frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Infinite Pixels

https://meyerweb.com/eric/thoughts/2025/08/07/infinite-pixels/
56•OuterVale•46m ago•0 comments

Baltimore Assessments Accidentally Subsidize Blight–and How We Can Fix It

https://progressandpoverty.substack.com/p/how-baltimore-assessments-accidentally
20•surprisetalk•1h ago•1 comments

New AI Coding Teammate: Gemini CLI GitHub Actions

https://blog.google/technology/developers/introducing-gemini-cli-github-actions/
100•michael-sumner•4h ago•44 comments

Outdated Software, Nationwide Chaos: United Grounds Flights After Meltdown

https://allchronology.com/2025/08/07/outdated-software-nationwide-chaos-united-airlines-grounds-flights-after-system-meltdown/
4•rectang•3m ago•1 comments

Arm Desktop: x86 Emulation

https://marcin.juszkiewicz.com.pl/2025/07/22/arm-desktop-emulation/
12•PaulHoule•1h ago•0 comments

We replaced passwords with something worse

https://blog.danielh.cc/blog/passwords
529•max__dev•11h ago•415 comments

How AI Conquered the US Economy: A Visual FAQ

https://www.derekthompson.org/p/how-ai-conquered-the-us-economy-a
48•rbanffy•3h ago•33 comments

Show HN: Stasher – Burn-after-read secrets from the CLI, no server, no trust

https://github.com/stasher-dev/stasher-cli
31•stasher-dev•2h ago•22 comments

Leonardo Chiariglione: “I closed MPEG on 2 June 2020”

https://leonardo.chiariglione.org/
154•eggspurt•3h ago•112 comments

GoGoGrandparent (YC S16) Is Hiring Back End and Full-Stack Engineers

1•davidchl•1h ago

An LLM does not need to understand MCP

https://hackteam.io/blog/your-llm-does-not-care-about-mcp/
34•gethackteam•1h ago•29 comments

Claude Code IDE integration for Emacs

https://github.com/manzaltu/claude-code-ide.el
699•kgwgk•1d ago•235 comments

Cracking the Vault: How we found zero-day flaws in HashiCorp Vault

https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
154•nihsy•6h ago•57 comments

The Whispering Earring (Scott Alexander)

https://croissanthology.com/earring
38•ZeljkoS•3h ago•4 comments

PastVu: Historical Photographs on Current Maps

https://pastvu.com/?_nojs=1
17•lapetitejort•2d ago•1 comments

Show HN: Aura – Like robots.txt, but for AI actions

https://github.com/osmandkitay/aura
16•OsmanDKitay•1d ago•14 comments

AI Ethics is being narrowed on purpose, like privacy was

https://nimishg.substack.com/p/ai-ethics-is-being-narrowed-on-purpose
93•i_dont_know_•2h ago•57 comments

Running GPT-OSS-120B at 500 tokens per second on Nvidia GPUs

https://www.baseten.co/blog/sota-performance-for-gpt-oss-120b-on-nvidia-gpus/
204•philipkiely•11h ago•129 comments

Synthetic Biology for Space Exploration

https://www.nature.com/articles/s41526-025-00488-7
6•PaulHoule•2d ago•0 comments

Splatshop: Efficiently Editing Large Gaussian Splat Models

https://momentsingraphics.de/HPG2025.html
17•ibobev•3d ago•0 comments

Debounce

https://developer.mozilla.org/en-US/docs/Glossary/Debounce
93•aanthonymax•2d ago•47 comments

Project Hyperion: Interstellar ship design competition

https://www.projecthyperion.org
316•codeulike•17h ago•242 comments

Children's movie leads art historian to long-lost Hungarian masterpiece (2014)

https://www.theguardian.com/world/2014/nov/27/stuart-little-art-historian-long-lost-hungarian-masterpiece
30•how-about-this•3d ago•4 comments

Fastmail breaks UI in production

https://twitter.com/licyeus/status/1953438985381974493
21•blux•49m ago•14 comments

Did Craigslist decimate newspapers? Legend meets reality

https://www.poynter.org/business-work/2025/did-craigslist-kill-newspapers-poynter-50/
36•zdw•3d ago•30 comments

Show HN: Kitten TTS – 25MB CPU-Only, Open-Source TTS Model

https://github.com/KittenML/KittenTTS
882•divamgupta•1d ago•340 comments

Maybe we should do an updated Super Cars

https://spillhistorie.no/2025/07/31/maybe-we-should-do-an-updated-version/
6•Kolorabi•1h ago•1 comments

Rules by which a great empire may be reduced to a small one (1773)

https://founders.archives.gov/documents/Franklin/01-20-02-0213
210•freediver•14h ago•133 comments

A candidate giant planet imaged in the habitable zone of α Cen A

https://arxiv.org/abs/2508.03814
102•pinewurst•12h ago•34 comments

Litestar is worth a look

https://www.b-list.org/weblog/2025/aug/06/litestar/
310•todsacerdoti•18h ago•79 comments
Open in hackernews

Cracking the Vault: How we found zero-day flaws in HashiCorp Vault

https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/
154•nihsy•6h ago

Comments

v5v3•6h ago
Fantastic work guys. Thank you.
maxall4•6h ago
Mmm AI writing gotta love it… /s
markasoftware•6h ago
it really does have that AI writing style, and these are the sorts of bugs I imagine an AI could have found...I wonder if that's what they did (though they claim it was all manual source code inspection).
darkwater•6h ago
Having the blog post explaining the findings written - or aided - by an AI doesn't necessarily mean that the findings themselves were found using AI.

Edit: even if the TLD they use is .ai and they heavily promote themselves as revolutionary AI security firm yadda yadda yadda

neomantra•4h ago
From reading it and mostly from the introduction, it felt like they rolled up their sleeves and really dug into the code. This was refreshing versus the vibe-coding zeitgeist.

I would be curious what AI tools assisted in this and also what tools/models could re-discover them on the unpatched code base now that we know they exist.

Cthulhu_•4h ago
I can imagine they could have used AI to analyze, describe and map out what exactly happens in the code. Then again, it's Go, following the flow of code and what exactly is being checked is pretty straightforward (see e.g. https://github.com/hashicorp/vault/blob/main/vault/request_h... which was mentioned in the article)
benterix•3h ago
> .I wonder if that's what they did (though they claim it was all manual source code inspection).

Give me one reason why they would do it by hand if they can automate is as much as possible. Vulnerability research is an area without any guarantees, you can spend months looking for bugs and find nothing. These guys are not stupid, they used LLMs trying to find whatever they could, they probably explored more blind alleys than we will know, and then got very good results. Many other companies are doing the same.

klas_segeljakt•6h ago
https://youtu.be/SbeNRICgzTA?si=YdLrozOEtCBTclW2
unwind•6h ago
This feels like a dupe of https://news.ycombinator.com/item?id=44821250.

Edit: replaced link with link to HN post, not the article in that post.

tiedemann•6h ago
TLDR: string parsing is hard and most of us are vulnerable to assumptions and/or never get around to do those fuzzy tests properly when checking that input is handled correctly.
compressedgas•6h ago
I don't see any parsing going on here. They failed to normalize the input values the way that the LDAP server does before applying rate limiting resulting in an effectively higher than expected login attempt rate limit.
procaryote•6h ago
A lot of these are on the pattern of normalising input as late as possible, which is an odd choice for a security product.
LtWorf•4h ago
I mean… it's hashicorp… did you expect sanity?

One of the vault backends has a size limit and so secret keys larger than 2048 bits would not fit. Amazing tool.

Cthulhu_•4h ago
I'd argue it's odd that they (or LDAP) normalise input in the first place. I can sort-of understand username normalization to avoid having both "admin" and "Admin" accounts, but that check only needs to be done when creating an account, when logging in it should not accept "Admin" as valid for account "admin".

But I'm neither a security person nor have I done much with authentication since my 2000's PHP hobbying. I suspect an LDAP server has to deal with or try and manage a lot of garbage input because of the sheer number of integrations they often have.

stackskipton•9m ago
It’s enterprise product, a ton of money can be made by trying to parse complete garbage being tossed at you and delivering it.
edoceo•6h ago
But does it affect Bao? Could test there since they are so closely related.
satoqz•6h ago
OpenBao maintainer here - The majority of these does affect us, more or less. Unfortunately it seems that we did not receive any prior outreach regarding these vulnerabilities before publication... make of that what you will. We've been hard at work the past days trying to get a security release out, which will likely land today.
Scandiravian•5h ago
Thanks for the great work and swift communication

I'm very disappointed to hear that the researchers did not disclose these findings to the OpenBao project before publishing them, so you now have to rush a release like this

Will you reach out to the researchers for an explanation after you've fixed the issues?

wafflemaker•5h ago
I can explain* researchers (and myself, though have nothing to do with it): We both learned about OpenBao today.

explanation ≠ excuse

Scandiravian•5h ago
Thank you for the explanation. It's obviously not great that this was missed, but finger-pointing now doesn't really help anyone, so I'll focus on what seems to me like the root issue

My impression is that there is an information gap about forked projects that lead to this issue

I'm on vacation right now, but when I'm back I'll try to setup a small site that lists forks of popular projects and maybe some information on when in time the project was forked

Hopefully something like that can make it more likely that these things are responsibly disclosed to all relevant projects

Scandiravian•5h ago
It sounds like these issues are from before the fork, in which case they will be

It also doesn't sound like the researchers made an effort to safely disclose these findings to the OpenBao project before publishing them, which I think would have been the right thing to do

procaryote•6h ago
> This default is 30 seconds, matching the default TOTP period. But due to skew, passcodes may remain valid for up to 60 seconds (“daka” in Hebrew), spanning two time windows.

Wait, why would I care this is "daka" in Hebrew? Is this a hallucination or did they edit poorly?

1a527dd5•6h ago
Yeah, it read slightly weird before I got to that point, and then it was obvious it was AI slop.
neom•5h ago
Maybe just being cute. Author is Yarden Porat from Cyata, an Israeli cybersecurity company.
onecommentman•3h ago
So perhaps using AI writing tools for English to polish his writing, since English may not be his first language and he doesn’t want stumbling around English syntax to get in the way of his message.

It may become an English writing style we all have to get used to from non-native English speakers and an actual valid use case for current AI. I know I’d use AI this way when writing something important in a language I’m semi-fluent in. I already use search engines to confirm the proper use and spelling of fashionably popular foreign phrases, instead of an online dictionary.

falconertc•51m ago
I can't believe we're going to forever have to live with people who don't speak English as a first language having their written work assumed to be done by AI. It's pretty disappointing.
tecleandor•5h ago
Also... what is "daka" ? 60 seconds? passcodes that remain valid for two time windows? I've been checking the dictionary and "daka" might mean "minute".
n4bz0r•4h ago
https://s3.amazonaws.com/LCG/40kconquest/ffg_WHK03_34.jpg
iddan•1h ago
Fun language fact: "daka" is hebrew for "minute" but it's literal meaning is "thin one" figurative being "the thin (shorter) time measure" in contradiction with an hour ("sha'aa")
gtirloni•6h ago
Something feels odd reading the article. It's so verbose like it's trying to explain things like the reader is 5yo.
plantain•5h ago
AI written, or edited.
Cthulhu_•4h ago
I'd say edited, I did wonder if they used AI to find the issues in the first place but they would brag about that front and center and pivot to an AI-first security company within seconds. Then again, maybe they used AI to help them map out what happens in the code, even though it's Go code and should be pretty readable / obvious what happens.

That said, I think it's weird; the vulnerabilities seem to have been found by doing a thorough code review and comprehension, why then cut corners by passing the writeup through AI?

benterix•3h ago
I don't think they would brag about it if they were found by AI, but based on their description I suspect most of this work was definitely done by LLMs, and then checked by humans.
benterix•3h ago
It was definitely edited by AI or written on the basis of initial information. Which is a pity because I'd love to see the original, it has more value for me.
natebc•2h ago
This sentiment sums up why i dislike the broad use of LLMs and generative words/art/music. Genuine Human work has more value to me than anything generated by a computer.

I like humans. I've even loved a few. I like what humans do; warts, typos and awkward phrasing included.

neom•6h ago
The post covers 9 CVEs May-June 2025 (Full chain from default user > admin > root > RCE):

CVE-2025-6010 - [REDACTED]

CVE-2025-6004 - Lockout Bypass https://feedly.com/cve/CVE-2025-6004

Via case permutation in userpass auth Via input normalization mismatch in LDAP auth

CVE-2025-6011 - Timing-Based Username Enumeration https://feedly.com/cve/CVE-2025-6011

Identify valid usernames

CVE-2025-6003 - MFA Enforcement Bypass https://feedly.com/cve/CVE-2025-6003

Via username_as_alias configuration in LDAP

CVE-2025-6013 - Multiple EntityID Generation https://feedly.com/cve/CVE-2025-6013

Allows LDAP users to generate multiple EntityIDs for the same identity

CVE-2025-6016 - TOTP MFA Weaknesses https://feedly.com/cve/CVE-2025-6016

Aggregated logic flaws in TOTP implementation

CVE-2025-6037 - Certificate Entity Impersonation https://feedly.com/cve/CVE-2025-6037

Existed for 8+ years in Vault

CVE-2025-5999 - Root Privilege Escalation https://feedly.com/cve/CVE-2025-5999

Admin to root escalation via policy normalization

CVE-2025-6000 - Remote Code Execution https://feedly.com/cve/CVE-2025-6000

First public RCE in Vault (existed for 9 years) Via plugin catalog abuse > https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vau...

cipherboy•2h ago
For anyone interested in CVE-2025-6010: https://discuss.hashicorp.com/t/hcsec-2025-21-vault-user-enu...
neuralkoi•4h ago

    In non-CA mode, an attacker who has access to the private key of a pinned certificate can:

       Present a certificate with the correct public key

       Modify the CN in the client certificate to any arbitrary value

       Cause Vault to assign the resulting alias.Name to that CN
I agree that this is an issue, but if an attacker has access to the private key of a pinned certificate, you might have some bigger issues...
mike_hearn•4h ago
Impressive. It's worth reading despite the slight AI sheen to the writing, as it's unusually informative relative to most security articles. The primary takeaway from my POV is to watch out for "helpful" string normalization calls in security sensitive software. Strings should be bags of bytes as much as possible. A lot of the exploits boil down to trying to treat security identifiers as text instead of fixed numeric sequences. Also, even things that look trivial like file paths in error messages can be deadly.
progbits•4h ago
My take on the normalization is that it happens in the wrong place - you should not do it adhoc.

If your input from user is a string, define a newtype like UserName and do all validation and normalization once to convert it. All subsequent code should be using that type and not raw strings, so it will be consistent everywhere.

Normal_gaussian•3h ago
Its ridiculous that we haven't been aggressively boxing login credentials for decades at this point. This kind of issue was well discussed when I did my degree well over a decade ago.
benterix•3h ago
Yeah, I tolerated the AI tint in this article only because it was very informative otherwise.
shahartal•3h ago
Hey all — authors of Vault Fault here (I’m Shahar, CEO at Cyata), really appreciate all the thoughtful comments.

Just to clarify - all the vulnerabilities were found manually by a very real human, Yarden Porat.

The writeup was mostly human-written as well, just aimed at a broader audience - which explains the verbosity. We did work with a content writer to help shape the structure and flow, and I totally get that some parts read a bit “sheeny.” Feedback noted and appreciated - and yep, there’s more coming :)

btw likely missed with the direct link - we also found pre-auth RCE in CyberArk Conjur - cyata.ai/vault-fault

v5v3•3h ago
Going by the naming, this was reported to Hashicorp prior to 10th June?

And as it's now August, is it redacted as not fixed yet? Why not

CVE-2025-6010 - [REDACTED]

cipherboy•2h ago
I do not speak for HashiCorp, but they have published information on this CVE here: https://discuss.hashicorp.com/t/hcsec-2025-21-vault-user-enu...

OpenBao is reasonably confident in our fix: https://github.com/openbao/openbao/pull/1628

We had earlier pulled support for pre-Vault-1.0 userpass pre-bcrypt hashing (so there's no longer a timing difference there that could be used for enumeration) and using cache busting on lookup should also ensure consistency across storage layers. Plus, normalizing the remaining error messages through when the user's credential is fully validated as correct.

yodon•3m ago
Your writeup was excellent. There is no piece of English writing one can link to on HN without an assortment of "expert" HN commenters complaining that it's "AI slop."

There's no more ubiquitous or lower signal class of comment here these days than "I think this was written by an AI." Eventually, hopefully, dang will declare that not a productive topic for comments, but until then we all have to suffer through it on every post.

technion•3h ago
I generally dont like seeing these "blind username enumeration" type issues.

Its nearly always possible to get usernames elsewhere, they are basically public and the private part is the key and any mfa token. Usernames can get locked out, but the workaround of having user enumeration sprays always burn CPU hashing time delaying passwords doesn't seem like a step forward.

TheDong•3h ago
I mean, this is kinda what you expect from software written in Go, right? The point of go is to make is it so that below average programmers can write roughly average code, and with the tradeoff that above average programmers can't easily add type-system safety or create abstractions to protect the software from reverting to the mean.

Like, of course a language that sucks for writing parsers will end up with a ton of bugs that would have been fixed by parsing and normalizing all input asap, but no, in go and javascript the average type is a string so you can "ToLower" deep in the code instead of just during parsing after which it should have no longer been a string type

neomantra•2h ago
Quite the hot take on Golang LOL. These were logic and flow errors that could have emerged with any language. These bugs were teased out with deep introspection.

The second paragraph seems more like design issues than a language issue. That said, I’d certainly rather write a parser in Golang than JavaScript, especially once one brings up type safety.

sofixa•15m ago
> I mean, this is kinda what you expect from software written in Go, right

Unlike real software, written by real men, in Assembly, on paper, bare chested during a full moon, right?

> The point of go is to make is it so that below average programmers can write roughly average code

You either have no clue about Go, or are mistaking it with something else.

Go was created at Google to have a performant language with static types that was easy to read (because code is read much more often than it is written, while improving it, fixing it, reviewing it, etc). Lots of extremely solid, good, widely used software is written in it, and for good reasons.

Comparing Go with JavaScript also doesn't leave us with the impression you've even heard of Go before this comment.

cipherboy•2h ago
On behalf of the OpenBao project, I welcome collaboration with future researchers. We were not informed of these vulnerabilities before HashiCorp posted their usual CVE bulletins, which is disappointing. (Especially as HashiCorp's Vault no longer has an Open Source edition ;-)

We've triaged as being affected by 8 of the 9 CVEs (in fixing an earlier Cert Auth vulnerability, we correctly remediated this one) and have merged patches for most of them.

Happily, the community has done some great work on remediating these and I'm very appreciative of them.

I'm most excited about the audit changes: this was the impetus needed to make them be configuration driven in the next release series. Leaving audit device (which, as a reminder, have a socket mode which can make arbitrary TCP calls!) open to API callers is rather unsafe, even with prefix being limited.

(Edit: And of course it goes without saying, but we're more than happy to accept contributions to the community -- code, docs, technical, or otherwise!)

themk•2h ago
I've run Vault for a long time, and none of this surprises me. I've even reported some of these to Hashicorp in the past, along with other equally shocking bugs.

The code base is an absolute mess.

The number of bugs and weird edge cases I've found with my quickcheck property testing of their API is shocking, and makes me think their test suites are woefully inadequate.

cipherboy•2h ago
OpenBao, under the Linux Foundation's OpenSSF, is making meaningful improvements to the code. I'd love to have high-quality reports, if you're willing to re-visit these. :-)
fidotron•2h ago
> The code base is an absolute mess.

This is an understatement, and honestly when I saw it the first time it was enough to make me wonder about all things Hashicorp.

Hilift•1h ago
Where were all these people when Vault was released in 2015? I remember being told we were switching to Vault in 2018 and nada. It was like the economists before the 2008 mortgage salad. Did Vault not hire security people? This reminds me of when HeartBleed occurred in 2014. It was after that when someone looked at the code and bugs everywhere. The guy that created Heartbleed got a Phd and the guy that discovered it got a t-shirt. "And then it was acquired by IBM".
tptacek•1h ago
It's a good writeup, and I understand that it's Black Hat week and so the intensity meter is dialed up to 11 on these things. Some of these vulnerabilities are pretty clever. But these are mostly situational, things that would typically get sev:med or lower on an assessment.

The RCE reported here is the product of an admin->root (Vault root, not Unix root) privilege escalation that already required a privileged account. It's a good bug! They got audit logs to get parsed as an executable plugin. The privilege escalation bug they used to allow admin accounts to set up plugins is also clever (they noticed that the sanity check for assuming the "root" token hardcoded "root", but the code that actually selected the token sanitized the token name, so you could use " ROOT").