidepro•52m ago
Slightly related, as someone who doesn’t engage in this type of work, I’m curious about the potential risks associated with discovering, testing, and searching for security bugs. While it’s undoubtedly positive that this individual ultimately became a responsible person and disclosed the information, what if they hadn’t? Furthermore, on Discord’s side, what if they were unaware of this person and encountered someone attempting to snoop on this information, mistakenly believing them to be up to no good? Has there been cases where the risk involved wasn’t justified by the relatively low $4k reward? Or any specific companies you wouldn’t want to do this with because of a past incident with them?
pverheggen•42m ago
> Furthermore, on Discord’s side, what if they were unaware of this person and encountered someone attempting to snoop on this information, mistakenly believing them to be up to no good?

Companies will create bug bounty programs where they set ground rules (like no social engineering), and have guides on how to identify yourself as an ethical hacker, for example:

https://discord.com/security

lrvick•47m ago
I run an infosec firm and we have done attacks like this on my clients over and over and over in audits. I always say any bored teen could do most of what we do because most companies are moving too fast feature farming to have any time for responsible security hardening, and now I have yet another great citation.

Unfortunately a competitive rate agreed to in advance with a company before we do any pentesting is the only way we have ever been able to get paid fairly for this sort of work. Finding bugs in the wild as this researcher did often gets wildly underpaid relative to the potential impact of the bug, if they pay or take it seriously at all.

These companies should be ashamed paying out so little for this, and it is only a matter of time before they insult the wrong researcher who decides to pursue paths to maximum profit, or maximum damage, with a vuln like this.

JackSlateur•38m ago
I struggle to understand the issue .. could someone help me out ?

Ok, you got "https://discord.com/_mintlify/_static/hackerone-a00f3c6c/lma..." to send a controlled payload

But regular users will never hit "https://discord.com/_mintlify/_static/hackerone-a00f3c6c/lma...", so they will never execute your script

I fail to understand how this can be exploited, by whom and in what conditions

rainonmoon•21m ago
You're pretty much on the money. Reflected XSS requires social engineering to really target anyone without other primitives. Unfortunately this report is not very clear about the tangible impacts or limitations of what they could do with this particular XSS either. Saying that every Mintlify customer was "vulnerable to account takeover with a single malicious link" strikes me as specious to say the least. Still, can't fault kids for getting excited about recognition and a payout.
hackermondev•11m ago
imo, the impact is pretty clear here. an unsuspecting user clicks (or is redirected) to one of these malicious links on the platform (ex. vercel); the script grabs their cookie and credentials and sends it to the attacker. they now have full access to the victim's account.
rainonmoon•6m ago
Nice! So the Cookie is accessible by JavaScript on all of those sites? That would be pretty surprising.
jeffjeffbear•17m ago
You have control over what displays on a page with a discord.com domain, you could manipulate the dom to have a login or something else and have it pass the data to your servers. A user would just see a link from discord.com
wonnage•10m ago
You could send that link to an unsuspecting user and steal their cookies, make API requests to send messages on their behalf, etc

Apparently one of the other linked posts shows how you can also gain RCE, since the docs are statically pre-rendered and there’s no sandboxing to prevent you from evalling arbitrary JavaScript.

0xbadcafebee•37m ago
How these companies don't hire kids like Daniel for pennies on the dollar and have him attack their stacks on a loop baffles me. Pay the kid $50k/yr (part time, he still needs to go to school) to constantly probe your crappy stacks. Within a year or two you'll have the most goddamn secure company on the internet - and no public vulns to embarrass you.
hinkley•25m ago
It’s clear to me now that I need to set up my home machine the way I set up BYOD when I was contracting last. I need a separate account for all of my development.

I have a friend who at one point had five monitors and 2 computers (actually it might be 3) on his desk and maybe he’s the one doing it right. He keeps his personal stuff and his programming/work stuff completely separate.

multisport•23m ago
decided to make a new account to post:

Mintlify security is the worse I have even encountered in a modern SaaS company.

They will leak your data, code, assets, etc. They will know they did this. You will tell them, they will acknowledge that they knew it happened, and didn't tell you.

Your docs site will go down, and you will need to page their engineers to tell them its down. This will be a surprise to them.

throwaway613745•8m ago
Ok, I’m never opening an svg ever again.

Found by a 16 year old, what a legend.

orliesaurus•6m ago
I've been following the rise of SVG based attacks recently... It's not just hypothetical anymore... People are using SVG files to deliver full phishing pages and drive by downloads by hiding JavaScript in the markup

ALSO as someone who maintains a file upload pipeline I run every SVG through a sanitizer... Tools like DOMPurify remove scripts and enforce a safe subset of the spec... I even go as far as rasterizing user uploaded vectors to PNG when possible

HOWEVER the bigger issue is mental... Most folks treat SVG like a dumb image when browsers treat it like executable content... Until the platform changes that expectation there will always be an attack surface

quasarj•5m ago
One of these days I'm gonna have to learn why cross-site scripting even matters, especially with modern browsers restricting a script's access to anything local
dfbrown•1m ago
Their collaborator's report includes a more significant issue, an RCE on a mintlify server: https://kibty.town/blog/mintlify/