frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Congressional lawmakers 47% pts better at picking stocks

https://www.nber.org/papers/w34524
537•mhb•3h ago•332 comments

MinIO is now in maintenance-mode

https://github.com/minio/minio/commit/27742d469462e1561c776f88ca7a1f26816d69e2
102•hajtom•1h ago•51 comments

Steam Deck lead reveals Valve is funding ARM compatibility of Windows games

https://frvr.com/blog/news/steam-deck-lead-reveals-valve-is-funding-arm-compatibility-of-windows-...
13•OsrsNeedsf2P•9m ago•0 comments

You Can't Fool the Optimizer

https://xania.org/202512/03-more-adding-integers
162•HeliumHydride•4h ago•86 comments

Critical RCE Vulnerabilities in React and Next.js

https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
92•gonepivoting•1h ago•28 comments

Rocketable (YC W25) is hiring a founding engineer to automate software companies

https://www.ycombinator.com/companies/rocketable/jobs/CArgzmX-founding-engineer-automation-platform
1•alanwells•8m ago

RCE Vulnerability in React and Next.js

https://github.com/vercel/next.js/security/advisories/GHSA-9qr9-h5gf-34mp
23•rayhaanj•1h ago•9 comments

GSWT: Gaussian Splatting Wang Tiles

https://yunfan.zone/gswt_webpage/
43•klaussilveira•2h ago•11 comments

How to Synthesize a House Loop

https://loopmaster.xyz/tutorials/how-to-synthesize-a-house-loop
44•stagas•5d ago•8 comments

Anthropic acquires Bun

https://bun.com/blog/bun-joins-anthropic
2061•ryanvogel•23h ago•983 comments

Why are my headphones buzzing whenever I run my game?

https://alexene.dev/2025/12/03/Why-do-my-headphones-buzz-when-i-run-my-game.html
60•pacificat0r•1h ago•48 comments

A Look at Rust from 2012

https://purplesyringa.moe/blog/a-look-at-rust-from-2012/
105•todsacerdoti•1w ago•20 comments

IBM CEO says there is 'no way' spending on AI data centers will pay off

https://www.businessinsider.com/ibm-ceo-big-tech-ai-capex-data-center-spending-2025-12
754•nabla9•22h ago•849 comments

Mapping Every Dollar of America's $5T Healthcare System

https://healthisotherpeople.substack.com/p/an-abominable-creature
92•brandonb•2h ago•73 comments

Helldivers 2 devs slash install size from 154GB to 23GB

https://www.tomshardware.com/video-games/pc-gaming/helldivers-2-install-size-slashed-from-154gb-t...
238•doener•3h ago•171 comments

Zig quits GitHub, says Microsoft's AI obsession has ruined the service

https://www.theregister.com/2025/12/02/zig_quits_github_microsoft_ai_obsession/
723•Brajeshwar•9h ago•385 comments

Are we repeating the telecoms crash with AI datacenters?

https://martinalderson.com/posts/are-we-really-repeating-the-telecoms-crash-with-ai-datacenters/
47•davedx•5h ago•9 comments

Interview with RollerCoaster Tycoon's Creator, Chris Sawyer (2024)

https://medium.com/atari-club/interview-with-rollercoaster-tycoons-creator-chris-sawyer-684a0efb0f13
222•areoform•12h ago•39 comments

Critical Security Vulnerability in React Server Components

https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
21•nomaxx117•1h ago•3 comments

Super fast aggregations in PostgreSQL 19

https://www.cybertec-postgresql.com/en/super-fast-aggregations-in-postgresql-19/
174•jnord•1w ago•16 comments

universal-tbxi-patchset: Mac OS New World ROM patchset to boot System 7.5

https://github.com/Wack0/universal-tbxi-patchset
13•classichasclass•4d ago•0 comments

AI agents break rules under everyday pressure

https://spectrum.ieee.org/ai-agents-safety
255•pseudolus•6d ago•124 comments

The Writing Is on the Wall for Handwriting Recognition

https://newsletter.dancohen.org/archive/the-writing-is-on-the-wall-for-handwriting-recognition/
132•speckx•1w ago•69 comments

The "Mad Men" in 4K on HBO Max Debacle

http://fxrant.blogspot.com/2025/12/the-mad-men-in-4k-on-hbo-max-debacle.html
288•tosh•5h ago•118 comments

Researchers Find Microbe Capable of Producing Oxygen from Martian Soil

https://scienceclock.com/microbe-that-could-turn-martian-dust-into-oxygen/
77•ashishgupta2209•10h ago•31 comments

Microsoft lowers AI software growth targets

https://finance.yahoo.com/news/microsoft-lowers-ai-software-sales-141531121.html
61•ramoz•1h ago•50 comments

Paged Out

https://pagedout.institute
522•varjag•20h ago•55 comments

Anthropic reportedly preparing for $300B IPO

https://vechron.com/2025/12/anthropic-hires-wilson-sonsini-ipo-2026-openai-race/
115•GeorgeWoff25•7h ago•90 comments

VA staff flag dangerous errors in Oracle-built electronic health record

https://www.washingtonpost.com/investigations/2025/12/03/veterans-administration-va-hospitals-hea...
24•ksenzee•1h ago•1 comments

OpenAI declares 'code red' as Google catches up in AI race

https://www.theverge.com/news/836212/openai-code-red-chatgpt
770•goplayoutside•1d ago•848 comments
Open in hackernews

Critical RCE Vulnerabilities in React and Next.js

https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
92•gonepivoting•1h ago

Comments

gonepivoting•41m ago
Just to simplify this - our exploitation tests so far have shown that a standard Next.js application created via create-next-app and built for production is vulnerable to CVE-2025-66478 without any specific code modifications by the developer - so this is essentially exploitable out-of-the-box.
tinco•40m ago
Unsafe deserialization is a very 2010 Ruby on Rails sort of vulnerability. It is strangely interesting that such a vulnerability was introduced so late in the lifetime of these frameworks. It must be a very sneaky vulnerability given how cautious we have become around deserialization since then.
LunaSea•31m ago
I'm willing to bet that this is linked to the magic __proto__ object namespace in JavaScript
Tomuus•27m ago
The React Server Components wire format (Flight) is relatively novel and very new (it has existed in React stable for just a year). This is not a simple JSON parsing bug.
tinco•14m ago
The rails bugs weren't about Json parsing, they were deserializing into Ruby objects of classes that had side effects, and those side effects led to RCE possibilities. Since those happened, you'll find any deserialization library, especially in dynamic languages, will have a safe (or conversely unsafe) deserialize function to make it more explicit that there's risks involved.
skilled•39m ago
Wow, I am at a loss for words how serious this is. Looking forward to a more technical write up.

This might cause quite a lot of chaos and leaked code / credentials over the next couple of weeks.

cachius•15m ago
Projects hosted on Vercel benefit from platform-level protections that already block malicious request patterns associated with this issue.

https://vercel.com/changelog/cve-2025-55182

mmsc•39m ago
These wiz.io blog posts should be banned from HN; AFAICT, they're AI generated. Here's the original post with the details: https://react.dev/blog/2025/12/03/critical-security-vulnerab... - the vulnerability was not found by a Wiz employee at all, and the Wiz article (unlike the react.dev article) does not provide any meaningful technical information.

The important part to know:

- Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.

- The vulnerability is present in versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of: react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack

- Some React frameworks and bundlers depended on, had peer dependencies for, or included the vulnerable React packages. The following React frameworks & bundlers are affected: next, react-router, waku, @parcel/rsc, @vitejs/plugin-rsc, and rwsdk.

jfindper•24m ago
>AFAICT, they're AI generated.

What is the "tell"? I'm not saying they are or aren't, but... people say this about literally everything now and it's typically some flimsy reasoning like "they used a bullet point". I don't see anything in particular that makes me think ai over a standard template some junior fills out.

>the vulnerability was not found by a Wiz employee at all

I've re-read the Wiz article a few times. Maybe I'm just dumb, but where did Wiz claim to have found this vulnerability?

tensegrist•5m ago
the tl;dr definitely came out of an llm

presentation and formatting aside the constant attempts to manufacture legitimacy and signal urgency are a classic tell. everything is "near-100%" reliable, urgent, critical, reproducible, catastrophic. siren emoji

galnagli•22m ago
Hey mmsc, first of all - the blogs are not AI Generated!

Second of all, the blog did add more information

"In our experimentation, exploitation of this vulnerability had high fidelity, with a near 100% success rate and can be leveraged to a full remote code execution. The attack vector is unauthenticated and remote, requiring only a specially crafted HTTP request to the target server. It affects the default configuration of popular frameworks. "

In the end - if it helped spreading the news about this risk so teams can fix them faster, then this is our end-goal with these blog posts : )

internetter•19m ago
There is some value:

> The vulnerability exists in the default configuration of affected applications

Can be inferred from the react blog but isn't really explicit

> According to Wiz data, 39% of cloud environments have instances vulnerable to CVE-2025-55182 and/or CVE-2025-66478.

Numbers!

gonepivoting•18m ago
Hey, researcher from Wiz here - we definitely didn't discover these vulns and all the credit goes to Lachlan Davidson. We have been investigating these vulns throughout the day and decided not to disclose the full extent of our conclusions or release a working exploit until more people get a chance to patch this (and as I mentioned in another comment, exploitation works out-of-the-box so you definitely should patch ASAP).
bri3d•26m ago
Here's a patch diff:

https://github.com/vercel/next.js/compare/v15.0.4...v15.0.5

It looks like the fix is checking hasOwnProperty, so it's almost certainly an issue with prototype chain pollution.

jimmyl02•17m ago
It seems like this might be one of the biggest vulnerabilities in recent times...

The default react / nextjs configurations being vulnerable to RCE is pretty insane. I think platform level protections from Vercel / Cloudflare are very much showing their utility now!

pixl97•11m ago
https://www.cve.org/CVERecord?id=CVE-2025-66478 isn't even public yet, did they release this early?
cvsswebshit•7m ago
https://react.dev/blog/2025/12/03/critical-security-vulnerab...

>December 3, 2025 by The React Team

>This vulnerability was disclosed as CVE-2025-55182 and is rated CVSS 10.0.

For reserved CVEs, once the publication request is made, there is sometimes a delay before it becomes public.

_pdp_•11m ago
I don't have time to look into it right now (def later)!

However, I was curious to see if github copilot can reverse engineer it based on the latest commits and seems that what it is saying aligns with both advisories. It pointed out that it has to do with circular reference handling which sounds to me something that can be easily overlooked.

While this analysis might be completely off, the simple fact that I could get even this information without much efforts is mind-boggling. With better setup it might be able to get more.

With AI now being common place, coordinated timely disclosure is even more important considering the stakes. It is theoretically possible to get an exploit working within minutes. Considering that we see one of these major vulnerabilities annually (and it seems to me around the same time of the year) a bad actor can easily capitalise on the opportunities when presented.

cvsswebshit•11m ago
Please submit the original source. If a post reports on something found on another site, submit the latter.

https://news.ycombinator.com/newsguidelines.html

Original non-vendor-hype source: https://react.dev/blog/2025/12/03/critical-security-vulnerab...

imvetri•9m ago
What is RCE? Remote call execution?
karimf•9m ago
Dang, Cloudflare is moving fast. Cloudflare WAF proactively protects against React vulnerability https://blog.cloudflare.com/waf-rules-react-vulnerability/
xnorswap•6m ago
This is what coordinated disclosure looks like.
WalterSobchak•8m ago
Related Next.js blog: https://nextjs.org/blog/CVE-2025-66478
rvnx•6m ago
Where is the exploit ? So we can test if we are vulnerable ? Bad actors anyway will find it, so at least we should see.