frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

PNG Is Back

https://www.programmax.net/articles/png-is-back/
123•tbillington•2h ago•22 comments

How renewables are saving Texans billions

https://www.theclimatebrink.com/p/how-renewables-are-saving-texans
80•adrianN•2h ago•53 comments

Gemini CLI: your open-source AI agent

https://blog.google/technology/developers/introducing-gemini-cli/
51•meetpateltech•1h ago•23 comments

Microsoft Releases Classic MS-DOS Editor for Linux Written in Rust

https://github.com/microsoft/edit
165•ethanpil•5h ago•72 comments

Fun with uv and PEP 723

https://www.cottongeeks.com/articles/2025-06-24-fun-with-uv-and-pep-723
401•deepakjois•11h ago•124 comments

Writing toy software is a joy

https://blog.jsbarretto.com/post/software-is-joy
598•bundie•14h ago•239 comments

Thnickels

https://thick-coins.net/?_bhlid=8a5736885893b7837e681aa73f890b9805a4673e
103•jxmorris12•5h ago•25 comments

Build your first iOS app on Linux / Windows

https://xtool.sh/tutorials/xtool/first-app/
72•todsacerdoti•4h ago•12 comments

The Probability of a Hash Collision

https://kevingal.com/blog/collisions.html
7•subset•3d ago•0 comments

ChatGPT's enterprise success against Copilot fuels OpenAI/Microsoft rivalry

https://www.bloomberg.com/news/articles/2025-06-24/chatgpt-vs-copilot-inside-the-openai-and-microsoft-rivalry
203•mastermaq•14h ago•175 comments

Managing time when time doesn't exist

https://multiverseemployeehandbook.com/blog/temporal-resources-managing-time-when-time-doesnt-exist/
69•TMEHpodcast•5h ago•39 comments

PlasticList – Plastic Levels in Foods

https://www.plasticlist.org/
343•homebrewer•15h ago•147 comments

Mid-sized cities outperform major metros at turning economic growth into patents

https://www.governance.fyi/p/booms-not-busts-drives-innovation
46•guardianbob•6h ago•35 comments

Playing First Contact in Eclipse, a 3-Day Sci-Fi Larp

https://mssv.net/2025/06/15/playing-first-contact-in-eclipse-a-spectacular-3-day-sci-fi-larp/
24•adrianhon•2d ago•1 comments

Ancient X11 scaling technology

https://flak.tedunangst.com/post/forbidden-secrets-of-ancient-X11-scaling-technology-revealed
212•todsacerdoti•11h ago•159 comments

Finding a 27-year-old easter egg in the Power Mac G3 ROM

https://www.downtowndougbrown.com/2025/06/finding-a-27-year-old-easter-egg-in-the-power-mac-g3-rom/
335•zdw•16h ago•92 comments

Canal Boat Simulator

https://jacobfilipp.com/boat/
43•surprisetalk•2d ago•11 comments

Advanced Python Function Debugging with MCP Integration

https://github.com/kordless/gnosis-mystic
17•kordlessagain•2d ago•0 comments

XBOW, an autonomous penetration tester, has reached the top spot on HackerOne

https://xbow.com/blog/top-1-how-xbow-did-it/
196•summarity•14h ago•90 comments

Subsecond: A runtime hotpatching engine for Rust hot-reloading

https://docs.rs/subsecond/0.7.0-alpha.1/subsecond/index.html
123•varbhat•11h ago•18 comments

How to Think About Time in Programming

https://shanrauf.com/archive/how-to-think-about-time-in-programming
107•rmason•10h ago•33 comments

Starship: The minimal, fast, and customizable prompt for any shell

https://starship.rs/
407•benoitg•18h ago•184 comments

The bitter lesson is coming for tokenization

https://lucalp.dev/bitter-lesson-tokenization-and-blt/
240•todsacerdoti•15h ago•101 comments

Basic Facts about GPUs

https://damek.github.io/random/basic-facts-about-gpus/
269•ibobev•17h ago•59 comments

Scientists have created healthy, fertile mice with two fathers

https://www.economist.com/science-and-technology/2025/06/24/scientists-have-created-healthy-fertile-mice-with-two-fathers
15•bdev12345•4h ago•1 comments

PicoEMP: low-cost Electromagnetic Fault Injection (EMFI) tool

https://github.com/newaetech/chipshouter-picoemp
12•transpute•2h ago•5 comments

Gemini Robotics On-Device brings AI to local robotic devices

https://deepmind.google/discover/blog/gemini-robotics-on-device-brings-ai-to-local-robotic-devices/
173•meetpateltech•15h ago•71 comments

National Archives at College Park, MD, will become a restricted federal facility

https://www.archives.gov/college-park
277•LastTrain•8h ago•82 comments

Mapping LLMs over excel saved my passion for game dev

https://danieltan.weblog.lol/2025/06/map-llms-excel-saved-my-passion-for-game-dev
61•danieltanfh95•3d ago•19 comments

Show HN: Autumn – Open-source infra over Stripe

https://github.com/useautumn/autumn
118•ayushrodrigues•17h ago•33 comments
Open in hackernews

Show HN: VSCan - Detect Malicious VSCode Extensions

https://vscan.dev/
33•shadow-ninja•7h ago
Did you know that VSCode extensions run with full access to your system—including file system, network, and credentials? Worse, dozens of malicious extensions have already made it into the marketplace, silently compromising devices.

I am a security researcher and student developer who ran into this problem myself. To help tackle this, I built a 100% free tool (no login required) that scans VSCode (and Cursor/Windsurf) extensions for:

- Hidden malware and obfuscated code

- Dangerous permissions and API misuse

- Vulnerable dependencies and suspicious network connections

Users have already found hundreds of vulnerabilities in extensions. VSCan generates a clean, developer-friendly security report to help you understand what you're installing.

Try it out: https://www.vscan.dev

I have also developed custom sandboxing security architecture to restrict extensions from malicious activity during runtime. There is no existing technology that does this, so if you would be interested in trying it out or learning more, please reach out!

I would greatly appreciate any feedback and thanks for your help!

_______________________________________________________________________________

Here are some numbers as to what I have detected from a sample of 1077 extensions that are available on the Marketplace:

- 3 extensions are marked as malicious by VirusTotal - 7 extensions use malicious network connections (verified by VirusTotal) - 33 extensions have dependencies with critical vulnerabilities - 39 extensions have sensitive information (I have seen api keys, usernames, passwords, etc.) - 204 extension have poor development practices as marked by OSSF - 71 extensions have very high permissions (while not bad can be indicator of potential malicious activity)

As an example here is the link to an extension analysis with malicious network endpoints: https://vscan.dev/?analysisId=9e6c1849-3973-402b-a4ff-3b4023...

Comments

Groxx•5h ago
It is beyond madness and well into "intentionally negligent" to release a plugin system without a permissions model in, like, the last 20 years. Can't believe people aren't up in arms about how wide open vscode and similar things are, particularly now that docker is widespread.

Thanks for building a scanner! I wish it wasn't necessary :/

Sytten•5h ago
IDK, I have built a plugin system myself. It is very hard to have a plugin system that is both powerful, versatile and sandboxed. Like with with anything you can pick 2. Most of the plugins I use in vscode like prettier, rust analyzer, etc all need file access and process spawn. So if you sandbox it they would all need max access anyway which kind of defeats the purpose.
airstrike•4h ago
Sure but it would be nice to differentiate the permissions given to rust-analyzer and, say, "TODO Highlight"
Groxx•4h ago
There is an enormous amount of space between "it must be written in lua for safety" and "leftpad can upload your entire hard drive and then ransom it back to you".

Right now we have the latter.

notnullorvoid•4h ago
There's a big difference between max access and giving permission to run a specific binary which itself has no restrictions.

The difference does matter less when the binary and plugin are produced by the same group or individual though.

greggsy•2h ago
It’s not entirely unreasonable for VSCode to implement and enforce the same user acceptance controls that are currently ubiquitous on mobile platforms.
sunilagrawal•5h ago
That's concerning. What is Microsoft doing about it? Have you contacted them?
1oooqooq•5h ago
honestly, expecting safe software from Microsoft is like expecting a private browser from an advertising company .... oh.
rafaelgoncalves•4h ago
lol, so true, and that both are really good malware attack vectors (chrome/vscode extensions, etc.)
CGamesPlay•5h ago
You should definitely show the vulnerabilities you found on the front page, instead of showcasing low scores given to popular extensions. Claiming that "rust-analyzer" is "High Risk" is a strong turn-off from me thinking your service is useful (why? because it contains shell commands in the form of "taskDefinitions", and because it uses a dependency to parse ANSI sequences that hasn't received a commit in the past 90 days).
shadow-ninja•3h ago
Thanks for the feedback. I am constantly trying to refine the scoring metrics to make sure that these popular extensions that often need high permissions aren't flagged as a lower score than they should receive. It is a bit difficult though as higher permissions do indicate a higher potential for abuse so its a balancing act. As for showcasing the vulnerabilities that's a good idea I'll definitely implement.
meander_water•5h ago
Nice work! This has actually been an open feature request since 2018 [0]. I've been wanting something like this for a while.

[0] https://github.com/microsoft/vscode/issues/52116

ruined•5h ago
i wish the detail links on each analysis tile were real links, instead of some apparently weird javascript. seems broken in firefox

it would also be nice if i could expand all the analysis detail at once, instead of just one section at a time.

shadow-ninja•3h ago
Hm all the links seem to work for me on chrome. Could you let me know which specific link isn't working (is it just for that extension or for all extensions?).

I restricted it to one expanded at a time since more than one felt a bit crowded but that's something I might look into.

ruined•49m ago
the main green button on every item
whalesalad•5h ago
Using this is kind of a pain in the butt (looking thru all installed extensions and pasting in the raw name one by one). Could this be packaged as an extension itself, that scans other extensions? Or provide a CLI command to export all of your installed extensions as a list, which you can then upload? Or better, a one liner that will export your extensions to stdin, POST them to your API, and it will return a URL that you can click and load in the browser to explore the breakdown of (potential) issues.
shadow-ninja•3h ago
Thanks for the suggestion. I was thinking about making this into a chrome web extension that people can use on a marketplace page or even using MCP to make this tool really accessible for Cursor and Windsurf users.

As for the raw name, most extensions should work if you just put the display name. The search algorithm directly pulls from the vscode marketplace.

whalesalad•3h ago
I have 70 extensions installed though. Turns out there is a cli flag to print them, though: "code --list-extensions"

If you update your UI to accept a "bulk analyze" mode where a list of newline extensions could be submitted and rendered out on a page, that would be pretty cool.

shadow-ninja•3h ago
Oh yeah that's a really good idea. That would make it much easier for someone to use, though that many extensions would take a while. I would need to build up some more robust architecture before I could implement that.
tonymet•5h ago
vscodevim got 71/100 high risk. That's a pretty common one.
dlalchandani•4h ago
Finally we have something like this. This is very good work
staticshock•3h ago
I'd love a version of this where I can paste my full list of extensions, instead of a box where I can only paste one. The latter is tedious, so I'm not that likely to do it.
xsc•2h ago
A lot of directions you could take this. Free/Commercial. Thoughts?

Would be interesting to get more details on the sandbox.

bilalq•1h ago
I applaud the idea and love that you made this freely available without bolting on a SaaS subscription on top of it.

However, I always roll my eyes when I see high severity risk in dependency chains due to ReDoS vulnerabilities. Sure, it matters for a web server maybe, but code running in a CLI tool, browser app, VSCode extension, or even a serverless lambda runtime really won't be affected much. More often than not, I find the `npm audit` risk classifications to be nonsense.