frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Tell HN: Security Incident at Porter (YC S20)

4•leetrout•1h ago
Hug ops to the team. Justin is great and I know they have to be stressed from all of this.

Email I got from Porter follows, trimmed for HN character limit. Full text at https://gist.github.com/leetrout/2d172d2b95e8d24af0f3de0d0b03561e

---

What happened

On April 13th, 2026, the Porter team detected unauthorized activity originating from a stale AWS access key in our infrastructure. Upon detection, we immediately revoked all affected credentials and engaged our incident response processes, which included a comprehensive investigation.

Since April 13th, we have seen no further evidence of unauthorized activity within Porter networks and systems. Working closely with Cloudflare and Amazon, we have substantially completed the investigation of our environment and are continuing to prioritize supporting customers in their response efforts.

We have determined that the threat actor operated between 03:23 UTC April 11, 2026 and 15:24 UTC April 13, 2026. During this window, the threat actor leveraged IAM role chaining from Porter's infrastructure to access 21 customer cloud accounts. A few customers within the targeted group confirmed successful retrieval of on-cluster secrets. For these users, we currently have no evidence that secrets were abused or that other actions were taken beyond secret retrieval through this role chain. In particular, there was no evidence of any unauthorized modification of customer infrastructure for any of these users. Via the same initial access, the threat actor accessed credentials for the Porter GitHub App. Working with the GitHub team, we learned that requests were made to GitHub API endpoints for some users. We have since received confirmation that three customer repositories were cloned. User-configured Helm overrides and credentials for Porter integrations, including Slack and AI integrations for a limited number of users, were also exposed. All users with such credentials were directly informed this week.

[snip]

In the days since, we have:

Rotated all remaining Porter AWS access keys, including those not known to be affected Deployed additional logging and monitoring across all Porter AWS accounts Established endpoint detection and response, additional real-time alerting, an incident response retainer, and 24x7 monitoring with an outside security firm

Further restricted ingress network traffic

Engaged Cloudflare, Latacora, and AWS to audit our configurations

We will cover the full scope of our ongoing remediation, including elimination of long-lived access keys, least-privilege enforcement, role chaining restrictions, and expanded threat detection in a detailed write-up to follow.

What Porter customers should do

We have communicated tailored action items to all customers based on their levels of exposure. The following general steps apply to everyone:

Review GitHub activity logs

[snip]

Key events to look for:

Unexpected repository clones ("git.clone" events)

New deploy keys or SSH keys added to repositories

OAuth application authorizations you don't recognize

Changes to branch protection rules or webhook configurations

Rotate third-party credentials

Rotate credentials for any Porter integrations, including Slack, alerting services, and AI support, that have not been updated since April 14, 2026.

Engage a security firm if needed

[snip]

What comes next

The incident resulted from a stale, overprivileged access key. Our remediation is focused on eliminating the conditions that made this compromise possible, not just the specific vector that was exploited.

We will share a detailed write-up in the coming weeks covering our remediation and ongoing efforts to harden our infrastructure. We also intend to establish regular transparency updates on our security posture moving forward.

[snip]

Comments

kay_o•40m ago
So they did not say where the access key was leak from or who lost it somewhere?

Japan's Cherry Blossom Database, 1,200 Years Old, Has a New Keeper

https://www.nytimes.com/2026/04/17/climate/japan-cherry-blossom-database-scientist.html
2•caycep•2m ago•0 comments

OSS code review, in the era of LLMs

https://blog.ezyang.com/2026/04/oss-code-review-in-the-era-of-llms/
1•matt_d•4m ago•0 comments

Free tool for WebP and SVG optimization. Privat data

https://axiomoverclock.ca/
1•altered_carbine•8m ago•1 comments

A private space company has a new plan to bag an asteroid

https://arstechnica.com/space/2026/03/a-private-space-company-has-a-radical-new-plan-to-bag-an-as...
2•PaulHoule•10m ago•0 comments

Show HN: AI agents should browse your site, not call your API

https://www.rtrvr.ai/rover/blog/four-architectures-website-ai-agents
1•quarkcarbon279•11m ago•0 comments

Maine Said No to New Data Centers. Other States Are Racing to Follow

https://www.motherjones.com/environment/2026/04/maine-ai-data-center-moratorium-ban-energy-grid/
2•cdrnsf•12m ago•0 comments

If you want into Anthropic's Claude club, you may have to show ID

https://www.theregister.com/2026/04/16/anthropic_claude_id_verification_persona/
1•Bender•12m ago•1 comments

Cisco Wi-Fi boxes are filling their disks with 5MB of undeletable data every day

https://www.theregister.com/2026/04/17/cisco_wifi_ap_useless_data/
1•Bender•12m ago•0 comments

Intel eases reliance on TSMC with 'Merica-made Core Series 3 processors

https://www.theregister.com/2026/04/17/intel_eases_reliance_on_tsmc/
1•Bender•14m ago•0 comments

Does the brain make its own DMT? New study ignites debate

https://refractor.io/psychedelics/brain-dmt-endogenous-consciousness/
1•breve•15m ago•0 comments

From Endless Frontier to Enemy of the People: The Assault on Public Science

https://www.lawfaremedia.org/article/from-endless-frontier-to-enemy-of-the-people--the-assault-on...
4•hn_acker•23m ago•0 comments

Show HN: codeburn-rs; CodeBurn but 600x faster in Rust [view coding token usage]

https://github.com/rossnoah/codeburn-rs
1•noah32•24m ago•0 comments

Post-quantum cryptography migration at Meta: Framework, lessons, and takeaways

https://engineering.fb.com/2026/04/16/security/post-quantum-cryptography-migration-at-meta-framew...
1•hhs•24m ago•0 comments

NASA's X-59 Completes First Wheels-Up Flight

https://www.nasa.gov/blogs/quesst/2026/04/15/nasas-x-59-shows-streamlined-profile-in-wheels-up-fl...
4•big_toast•25m ago•3 comments

Gmail label bridge on Claude Cowork just broke

1•mangoe•28m ago•1 comments

How to Develop a Career Path Framework in 10 Steps

https://effortbox.com/blog/how-to-develop-a-career-path-framework/
1•andreylangovoy•28m ago•0 comments

Proteus: Heterogeneous FPGA Virtualization [pdf]

https://dse.in.tum.de/wp-content/uploads/2026/03/proteus-eurosys-26.pdf
1•matt_d•30m ago•0 comments

How to Host a Blog on a Subdirectory Instead of a Subdomain

https://www.davidma.org/blog/2025-11-14-host-your-blog-on-a-subdirectory/
7•taikon•32m ago•2 comments

A win–lose mindset affects political and policy preferences

https://www.aeaweb.org/research/zero-sum-politics-us
3•neehao•32m ago•0 comments

Show HN: Cogveo–Schedule AI agents to run Python on your files and email results

https://cogveo.com
1•thrinz•34m ago•0 comments

Cerebras Files for IPO as Demand Surges for More Efficient AI Chips

https://www.wsj.com/tech/chip-startup-cerebras-files-for-initial-public-offering-4aa27ae3
2•JumpCrisscross•35m ago•0 comments

LibreShockwave – Open-source SDK, decompiler and web player for Adobe Shockwave

https://github.com/Quackster/LibreShockwave
1•giancarlostoro•36m ago•0 comments

Trevex: A Black-Box Detection Framework for Data-Flow Transient Execution Vulns

https://roots.ec/publications/weber2026trevex
1•matt_d•37m ago•0 comments

The Danger of "Modern" Open Source

https://fagnerbrack.com/the-danger-of-modern-open-source-c15dd5206346
2•birdculture•38m ago•0 comments

Who Is Blake Whiting?

https://theamericanscholar.org/who-is-blake-whiting/
3•Caiero•39m ago•0 comments

How to teach the same skill to different robots

https://actu.epfl.ch/news/how-to-teach-the-same-skill-to-different-robots-2/
2•hhs•39m ago•0 comments

How an LLM becomes more coherent as we train it

https://www.gilesthomas.com/2026/04/how-an-llm-becomes-more-coherent-over-training
1•gpjt•40m ago•0 comments

Seinfeld Is Unfunny

https://tvtropes.org/pmwiki/pmwiki.php/Main/SeinfeldIsUnfunny
1•theopsimist•40m ago•0 comments

CRYS-L – execution engine with 0 variance for critical systems, verify with curl

https://desarrollador.xyz/benchmark.html
1•condesi•41m ago•0 comments

Adversarial distillation

https://www.frontiermodelforum.org/issue-briefs/issue-brief-adversarial-distillation/
1•hhs•50m ago•0 comments