frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Concept Artists Say Generative AI References Only Make Their Jobs Harder

https://thisweekinvideogames.com/feature/concept-artists-in-games-say-generative-ai-references-on...
1•KittenInABox•1m ago•0 comments

Show HN: PaySentry – Open-source control plane for AI agent payments

https://github.com/mkmkkkkk/paysentry
1•mkyang•3m ago•0 comments

Show HN: Moli P2P – An ephemeral, serverless image gallery (Rust and WebRTC)

https://moli-green.is/
1•ShinyaKoyano•12m ago•0 comments

The Crumbling Workflow Moat: Aggregation Theory's Final Chapter

https://twitter.com/nicbstme/status/2019149771706102022
1•SubiculumCode•17m ago•0 comments

Pax Historia – User and AI powered gaming platform

https://www.ycombinator.com/launches/PMu-pax-historia-user-ai-powered-gaming-platform
2•Osiris30•18m ago•0 comments

Show HN: I built a RAG engine to search Singaporean laws

https://github.com/adityaprasad-sudo/Explore-Singapore
1•ambitious_potat•23m ago•0 comments

Scams, Fraud, and Fake Apps: How to Protect Your Money in a Mobile-First Economy

https://blog.afrowallet.co/en_GB/tiers-app/scams-fraud-and-fake-apps-in-africa
1•jonatask•23m ago•0 comments

Porting Doom to My WebAssembly VM

https://irreducible.io/blog/porting-doom-to-wasm/
1•irreducible•24m ago•0 comments

Cognitive Style and Visual Attention in Multimodal Museum Exhibitions

https://www.mdpi.com/2075-5309/15/16/2968
1•rbanffy•26m ago•0 comments

Full-Blown Cross-Assembler in a Bash Script

https://hackaday.com/2026/02/06/full-blown-cross-assembler-in-a-bash-script/
1•grajmanu•31m ago•0 comments

Logic Puzzles: Why the Liar Is the Helpful One

https://blog.szczepan.org/blog/knights-and-knaves/
1•wasabi991011•42m ago•0 comments

Optical Combs Help Radio Telescopes Work Together

https://hackaday.com/2026/02/03/optical-combs-help-radio-telescopes-work-together/
2•toomuchtodo•47m ago•1 comments

Show HN: Myanon – fast, deterministic MySQL dump anonymizer

https://github.com/ppomes/myanon
1•pierrepomes•53m ago•0 comments

The Tao of Programming

http://www.canonical.org/~kragen/tao-of-programming.html
1•alexjplant•54m ago•0 comments

Forcing Rust: How Big Tech Lobbied the Government into a Language Mandate

https://medium.com/@ognian.milanov/forcing-rust-how-big-tech-lobbied-the-government-into-a-langua...
3•akagusu•54m ago•0 comments

PanelBench: We evaluated Cursor's Visual Editor on 89 test cases. 43 fail

https://www.tryinspector.com/blog/code-first-design-tools
2•quentinrl•57m ago•2 comments

Can You Draw Every Flag in PowerPoint? (Part 2) [video]

https://www.youtube.com/watch?v=BztF7MODsKI
1•fgclue•1h ago•0 comments

Show HN: MCP-baepsae – MCP server for iOS Simulator automation

https://github.com/oozoofrog/mcp-baepsae
1•oozoofrog•1h ago•0 comments

Make Trust Irrelevant: A Gamer's Take on Agentic AI Safety

https://github.com/Deso-PK/make-trust-irrelevant
7•DesoPK•1h ago•3 comments

Show HN: Sem – Semantic diffs and patches for Git

https://ataraxy-labs.github.io/sem/
1•rs545837•1h ago•1 comments

Hello world does not compile

https://github.com/anthropics/claudes-c-compiler/issues/1
35•mfiguiere•1h ago•20 comments

Show HN: ZigZag – A Bubble Tea-Inspired TUI Framework for Zig

https://github.com/meszmate/zigzag
3•meszmate•1h ago•0 comments

Metaphor+Metonymy: "To love that well which thou must leave ere long"(Sonnet73)

https://www.huckgutman.com/blog-1/shakespeare-sonnet-73
1•gsf_emergency_6•1h ago•0 comments

Show HN: Django N+1 Queries Checker

https://github.com/richardhapb/django-check
1•richardhapb•1h ago•1 comments

Emacs-tramp-RPC: High-performance TRAMP back end using JSON-RPC instead of shell

https://github.com/ArthurHeymans/emacs-tramp-rpc
1•todsacerdoti•1h ago•0 comments

Protocol Validation with Affine MPST in Rust

https://hibanaworks.dev
1•o8vm•1h ago•1 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
5•gmays•1h ago•0 comments

Show HN: Zest – A hands-on simulator for Staff+ system design scenarios

https://staff-engineering-simulator-880284904082.us-west1.run.app/
1•chanip0114•1h ago•1 comments

Show HN: DeSync – Decentralized Economic Realm with Blockchain-Based Governance

https://github.com/MelzLabs/DeSync
1•0xUnavailable•1h ago•0 comments

Automatic Programming Returns

https://cyber-omelette.com/posts/the-abstraction-rises.html
1•benrules2•1h ago•1 comments
Open in hackernews

Next JavaScript app is hacked, you just don't know it yet

https://audits.blockhacks.io/audit/your-next-js-app-is-already-hacked
10•block_hacks•1mo ago

Comments

block_hacks•1mo ago
Modern Next.js apps execute attacker-controlled input earlier than most teams realize — during framework deserialization, hydration, and Server Action resolution, often before application logging, validation, or auth hooks run.

In several real-world RCE investigations and red-team simulations, repeated 500 Internal Server Errors weren’t “noise” but early execution signals used by attackers to map execution boundaries and refine payloads. In some cases, the last observable 500 occurred right before stable code execution was achieved.

This write-up breaks down:

why deserialization in Next.js is part of execution, not preparation

how silent 500s can indicate pre-handler execution paths

why WAFs and app-level logs frequently miss this class of attacks

where the real attack surfaces live (middleware, RSC, Server Actions, custom servers)

Posting to get feedback from people who’ve seen or investigated similar SSR/RCE behavior in production.

block_hacks•1mo ago
what's up?
nickwrb•1mo ago
Probably the heavy AI-generated feel to the article.
whilenot-dev•1mo ago
...and the question what an Next.js audit has to do with "expert blockchain security audits", as advertised by BlockHacks (OP).
block_hacks•1mo ago
That’s a fair question.

Blockchain security work is rarely just cryptography in isolation. Web3 applications are still web applications. Wallets, dashboards, admin panels, and APIs are part of the system, and many of them are built with frameworks like Next.js.

Many of our clients building decentralized applications use Next.js as the frontend and sometimes as the backend-for-frontend layer. In real audits, issues often span both sides: smart contracts and the web stack that exposes them.

This article focuses on the web execution side of that reality, not on-chain cryptography. If you are only interested in protocol-level or cryptographic audits, we publish separate articles that focus specifically on those topics.

The point here is that compromises do not respect category boundaries. They usually start at the web layer and move inward.

Out of curiosity, in your experience, do you usually see real-world compromises starting at the contract layer itself, or at the surrounding web and infrastructure layer that interfaces with it?

block_hacks•1mo ago
Just to address the “AI-generated” point directly:

This isn’t something you can realistically get out of an LLM by prompting it....

If you ask an AI to write about Next.js RCE, it will stay abstract, high-level, and defensive by default. It will avoid concrete execution paths, real integration details, or examples that could be interpreted as enabling exploitation — because that crosses into dual-use content.

This article deliberately goes further than that line: it includes real execution ordering, concrete framework behaviors, code-level examples, deployment patterns, and operational comparisons drawn from incident analysis. That’s exactly the kind of specificity automated filters tend to suppress or generalize away.

It’s still non-procedural on purpose — no payloads or step-by-step exploitation - but it’s not “AI vague” either. The detail is there so defenders can reason about where execution and observability actually break down.

Whether that level of detail is useful is subjective, but the reason it reads differently is because it’s grounded in real systems and real failure modes, not generated summaries.

fabian2k•1mo ago
The article is very long and confusing to me. I think there are two main points in there, the stuff around them is more misleading than helpful to me.

The recent React/RSC/Next.js vulnerabilities were just bugs. Adding RSCs added some pretty complex new attack surface, and there were bugs in that. I think being skeptical about new, complex features like this is reasonable. But in the end there was nothing really new about these particular security vulnerabilities. If the framework has bugs in critical parts like this, your apps are insecure until those bugs are fixed or mitigated. I don't get why the author considers this a special case, all frameworks have critical parts that handle how the client data gets to the server. How these works is different, but in the end bugs in there can easily cause security issues.

The second point seems to be that it's easy to misconfigure Next.js middleware. I've read about that before, middleware in Next.js seems to be something that isn't actually middleware as commonly understood. That's a pretty big footgun.

block_hacks•1mo ago
To be clear, I’m not claiming this is some universal or inevitable failure mode, or that everyone running Next.js is compromised.

Every system has strengths and weaknesses. This is just one area where the tradeoffs aren’t always modeled correctly.

I don’t know what your setup looks like, how you deploy, or what your threat model is. You might already be accounting for this, or it might not matter for your use case. That’s fine.

The only point I’m making is that in modern SSR frameworks, execution can happen earlier than many teams expect — during deserialization, hydration, or framework setup — and when failures occur there, the signals look very different:

generic 500

no route handler invoked

no app logs

no auth context

That’s meaningfully different from traditional request-handling bugs that fail inside application control flow and leave traces people are used to seeing.

I’m not trying to persuade anyone or sell a solution. If you don’t find this relevant, you can safely ignore it.

But if you do run SSR in a security-sensitive environment, it doesn’t hurt to double-check where you believe the trust boundary actually starts — because in some cases it starts earlier than the app code.