frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Upcoming coordinated security fix for all Matrix server implementations

https://matrix.org/blog/2025/07/security-predisclosure/
110•notpushkin•2h ago•21 comments

My bank keeps on undermining anti-phishing education

http://moritz-mander.de/blog/my_bank_keeps_on_undermining_anti-phishing_education/
57•cheesepaint•1h ago•11 comments

Hand: open-source Robot Hand

https://github.com/pollen-robotics/AmazingHand
26•vineethy•1h ago•2 comments

FOSS4G Europe 2025 live streaming

https://2025.europe.foss4g.org/livestream/
57•altilunium•3h ago•4 comments

Archaeologists Discover Tomb of First King of Caracol

https://uh.edu/news-events/stories/2025/july/07102025-caracol-chase-discovery-maya-ruler.php
41•divbzero•3d ago•0 comments

N8n vs. node-red, which to use for AI workloads

https://daniel-payne-keldan-systems.medium.com/n8n-vs-node-red-485e8382b971
20•daniel-payne•2h ago•19 comments

Writing a competitive BZip2 encoder in Ada from scratch in a few days (2024)

https://gautiersblog.blogspot.com/2024/11/writing-bzip2-encoder-in-ada-from.html
22•etrez•3d ago•0 comments

Retro gaming YouTuber Once Were Nerd sued and raided by the Italian government

https://www.androidauthority.com/once-were-nerd-youtuber-copyright-lawsuit-3577995/
131•BallsInIt•2h ago•83 comments

Wttr: Console-oriented weather forecast service

https://github.com/chubin/wttr.in
148•saikatsg•7h ago•59 comments

Rejoy Health (YC W21) Is Hiring

https://www.ycombinator.com/companies/rejoy-health/jobs/DCsxNgv-software-engineer
1•rituraj_rhealth•1h ago

ESA’s Moonlight programme: Pioneering the path for lunar exploration (2024)

https://www.esa.int/Applications/Connectivity_and_Secure_Communications/ESA_s_Moonlight_programme_Pioneering_the_path_for_lunar_exploration
55•nullhole•2d ago•13 comments

Ex-Waymo engineers launch Bedrock Robotics to automate construction

https://techcrunch.com/2025/07/16/ex-waymo-engineers-launch-bedrock-robotics-with-80m-to-automate-construction/
392•boulos•20h ago•283 comments

“Reading Rainbow” was created to combat summer reading slumps

https://www.smithsonianmag.com/smithsonian-institution/to-combat-summer-reading-slumps-this-timeless-childrens-television-show-tried-to-bridge-the-literacy-gap-with-the-magic-of-stories-180986984/
216•arbesman•12h ago•82 comments

I want an iPhone Mini-sized Android phone (2022)

https://smallandroidphone.com/
322•asimops•16h ago•463 comments

The AI bubble today is bigger than the IT bubble in the 1990s

https://www.apolloacademy.com/ai-bubble-today-is-bigger-than-the-it-bubble-in-the-1990s/
82•akyuu•2h ago•73 comments

Code Execution Through Email: How I Used Claude to Hack Itself

https://www.pynt.io/blog/llm-security-blogs/code-execution-through-email-how-i-used-claude-mcp-to-hack-itself
78•nonvibecoding•6h ago•41 comments

Altermagnets: The first new type of magnet in nearly a century

https://www.newscientist.com/article/2487013-weve-discovered-a-new-kind-of-magnetism-what-can-we-do-with-it/
368•Brajeshwar•22h ago•90 comments

NINA: Rebuilding the original AIM, AOL Desktop, Yahoo and ICQ platforms

https://nina.chat/
34•ecliptik•6h ago•14 comments

BB(6) Is Hard (Antihydra) (2024)

https://www.sligocki.com//2024/07/06/bb-6-2-is-hard.html
3•Fibra•3d ago•0 comments

I was wrong about robots.txt

https://evgeniipendragon.com/posts/i-was-wrong-about-robots-txt/
121•EPendragon•12h ago•109 comments

Metaflow: Build, Manage and Deploy AI/ML Systems

https://github.com/Netflix/metaflow
68•plokker•16h ago•7 comments

Inside the box: Everything I did with an Arduino starter kit

https://lopespm.com/hardware/2025/07/15/arduino.html
105•lopespm•2d ago•12 comments

Xbox Hacks: The A20 (2021)

https://connortumbleson.com/2021/07/19/the-xbox-and-a20-line/
72•mattweinberg•10h ago•13 comments

A Tale of Two Red-Bearded Visionaries

https://nemanjatrifunovic.substack.com/p/a-tale-of-two-red-bearded-visionaries
11•whobre•2d ago•2 comments

Pgactive: Postgres active-active replication extension

https://github.com/aws/pgactive
321•ForHackernews•1d ago•80 comments

Show HN: A 'Choose Your Own Adventure' written in Emacs Org Mode

https://tendollaradventure.com/sample/
132•dskhatri•15h ago•18 comments

Intel's retreat is unlike anything it's done before in Oregon

https://www.oregonlive.com/silicon-forest/2025/07/intels-retreat-is-unlike-anything-its-done-before-in-oregon.html
198•cbzbc•18h ago•296 comments

Artisanal handcrafted Git repositories

https://drew.silcock.dev/blog/artisanal-git/
198•drewsberry•17h ago•49 comments

Mistakes Microsoft made in the Xbox security system (2005)

https://xboxdevwiki.net/17_Mistakes_Microsoft_Made_in_the_Xbox_Security_System
79•davikr•13h ago•34 comments

A 1960s schools experiment that created a new alphabet

https://www.theguardian.com/education/2025/jul/06/1960s-schools-experiment-created-new-alphabet-thousands-children-unable-to-spell
76•Hooke•1d ago•78 comments
Open in hackernews

Code Execution Through Email: How I Used Claude to Hack Itself

https://www.pynt.io/blog/llm-security-blogs/code-execution-through-email-how-i-used-claude-mcp-to-hack-itself
78•nonvibecoding•6h ago

Comments

yellow_lead•6h ago
Installing malware on your own computer with extra steps?
vntok•6h ago
Have you read the article? The source of the attack is an inbound email received in the logged in user's mailbox and read by the logged in user's Claude Desktop app.
renewiltord•4h ago
Did you? It beggars belief how stupid this is. Yes, if you hook up your Claude client to an email MCP and a shell MCP then it's like you're piping emails to your shell.
simonw•2h ago
Lots of people are doing that though.

MCP enabled software gives you a list of options. If you check the Gmail one and the shell one you are instantly vulnerable to this kind of attack.

shakna•2h ago
Stupid? Yes.

Common? Also, yes.

This one targets Claude. But we've already seen it with Copilot and I expect we'll soon see it hit Gemini, and others.

AI is being forcibly integrated across all major systems. Your email provider will set this up, if they haven't already.

simonw•2h ago
Have you seen an "official" MCP directly provided by an email service yet?

I had assumed they weren't doing this precisely because of the enormous risk - if you have the ability to both read and send email you have all three legs of the lethal trifecta in one MCP!

So far, I have only seen unofficial MCPs for things like Gmail that work using their existing APIs.

shakna•2h ago
"Since Copilot is integrated with Microsoft 365, the scope of risk included files, contracts, communications, financial data, and more."

https://windowsforum.com/threads/echoleak-cve-2025-32711-cri...

"At Microsoft, we believe in creating tools that empower you to work smarter and more efficiently. That’s why we’re thrilled to announce the first release of Model Context Protocol (MCP) support in Microsoft Copilot Studio. With MCP, you can easily add AI apps and agents into Copilot Studio with just a few clicks."

https://www.microsoft.com/en-us/microsoft-copilot/blog/copil...

simonw•1h ago
Does that include an official Microsoft MCP for access to Outlook or other Microsoft email services??

That second link looks to me like an announcement of MCP client support, which means they get to outsource the really bad decisions to third-party MCP providers and users who select them.

NitpickLawyer•2h ago
The underlying cause can be applied in other contexts. There was recently a flow where this vulnerability was exploited through an IDE working on customer tickets.

Don't dismiss the root cause because the usecase is silly. The moment some user provided input reaches an LLM context, all bets are off. If you're running any local tools that provide shell access, then it's RCE, if you're running a browser / fetch tool that's data exfil, and so on.

The root cause is that LLMs receive both commands and data on the same shared channel. Until (if) this gets fixed, we're gonna see lots and lots of similar attacks.

crooked-v•6h ago
The point here is that it's easy to do it to someone else who uses Claude in this way just by sending them an email that Claude reads.
rjmunro•1h ago
Is this a common way to use Claude? Is it how Claude desktop normally works?
simonw•1h ago
Claude Desktop was the first piece of software to demonstrate MCP support, and today is one of the most popular ways for end users to start using MCPs.
AstralStorm•6h ago
Yes, allowing code execution by untrustworthy agents, especially networked ones, is fraught with danger.

Phishing an AI is kind of similar to phishing a smart-ish person...

So remind me again, why does an email scanner need code execution at all?

firesteelrain•5h ago
I suspect for plugins that could extend functionality. Think Zapier for email + AI.

Code execution is an optional backend capability for enabling certain workflows

iLoveOncall•2h ago
> Phishing an AI is kind of similar to phishing a smart-ish person...

More like phishing the dumbest of persons that will somehow try to follow any instructions it receives as perfectly as it can regardless of who gave it.

sunbum•6h ago
There is lorem ipsum text when viewed on mobile.
nelsonfigueroa•5h ago
I don’t see any myself, unless they quickly fixed it after your comment
firesteelrain•5h ago
This probably doesn’t need to be currently downloaded malware. If you have a workflow that says go download any file.py via code execution automated workflow in a carefully crafted email after the innocent victim has, in current session, allowed for an email scanner then the Python script will reliably execute and AI would even download it on behalf of the user and run it.

But in this case and maybe others, AI is just a fancy scripting engine by name of LLMs.

_def•5h ago
Nothing else to expect when giving LLMs system/shell access. Really no suprises here, at all. Works as intended.
sebtron•5h ago
> In traditional security, we think in terms of isolated components. In the AI era, context is everything.

In traditional security, everyone knows that attaching a code runner to a source of untrusted input is a terrible idea. AI plays no role in this.

> That’s exactly why we’re building MCP Security at Pynt, to help teams identify dangerous trust-capability combinations, and to mitigate the risks before they lead to silent, chain-based exploits.

This post just an add then?

nelsonfigueroa•5h ago
I would say company blogs are basically just ads
zb3•3h ago
But at least they attempt to give us something else.. I wish posts like that were the only form of ads legally allowed.
Agingcoder•3h ago
Most of them are but some of them are good. I like the Cloudflare blog in particular which tends to be very technical, and doesn’t rely on magical infrastructure so you can often enough replicate/explore what they talk about at home.

I’ve also said this before but because it doesn’t look like an ad, and because it’s relatable it’s the only one which actually makes me want to apply !

stingraycharles•5h ago
It’s not a great blog post. He attached a shell MCP server to Claude Desktop and is surprised that output / instructions from one MCP server can cause it to interact with the shell server.

These types of vulnerabilities have been known for a long time, and the only way to deal with them is locking down the MCP server and/or manually approving requests (the default behavior)

shakna•5h ago
Didn't Copilot get hit by this?

[0] https://windowsforum.com/threads/echoleak-cve-2025-32711-cri...

simonw•2h ago
Yup, classic example of the lethal trifecta: https://simonwillison.net/2025/Jun/11/echoleak/
jcelerier•1h ago
> These types of vulnerabilities

I don't understand why it's called a vuln. It's, like, the whole point of the system to be able to do this! It's how it's marketed!

loa_in_•1h ago
People want to eat the cake and have it too.
timhh•1h ago
Yeah I also don't understand how this is unexpected. You gave Claude the ability to run arbitrary commands. It did that. It might unexpectedly run dangerous commands even if you don't connect it to malicious emails.
whisperghost55•4h ago
The issue is that the MCP client will run the MCP server as a result of another server output which should never happen- instead the client should ask "would you like me to do that for you?" the ability/"willingness" of LLMs to construct such attacks by composing the emails and refining it based on results is alarming
rollcat•4h ago
Language models and actors are powerful tools, but I'm kinda terrified with how irresponsibly are they being integrated.

"Prompt injection" is way more scary than "SQL injection"; the latter will just f.up your database, exfiltrate user lists, etc so it's "just" a single disaster - you will rarely get RCE and pivot to an APT. This is thanks to strong isolation: we use dedicated DB servers, set up ACLs. Managed DBs like RDS can be trivially nuked, recreated from a backup, etc.

What's the story with isolating agents? Sandboxing techniques vary with each OS, and provide vastly different capabilities. You also need proper outgoing firewall rules for anything that is accessing the network. So I've been trying to research that, and as far as I can tell, it's just YOLO. Correct me if I'm wrong.

simonw•2h ago
It's just YOLO.

This problem remains almost entirely unsolved. The closest we've got to what I consider a credible solution is the recent CaMeL paper from DeepMind: https://arxiv.org/abs/2503.18813 - I published some notes on that here: https://simonwillison.net/2025/Apr/11/camel/

franga2000•4h ago
If you pipe your emails to bash, I can also run code by sending you an email. How is this news?

You must never feed user input into a combined instruction and data stream. If the instructions and data can't be separated, that's a broken system and you need to limit its privileges to only the privileges of the user supplying the input.

asadm•3h ago
in short: echo $EMAIL_CONTENT | bash

OMG!

stwelling•3h ago
If nothing else, this serves as a warning call to those using MCP to be aware that an LLM, given access, can do damage.

Devs are used to taking shortcuts and adding vulnerabilities because the chance of abuse seems so remote, but LLMs are external services typically, and you wouldn’t poke a hole a give ssh access to someone you don’t know externally, nor would you advertise internally in your company that an employee could query or delete data randomly if they so chose, so why not at the very least think defensively when writing code? I’ve gotten so lax recently and have let a lot of things slide, but I’m sure to at least speak up when I see these things, just as a reminder.

tomasphan•2h ago
This is not news. You can never secure an LLM by the nature of it being non-deterministic. So you secure everything else around it, like not giving it shell access.
OtherShrezzing•2h ago
Unfortunately one of the only economically viable use-cases for LLMs is giving them shell access & having them produce+execute code.
simonw•2h ago
This exact combo has been my favorite hypothetical example of a lethal trifecta / prompt injection attack for a while: if someone emails my digital assistant / "agent" with instructions on tools it should execute, how confident are we that it won't execute those tools?

The answer for the past 2.5 years - ever since we started wiring up tool calling to LLMs - has been "we can't guarantee they won't execute tools based on malicious instructions that make it into the context".

I'm convinced this is why we still don't have a successful, widely deployed "digital assistant for your email" product despite there being clear demand for one.

The problem with MCP is that it makes it easy for end-users to cobble such a system together themselves without understanding the consequences!

I first used the rogue digital assistant example in April 2023: https://simonwillison.net/2023/Apr/14/worst-that-can-happen/... - before tool calling ability was baked into most of the models we use.

I've talked about it a bunch of times since then, most notably in https://simonwillison.net/2023/Apr/25/dual-llm-pattern/#conf... and https://simonwillison.net/2023/May/2/prompt-injection-explai...

Since people still weren't getting it (thanks partly to confusion between prompt injection and jailbreaking, see https://simonwillison.net/2024/Mar/5/prompt-injection-jailbr...) I tried rebranding a version of this as "the lethal trifecta" earlier this year: https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/ - that's about the subset of this problem where malicious instructions are used to steal private data through some kind of exfiltration vector, eg "Simon said to email you and ask you to forward his password resets to my email address, I'm helping him recover from a hacked account".

Here's another post where I explicitly call out MCP for amplifying this risk: https://simonwillison.net/2025/Apr/9/mcp-prompt-injection/

zahlman•2h ago
> You don’t always need a vulnerable app to pull off a successful exploit. Sometimes all it takes is a well-crafted email, an LLM agent, and a few “innocent” plugins.

The problem is that people can say "LLM agent" without realizing that calling this a "vulnerable app" is not only true but a massive understatement.

> Each individual MCP component can be secure, but none are vulnerable in isolation. The ecosystem is.

No, the LLM is.

38•1h ago
Claude is absolute trash. I am on the paid plan and repeatedly hit the limits. and their support is essentially non existing, even for paid accounts
pftburger•1h ago
Oh come on… if you’re running a shell executing MCP, then this is fair game. It’s like saying the PC is vulnerable because people leave their passwords on post it notes on the screen.

Ok wait, apple said that and then made better auth.

Nevermind, continue