frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Native Instant Space Switching on macOS

https://arhan.sh/blog/native-instant-space-switching-on-macos/
1•birdculture•1m ago•0 comments

Mitochondrial Ca2 efflux controls neuronal metabolism and long-term memory

https://www.nature.com/articles/s42255-026-01451-w
1•PaulHoule•4m ago•0 comments

Siclair Microvision (1977)

https://r-type.org/articles/art-452.htm
1•joebig•5m ago•0 comments

Android Canary blesses the Linux Terminal with a modern UI, new features

https://www.androidauthority.com/android-canary-linux-terminal-upgrades-3651830/
1•thunderbong•6m ago•0 comments

Open-source startups should do more embedded/OEM deals

https://getlago.com/blog/embedded-software
1•FinnLobsien•6m ago•0 comments

Red Lobster's Last Gasp

https://www.bloomberg.com/news/features/2026-03-24/red-lobster-turnaround-in-question-as-restaura...
1•herbertl•6m ago•0 comments

$500 GPU outperforms Claude Sonnet on coding benchmarks

https://github.com/itigges22/ATLAS
1•yogthos•7m ago•0 comments

Show HN: pubclub – Historical figures and political bots debate today's news

https://www.pubclub.ai/
1•dwshorowitz•7m ago•0 comments

Colibri – chat platform built on the AT Protocol for communities big and small

https://colibri.social/
3•todotask2•8m ago•1 comments

Uncensored: Explicit only playlists on YouTube Music

https://github.com/ttlequals0/uncensored
1•Ttlequals0•10m ago•0 comments

How do you guys handle MFA for AI agents?

1•rayruizhiliao•10m ago•0 comments

The Shape of Jaggedness

https://www.oneusefulthing.org/p/the-shape-of-ai-jaggedness-bottlenecks
1•colonCapitalDee•11m ago•0 comments

Google bumps up Q Day deadline to 2029

https://arstechnica.com/security/2026/03/google-bumps-up-q-day-estimate-to-2029-far-sooner-than-p...
1•rediguanayum•12m ago•1 comments

Want to use the Windows 11 stopwatch? Please update first

https://stopwatch.court.is/
1•jscnz•13m ago•0 comments

We couldn't find an API that understood construction drawings, so we built one

https://www.getanchorgrid.com/developer/docs/changelog/construction-drawings-are-data-prisons
1•wcisco17•14m ago•1 comments

California Regulator Says Tesla's 'Robotaxis' Are More Like a Limo in the Law

https://gizmodo.com/california-regulator-says-teslas-robotaxis-are-more-like-a-limo-in-the-eyes-o...
1•MaysonL•14m ago•0 comments

Cline Kanban

https://cline.bot/kanban
1•Flere-Imsaho•15m ago•0 comments

Base experiment at CERN succeeds in transporting antimatter

https://home.cern/news/press-release/experiments/base-experiment-cern-succeeds-transporting-antim...
1•bko•15m ago•0 comments

EPA approves sale of a higher-ethanol fuel to try to lower gas prices

https://apnews.com/article/gasoline-ethanol-e15-epa-price-pollution-efd15da2b3016cb77fc3cbcf7478be87
1•geox•15m ago•1 comments

The Oxford Comma – Why and Why Not

https://www.deborahcourtbooks.com/post/the-oxford-comma-why-and-why-not
1•taubek•16m ago•0 comments

New study says gnomes are responsible for breaking your electronics

https://lzon.ca/posts/series/duck/gadget-gnomes/
1•jpmitchell•17m ago•0 comments

Reinventing the Pull Request

https://lubeno.dev/blog/reinventing-the-pull-request
2•bkolobara•18m ago•0 comments

How Can America Be So Miserable When It's So Rich?

https://www.nytimes.com/2026/03/26/opinion/economy-attitudes-republicans-democrats.html
3•simonebrunozzi•19m ago•3 comments

Old-Games.com

https://www.old-games.com/
3•helloplanets•19m ago•0 comments

Algorithms, Neo-Brokers, and Political Power Reshaping Who Wins on Wall Street

https://respublica.media/the-rigged-casino/
1•amadeuspagel•19m ago•0 comments

An LLM's not going to tell you no (2024)

https://derekkedziora.com/notes/2024-12-11-an-llms-not-going-to-tell-you-no
1•speckx•20m ago•0 comments

Families are fed up with social media

https://nypost.com/2026/03/25/opinion/legal-double-whammy-is-just-the-start-for-social-media-comp...
1•1vuio0pswjnm7•20m ago•0 comments

Ask HN: Will AI ever be cheap?

2•worldsavior•21m ago•0 comments

The surprising science behind red-light therapy – and how it works

https://www.nature.com/articles/d41586-026-00878-1
1•mikhael•21m ago•0 comments

You shouldn't use ultrathink in Claude Code

https://www.claudecodecamp.com/p/claude-code-extended-thinking
3•aray07•22m ago•0 comments
Open in hackernews

My minute-by-minute response to the LiteLLM malware attack

https://futuresearch.ai/blog/litellm-attack-transcript/
77•Fibonar•1h ago
Related: Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised - https://news.ycombinator.com/item?id=47501426 (483 comments)

Comments

Fibonar•1h ago
Callum here, I was the developer that first discovered and reported the litellm vulnerability on Tuesday. I’m sharing the transcript of what it was like figuring out what was going on in real time, unedited with only minor redactions.

I didn’t need to recount my thought process after the fact. It’s the very same ones I wrote down to help Claude figure out what was happening.

I’m an ML engineer by trade, so having Claude walk me through exactly who to contact and a step by step guide of time-critical actions felt like a game-changer for non-security researchers.

I'm curious whether the security community thinks more non-specialists finding and reporting vulnerabilities like this is a net positive or a headache?

Bullhorn9268•1h ago
Not a security researcher, but this is IMHO obviously positive that the other side of the arms race is also getting stronger, and I would argue it's stronger than on the bad guys' side, due to the best being somewhat responsible and adding guardrails.

I like the presentation <3.

rgambee•1h ago
I've heard stories lately of open source projects being inundated with vulnerability reports and PRs. But in this case, it seems like AI assistance was clearly a boon for root-causing and reporting this so quickly.
dot_treo•1h ago
Looks like we discovered it at essentially the same time, and in essentially the same way. If the pth file didn't trigger a fork-bomb like behavior, this might have stayed undiscoverd for quite a bit longer.

Good thinking on asking Claude to walk you through on who to contact. I had no idea how to contact anyone related to PyPI, so I started by shooting an email to the maintainers and posting it on Hacker News.

While I'm not part of the security community, I think everyone who finds something like this, should be able to report it. There is no point in gatekeeping the reporting of serious security vulnerabilities.

notatallshaw•1h ago
> I had no idea how to contact anyone related to PyPI

https://pypi.org/security/:

> If you've identified a security issue with a project hosted on PyPI Login to your PyPI account, then visit the project's page on PyPI. At the bottom of the sidebar, click Report project as malware.

0cf8612b2e1e•52m ago
The existing account to report is an unfortunate obstacle. Presumably not a huge deal if you were auditing code for vulnerabilities, but still an annoyance.
notatallshaw•35m ago
The threat actor was sophisticated enough to spam GitHub issues with dozens of different accounts. I imagine they could completely overwhelm PyPI with unauthenticated reports.
Fibonar•47m ago
The best part was that I didn't even mean to ask Claude who to contact! I was still in disbelief that I was one of the first people affected, so I asked for existing reports on the assumption that if it was real I definitely wasn't the first.

The fork-bomb part still seems really weird to me. A pretty sophisticated payload, caught by missing a single `-S` flag in the subprocess call.

gbrindisi•1h ago
thanks for raising the alarm and sharing this, very insightful

(also beautifully presented!)

cedws•1h ago
GitHub, npm, PyPi, and other package registries should consider exposing a firehose to allow people to do realtime security analysis of events. There are definitely scanners that would have caught this attack immediately, they just need a way to be informed of updates.
Fibonar•1h ago
So I've been thinking about this a lot since it happened. I've already added dependency cooldowns https://nesbitt.io/2026/03/04/package-managers-need-to-cool-... to every part of our monorepo. The obvious next thought is "am I just dumping the responsibility onto the next person along"? But as you point out it just needs to give automated scanners enough time to pick up on obvious signs like the .pth file in this case.
cedws•50m ago
It is in a sense dumping responsibility, but there’s a legion of security companies out there scanning for attacks all the time now to prove their products. They’re kind of doing a public service and you’re giving them a chance to catch attacks first. This is why I think dep cooldowns are great.
simonw•1h ago
PyPI does exactly that, and it's been very effective. Security partners can scan packages and use the invite-only API to report them: https://blog.pypi.org/posts/2024-03-06-malware-reporting-evo...
staticassertion•1h ago
PyPI is pretty best-in-class here and I think that they should be seen as the example for others to pursue.

The client side tooling needs work, but that's a major effort in and of itself.

cedws•53m ago
Thanks, TIL.
charcircuit•11m ago
It is not effective if it just takes a simple base64 encode to bypass. If Claude is trivially able to find that it is malicious then Pypi is being negligent.
ting0•30m ago
I feel like they should be legally responsible for providing scanning infrastructure for this sort of thing. The potential economic damage can be catastrophic. I don't think this is the end of the litellm story either, given that 47k+ people were infected.
dmitrygr•1h ago
Consider this your call to write native software. There is yet to be a supply chain attack on libc
ddp26•1h ago
Sure, but this is a pretty onerous restriction.

Do you think supply chain attacks will just get worse? I'm thinking that defensive measures will get better rapidly (especially after this hack)

dmitrygr•31m ago
> Do you think supply chain attacks will just get worse? I'm thinking that defensive measures will get better rapidly (especially after this hack)

I think the attacks will get worse and more frequent -- ML tools enable doing it easily among people who were previously not competent enough to pull it off but now can. There is no stomach for the proper defensive measures among the community for either python or javascript. Why am i so sure? This is not the first, second, third, or fourth time this has happened. Nothing changed.

applfanboysbgon•21m ago
Not only do the tools enable incompetent attackers, they also enable a new class of incompetent library developers to create and publish packages, and a new class of incompetent application developers to install packages without even knowing what packages are being used in the code they aren't reading, and a new class of incompetent users who are allowing OpenClaw to run completely arbitrary code on their machines with no oversight. We are seeing only the tip of the iceberg of the security breaches that are to come.
dmitrygr•13m ago
100%
ting0•28m ago
They will certainly get worse. LLMs make it so much easier.
woodruffw•1h ago
This is presumably because libc just doesn't change very often (not meaning code changes, but release cadence). But the average native software stack does have lots of things that change relatively often[1]. So "native" vs. not is probably not a salient factor.

[1]: https://en.wikipedia.org/wiki/XZ_Utils_backdoor

everforward•35m ago
I think that article proves the opposite.

> While xz is commonly present in most Linux distributions, at the time of discovery the backdoored version had not yet been widely deployed to production systems, but was present in development versions of major distributions.

Ie if you weren’t running dev distros in prod, you probably weren’t exposed.

Honestly a lot of packaging is coming back around to “maybe we shouldn’t immediately use newly released stuff” by delaying their use of new versions. It starts to look an awful lot like apt/yum/dnf/etc.

I would wager in the near future we’ll have another revelation that having 10,000 dependencies is a bad thing because of supply chain attacks.

consp•21m ago
This is the security equivalent of having a better lock than your neighbour. Won't save you in the end but you won't be first. Then again, yours could also be broken and you don't get to tick of that audit checkbox.
woodruffw•9m ago
Per below, xz is also an example of us getting lucky.

> I would wager in the near future we’ll have another revelation that having 10,000 dependencies is a bad thing because of supply chain attacks.

Yes, but this also has nothing to do with native vs. non-native.

dmitrygr•33m ago
your link disproves your claim. no naive app depended on xz version >= latest. Most sane distros take time to up-rev. That is why the xz backdoor was, in fact, in NO stable distro

And not changing often is a feature, yes.

woodruffw•10m ago
I don't think it does; I think the industry opinion on xz is that we got lucky in terms of early detection, and that we shouldn't depend on luck.

(I don't know what a "sane" distro is; empirically lots of distros are bleeding-edge, so we need to think about these things regardless of value judgements.)

dmitrygr•8m ago
Sane: debian-stable
hrmtst93837•23m ago
Native code still have plenty of attack surface. If you do everything through pip/npm you might as well publish your root password, but pretending a clean C build from source makes you safe is just cosplay for people who confuse compiler output with trust. If anything people are way too quick to trust a tarball that builds on the first try.
dmitrygr•21m ago
100% with you. Anything that builds from the first try is 100% malicious. No real software builds without 5-30 tweaks of the makefile. And anything on npm/pip is malicious with a fixed chance that you have no control over, as seen in this attack.

But the data remains: no supply chain attacks on libc yet, so even if it COULD happen, this HAS and that merely COULD.

mr_mitm•10m ago
Native software? You mean software without dependencies? Because I don't see how you solve the supply chain risk as long as you use dependencies. Sure, minimizing the number of dependencies and using mostly stable dependencies also minimizes the risk, but you'll pay for it with glacial development velocity.
dmitrygr•9m ago
Slower development velocity but no third-party-induced hacks surely has a market. :)
simonw•1h ago
First time I've seen my https://github.com/simonw/claude-code-transcripts tool used to construct data that's embedded in a blog post, that's a neat way to use it. I usually share them as HTML pages in Gists instead, e.g. whttps://gisthost.github.io/?effbdc564939b88fe5c6299387e217da...
Fibonar•56m ago
I’m a big proponent of it within our company! CC tried to style it to blend in with our blog but it was kind of a disaster. Definitely had a new appreciation for the out-of-the-box experience. I also tried to include the individual sub-pages of Claude investigating but it really trawled my whole machine looking for malware. Don’t know if you’ve thought of any systematic ways of redacting the endless pages of detailed logs?
moralestapia•1h ago
*salutes*

Thank you for your service, this brings so much context into view, it's great.

S0y•36m ago
> Where did the litellm files come from? Do you know which env? Are there reports of this online?

> The litellm_init.pth IS in the official package manifest — the RECORD file lists it with a sha256 hash. This means it was shipped as part of the litellm==1.82.8 wheel on PyPI, not injected locally.

> The infection chain:

> Cursor → futuresearch-mcp-legacy (v0.6.0) → litellm (v1.82.8) → litellm_init.pth

This is the scariest part for me.

RALaBarge•5m ago
Maybe the people who use emacs for everything are the only safe ones?
Bullhorn9268•35m ago
The fact pypi reacted so quickly and quarantined the package in like 30 minutes after the report is pretty great!
Shank•13m ago
Probably one of the best things about AI/LLMs is the democratization of reverse engineering and analysis of payloads like this. It’s a very esoteric skill to learn by hand and not very immediately rewarding out of intellectual curiosity most times. You can definitely get pointed in the right direction easily, now, though!