frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: LocalGPT – A local-first AI assistant in Rust with persistent memory

https://github.com/localgpt-app/localgpt
197•yi_wang•7h ago•77 comments

Haskell for all: Beyond agentic coding

https://haskellforall.com/2026/02/beyond-agentic-coding
93•RebelPotato•6h ago•24 comments

Roger Ebert Reviews "The Shawshank Redemption"

https://www.rogerebert.com/reviews/great-movie-the-shawshank-redemption-1994
16•monero-xmr•3h ago•4 comments

SectorC: A C Compiler in 512 bytes (2023)

https://xorvoid.com/sectorc.html
284•valyala•15h ago•55 comments

Software factories and the agentic moment

https://factory.strongdm.ai/
223•mellosouls•17h ago•378 comments

LLMs as the new high level language

https://federicopereiro.com/llm-high/
94•swah•4d ago•175 comments

The Architecture of Open Source Applications (Volume 1) Berkeley DB

https://aosabook.org/en/v1/bdb.html
22•grep_it•5d ago•2 comments

Speed up responses with fast mode

https://code.claude.com/docs/en/fast-mode
179•surprisetalk•14h ago•181 comments

LineageOS 23.2

https://lineageos.org/Changelog-31/
33•pentagrama•3h ago•7 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
189•AlexeyBrin•20h ago•36 comments

Brookhaven Lab's RHIC concludes 25-year run with final collisions

https://www.hpcwire.com/off-the-wire/brookhaven-labs-rhic-concludes-25-year-run-with-final-collis...
79•gnufx•13h ago•62 comments

Stories from 25 Years of Software Development

https://susam.net/twenty-five-years-of-computing.html
190•vinhnx•18h ago•19 comments

uLauncher

https://github.com/jrpie/launcher
19•dtj1123•4d ago•0 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
352•jesperordrup•1d ago•104 comments

Wood Gas Vehicles: Firewood in the Fuel Tank (2010)

https://solar.lowtechmagazine.com/2010/01/wood-gas-vehicles-firewood-in-the-fuel-tank/
44•Rygian•2d ago•16 comments

Substack confirms data breach affects users’ email addresses and phone numbers

https://techcrunch.com/2026/02/05/substack-confirms-data-breach-affecting-email-addresses-and-pho...
45•witnessme•4h ago•14 comments

Moroccan sardine prices to stabilise via new measures: officials

https://maghrebi.org/2026/01/27/moroccan-sardine-prices-to-stabilise-via-new-measures-officials/
3•mooreds•5d ago•0 comments

Show HN: I saw this cool navigation reveal, so I made a simple HTML+CSS version

https://github.com/Momciloo/fun-with-clip-path
97•momciloo•14h ago•23 comments

First Proof

https://arxiv.org/abs/2602.05192
143•samasblack•17h ago•87 comments

Start all of your commands with a comma (2009)

https://rhodesmill.org/brandon/2009/commands-with-comma/
600•theblazehen•3d ago•218 comments

Al Lowe on model trains, funny deaths and working with Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
112•thelok•16h ago•24 comments

The Scriptovision Super Micro Script video titler is almost a home computer

http://oldvcr.blogspot.com/2026/02/the-scriptovision-super-micro-script.html
10•todsacerdoti•6h ago•1 comments

The AI boom is causing shortages everywhere else

https://www.washingtonpost.com/technology/2026/02/07/ai-spending-economy-shortages/
335•1vuio0pswjnm7•21h ago•542 comments

Show HN: A luma dependent chroma compression algorithm (image compression)

https://www.bitsnbites.eu/a-spatial-domain-variable-block-size-luma-dependent-chroma-compression-...
43•mbitsnbites•3d ago•6 comments

OpenCiv3: Open-source, cross-platform reimagining of Civilization III

https://openciv3.org/
914•klaussilveira•1d ago•277 comments

FDA intends to take action against non-FDA-approved GLP-1 drugs

https://www.fda.gov/news-events/press-announcements/fda-intends-take-action-against-non-fda-appro...
123•randycupertino•10h ago•250 comments

Selection rather than prediction

https://voratiq.com/blog/selection-rather-than-prediction/
38•languid-photic•4d ago•20 comments

Where did all the starships go?

https://www.datawrapper.de/blog/science-fiction-decline
173•speckx•4d ago•258 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
307•isitcontent•1d ago•39 comments

Vouch

https://twitter.com/mitchellh/status/2020252149117313349
98•chwtutha•5h ago•26 comments
Open in hackernews

Insufficiently sanitized data allows unauthenticated access to FreePBX Admin

https://labs.watchtowr.com/you-already-have-our-personal-data-take-our-phone-calls-too-freepbx-cve-2025-57819/
52•Tiberium•5mo ago

Comments

jsd1982•5mo ago
Sanitization of data is such a strange security practice to me. It feels like any sort of vulnerability sensitive to data sanitization just boils down to a failure to properly encode or escape data into a target language that is susceptible to injection attacks e.g. SQL, HTML, javascript. Is there a real-world scenario where data sanitization is required where proper data encoding/escaping is not the better solution?
formerly_proven•5mo ago
Improper design principles lead to improper programs.
ameixaseca•5mo ago
Keep in mind this is PHP.

There are tons of languages and frameworks made by developers who know what they are doing that do not treat everything blindly like strings.

For SQL in particular, you should never build queries directly from user input - any modern database supports bind variables or parameters, which completely eliminate any need for sanitizing input.

I agree with you regarding sanitization, and I'd add further that having to sanitize input for security purposes is a big sign of code smell and an overall insecure code by design.

daneel_w•5mo ago
>"Keep in mind this is PHP."

Has nothing to do with PHP. SQL injection mishaps is a developer problem, not a language problem. It happens everywhere.

ameixaseca•4mo ago
I feel like answering this comment could start a possible argument, which I have no interest in doing.

I do, however, want to point that anyone interested in comparing language design choices can conclude by themselves this is likely a strong factor.

You can find references like the classic "PHP: a fractal of bad design"[1] which not only talks about the language itself but SQL injection, error handling and tons of other issues. It summarizes most of the important points.

I can also add a few issues like[2][3], which unfortunately are not isolated incidents: these are a reflection of core design decisions and how the language approaches software design as a whole.

I stand by my point, which I'll define more precisely as:

"A badly-designed language either makes it hard for developers to do good choices, or makes it easy for developers to do bad choices."

PHP is not alone, but it is a prime example of this.

You can disagree with this assessment - and that's OK.

[1] https://eev.ee/blog/2012/04/09/php-a-fractal-of-bad-design/

[2] https://stackoverflow.com/questions/36867718/php-rename-fail...

[3] https://stackoverflow.com/questions/11360511/php-rename-how-...

daneel_w•4mo ago
I have to disagree, because your assessment is outdated and somewhat shallow. My impression is that it doesn't rest on much real programming experience with PHP either.

To stay with the topic, these arguments are in essence a way of trying to hold PHP as a language accountable for functions it exposed in its since long (about a decade ago) deprecated original mysql extension. These functions actually belong to the underlying C library developed by MySQL, and as has been the custom with tons of functionality brought into PHP from elsewhere over the years, the entire library was relayed. The very same functions - e.g. escape_string(), the culprit "luring" users away from parameterization - are still available in Oracle's mysql C library, and are to some extent also available in, for example, the mysql Python connector through its C extension API.

At the time "a fractal of bad design" was published a handful of its talking points were already no longer actual. It got tired and trope-y years ago, and PHP isn't what it was 15 years ago. Referencing the article today is about as valid as regurgitating "classic" 1950s health advice to Ironman triathletes or something.

ameixaseca•4mo ago
As I said, I have no intention of starting an argument.

I would just like to point out a few issues:

A) I deliberately focused on the language itself in my claims.

The functions I cited earlier were meant to illustrate the side effects of a certain mindset of the core language.

Keep in mind: these functions are not from some random library in the ecosystem, but from the core library of the language, providing core functionality. And that hasn't changed, nor the functions.

B) You've made a number of statements in response to my comments, but I don't see any supporting references.

The only justification you've given is your own opinion that "the article is too old and not relevant anymore".

Which takes us to point C.

C) I skimmed through the article again, along with the general documentation of the language, and I stand by this statement:

"Every major point in that article about the language is as relevant today as it was in 2012."

PHP might work fine for templating some web pages, but so does Jinja. As a general programming language, it falls short in too many ways to list here. You can revisit the original article I mentioned before for a more comprehensive list, in particular the "core language" section.

Well, at least that's my opinion. As I said, you're free to disagree - and that's OK.

--

Side note: The easiest approach during a disagreement in an online discussion is to write a lot of "opinion-based statements" as if they were facts, and leave everything else as an exercise for the reader.

If you want to be taken seriously, please don't do that.

9dev•5mo ago
And tons of such frameworks have been written in PHP; prepared statements with an adapter-agnostic database connection layer are first-class citizens in PHP.
daneel_w•5mo ago
>"Is there a real-world scenario where data sanitization is required where proper data encoding/escaping is not the better solution?"

In context of SQL queries which accept variable input, the only correct approach is to parameterize the queries, never to string-encode the variables. So, yes. But perhaps you implied parameterization as well.

jsd1982•5mo ago
Yes, parameterization was implied.