frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Cowork: Claude Code for the rest of your work

https://claude.com/blog/cowork-research-preview
468•adocomplete•3h ago•247 comments

TimeCapsuleLLM: LLM trained only on data from 1800-1875

https://github.com/haykgrigo3/TimeCapsuleLLM
428•admp•7h ago•183 comments

Fabrice Bellard's TS Zip (2024)

https://www.bellard.org/ts_zip/
70•everlier•2h ago•26 comments

The chess bot on Delta Air Lines will destroy you (2024) [video]

https://www.youtube.com/watch?v=c0mLhHDcY3I
113•cjaackie•3h ago•56 comments

Postal Arbitrage

https://walzr.com/postal-arbitrage
216•The28thDuck•5h ago•111 comments

Unauthenticated remote code execution in OpenCode

https://cy.md/opencode-rce/
186•CyberShadow•1d ago•41 comments

Date is out, Temporal is in

https://piccalil.li/blog/date-is-out-and-temporal-is-in/
276•alexanderameye•8h ago•89 comments

F2 (YC S25) Is Hiring

https://www.ycombinator.com/companies/f2/jobs/cJsc7Fe-product-designer
1•arctech•54m ago

LLVM: The bad parts

https://www.npopov.com/2026/01/11/LLVM-The-bad-parts.html
259•vitaut•9h ago•50 comments

Show HN: AI in SolidWorks

https://www.trylad.com
99•WillNickols•6h ago•49 comments

Floppy disks turn out to be the greatest TV remote for kids

https://blog.smartere.dk/2026/01/floppy-disks-the-best-tv-remote-for-kids/
461•mchro•10h ago•272 comments

Show HN: Agent-of-empires: OpenCode and Claude Code session manager

https://github.com/njbrake/agent-of-empires
42•river_otter•9h ago•10 comments

Perlsecret – Perl secret operators and constants

https://metacpan.org/dist/perlsecret/view/lib/perlsecret.pod
45•mjs•6d ago•8 comments

What old tennis players teach us (2017)

https://www.raphkoster.com/2017/09/22/31098/
25•surprisetalk•4d ago•15 comments

Message Queues: A Simple Guide with Analogies (2024)

https://www.cloudamqp.com/blog/message-queues-exaplined-with-analogies.html
66•byt3h3ad•6h ago•20 comments

Apple picks Google's Gemini to power Siri

https://www.cnbc.com/2026/01/12/apple-google-ai-siri-gemini.html
575•stygiansonic•8h ago•331 comments

Show HN: Fall asleep by watching JavaScript load

https://github.com/sarusso/bedtime
39•sarusso•4h ago•14 comments

Anthropic made a mistake in cutting off third-party clients

https://archaeologist.dev/artifacts/anthropic
195•codesparkle•12h ago•165 comments

GitHub: A case study in link maintenance and 404 pages (2013)

https://chrismorgan.info/blog/github-links-case-study/
5•roryokane•5d ago•0 comments

Non-Essential French Embassy Staff Have Left Iran

https://www.barrons.com/news/non-essential-french-embassy-staff-have-left-iran-sources-d84d1f51
10•mhb•22m ago•0 comments

Building a 25 Gbit/s workstation for the SCION Association

https://github.com/scionassociation/blog-25gbit-workstation
60•romshark•7h ago•22 comments

Ansible battle tested hardening for Linux, SSH, Nginx, MySQL

https://github.com/dev-sec/ansible-collection-hardening
38•walterbell•5d ago•10 comments

Zen-C: Write like a high-level language, run like C

https://github.com/z-libs/Zen-C
146•simonpure•10h ago•87 comments

Ai, Japanese chimpanzee who counted and painted dies at 49

https://www.bbc.com/news/articles/cj9r3zl2ywyo
166•reconnecting•14h ago•56 comments

Reproducing DeepSeek's MHC: When Residual Connections Explode

https://taylorkolasinski.com/notes/mhc-reproduction/
94•taykolasinski•9h ago•28 comments

Launch a Debugging Terminal into GitHub Actions

https://blog.gripdev.xyz/2026/01/10/actions-terminal-on-failure-for-debugging/
125•martinpeck•10h ago•53 comments

Personal thoughts/notes from working on Zootopia 2

https://blog.yiningkarlli.com/2025/12/zootopia-2.html
284•pantalaimon•5d ago•58 comments

Computers that used to be human

https://digitalseams.com/blog/computers-that-used-to-be-human
47•bobbiechen•8h ago•8 comments

Show HN: Customizable OSINT dashboard to monitor the situation

https://sr.ericli.tech/?d=N4IgbiBcCMA0IHcoG1QBcogEYngGxQAZZiAOWUgXXgGMpQBHTASwCcBDAO1xAAcoAzIWGEA...
30•ericlmtn•5h ago•11 comments

The struggle of resizing windows on macOS Tahoe

https://noheger.at/blog/2026/01/11/the-struggle-of-resizing-windows-on-macos-tahoe/
2531•happosai•1d ago•1091 comments
Open in hackernews

Unauthenticated remote code execution in OpenCode

https://cy.md/opencode-rce/
185•CyberShadow•1d ago
Previous versions of OpenCode started a server which allowed any website visited in a web browser to execute arbitrary commands on the local machine. Make sure you are using v1.1.10 or newer; see link for more details.

Comments

AlexErrant•23h ago
The disclosure timeline is concerning.

Reported 2025-11-17, and multiple "no responses" after repeated attempts to contact the maintainers... not a good look.

pama•4h ago
it looks like opencode developers now try to take it seriously:

https://github.com/anomalyco/opencode/issues/6355#issuecomme...

thdxr•4h ago
hey maintainer here

we've done a poor job handling these security reports, usage has grown rapidly and we're overwhelmed with issues

we're meeting with some people this week to advise us on how to handle this better, get a bug bounty program funded and have some audits done

digdugdirk•4h ago
I've been curious how this project will grow over time, it seems to have taken the lead as the first open source terminal agent framework/runner, and definitely seems to be growing faster than any organization would/could/should be able to manage.

It really seems like the main focus of the project should be in how to organize the work of the project, rather than on the specs/requirements/development of the codebase itself.

What are the general recommendations the team has been getting for how to manage the development velocity? And have you looked into various anarchist organizational principles?

rtaylorgarlock•3h ago
Respect for openness. Good work and good luck.
Imustaskforhelp•3h ago
My original message was more positive but after more looking into context, I am a bit more pessimistic.

Now I must admit though that I am little concerned by the fact that the vulnerability reporters tried multiple times to contact you but till no avail. This is not a good look at all and I hope you can fix it asap as you mention

I respect dax from the days of SST framework but this is genuinely such a bad look especially when they Reported on 2025-11-17, and multiple "no responses" after repeated attempts to contact the maintainers...

Sure they reported the bug now but who knows what could have / might have even been happening as OpenCode was the most famous open source coding agent and surely more cybersec must have watched it, I can see a genuine possibility where something must have been used in the wild as well from my understanding from black hat adversaries

I think this means that we should probably run models in gvisor/proper sandboxing efforts.

Even right now, we don't know how many more such bugs might persist and can lead to even RCE.

Dax, This short attention would make every adversary look for even more bugs / RCE vulnerabilities right now as we speak so you only have a very finite time in my opinion. I hope things can be done as fast as possible now to make OpenCode more safer.

thdxr•3h ago
the email they found was from a different repo and not monitored. this is ultimately our fault for not having a proper SECURITY.md on our main repository

the issue that was reported was fixed as soon as we heard about it - going through the process of learning about the CVE process, etc now and setting everything up correctly. we get 100s of issues reported to us daily across various mediums and we're figuring out how to manage this

i can't really say much beyond this is my own inexperience showing

euazOn•3h ago
I am also baffled at how long this vulnerability was left open, but I’m glad you’re at least making changes to hopefully avoid such mistakes in the future.

Just a thought, have you tried any way to triage these reported issues via LLMs, or constantly running an LLM to check the codebase for gaping security holes? Would that be in any way useful?

Anyway, thanks for your work on opencode and good luck.

heliumtera•3h ago
Congrats on owning this, good job, respect
shimman•2h ago
It's hard to not own it when it's publicly disclosed. Maybe save the accolades for when they actually do something and not just say something.
tommica•2h ago
Hmm, dax seems more of an adult is his response than you sound in this comment.

Plenty of examples of people who implode when things get public, here it is being managed decently, even if not from the get-go.

shimman•54m ago
In my limited existence on this earth, talk is very cheap and actions should matter more.
bopbopbop7•3h ago
Why not just ask Claude to fix the security issues and make sure they don't happen again?
Hamuko•2h ago
And if you don't have a Claude subscription, you can just ask your friends to fix them via the remote code execution server.
Y_Y•2h ago
Talk about kicking someone while they're down...
croes•1h ago
Who knows what created the issues in the first place place
falloutx•2h ago
Its okay, if you can fix it soon, it should be fine.
gpm•3h ago
I'd be curious to know what features need opencode.ai to be an allowed origin for the local server.
kachapopopow•3h ago
app.opencode.ai frontend
grncdr•2h ago
I was investigating that for entirely unrelated reasons just yesterday and the answer so far seems to be "none". You can patch the server to serve the locally built frontend and it all works just fine.
shimman•2h ago
Huh, I thought opencode was a volunteer project but it looks like it's a business with major backing from major players. Was opencode always set up like this? I could have sworn there was some project with a better governance model, guess not.
seaal•2h ago
https://github.com/opencode-ai/opencode there was also the competing opencode which because crush done by charm.sh people.
falloutx•2h ago
You are either thinking of crush, roocode or kilo, they all started around the same time and dont have backing from major players yet.
lvl155•2h ago
They keep adding features without maintaining the core. I stopped using it when they started selling plans. The main reason for Opencode was to use multiple models but it turns out context sharing across models is PIA and impractical right now. I went back to using Claude Code and Codex side by side.

Having said that, there is definitely a need for open platform to utilize multiple vendors and models. I just don’t think the big three (Anthropic, OAI and Google) will cede that control over with so much money on the line.

theshrike79•1h ago
As someone who uses the two big C's, I can recommend ampcode[0] and Crush[1]+z.ai GLM as an addition.

Amp can do small utility scripts and changes for free (especially if you enable the ads) and Crush+GLM is pretty good at following plans done by Claude or Codex

[0] https://ampcode.com/

[1] https://github.com/charmbracelet/crush

rdtsc•2h ago
> Silent fix

So did they fix it silently, without responding to the researcher, or they fixed the silent part where now user is made a aware that a website is trying to execute code on their machine.

Hamuko•2h ago
It's under "Vendor Advisory", so I'm guessing it's that they fixed it, but never informed any OpenCode users that there was a massive security vulnerability.
miduil•2h ago
Seems `session/:id/shell` was also `session/:id/bash` and originally `session/:id/command` in some commits.

Maybe I'm using GitHub code search wrongly, but it appears this was just never part of even a pull request - the practice of just having someone pushing to `dev` (default branch) which then will be tagged should perhaps also be revisited.

(Several more commits under `wip: bash` and `feat: bash commands`)

https://github.com/anomalyco/opencode/commit/7505fa61b9caa17...

https://github.com/anomalyco/opencode/commit/93b71477e665600...

throw_me_uwu•2h ago
WTF, they not just made unauthenticated RCE http endpoint, they also helpfully added CORS bypass for it... all in CLI tool? That silently starts http server??
Hamuko•2h ago
I'm slightly surprised that the CORS policy wasn't just "*" considering how wide open the server itself was.
gpm•2h ago
It seems like it was prior to 1.0.216?
throw_me_uwu•2h ago
That's the point, it was!

https://github.com/anomalyco/opencode/commit/7d2d87fa2c44e32...

fragmede•2h ago
How's that plastic utensils at Anthropic's buffet analogy going now?
zmmmmm•1h ago
This is pretty egregious. And outside the fact the server is now disabled by default, once it's running it is still egregious:

> When server is enabled, any web page served from localhost/127.0.0.1 can execute code

> When server is enabled, any local process can execute code without authentication

> No indication when server is running (users may be unaware of exposure)

I'm sorry this is horrible. I really want there to be a good actual open cross-provider agentic coding tool, but this seems to me to be abusive of people's trust of TUI apps - part of the reason we trust them is they typically DON'T do stuff like this.

glerk•43m ago
Factory’s droid is pretty good for a cross-provider solution.
forgotTheLast•1h ago
On the one hand, with 1800 open issues and 800 open PRs (most of it probably AI generated slop) makes it a bit understandable for the maintainers to be slow to reply. On the other hand, the vulnerability is so baffling that I'll make sure to stay as far away as possible from this project.
blackbear_•1h ago
Isn't it insane that any web page can run a port scan in the first place? Who wants that?

Meanwhile, running opencode in a podman container seems to stop this particular, err, feature.

pamcake•1h ago
If you use uBlock Origin you can enable the "Privacy -> Block Outsider Intrusion into LAN" filter list to mitigate this.
angry_octet•1h ago
This is such an egregious lack of respect for users, you can't trust this organisation again, and the lack of responsiveness just signals that they don't consider it a problem. Users must signal to companies that this attitude is unacceptable by dumping them.
heavyset_go•1h ago
If you aren't blocking your browser from allowing sites to call to local services, you should:

> Network Boundary Shield

> The Network Boundary Shield (NBS) is a protection against attacks from an external network (the Internet) to an internal network - especially against a reconnaissance attack where a web browser is abused as a proxy.

> The main goal of NBS is to prevent attacks where a public website requests a resource from the internal network (e.g. the logo of the manufacturer of the local router); NBS will detect that a web page hosted on the public Internet is trying to connect to a local IP address. NBS only blocks HTTP requests from a web page hosted on a public IP address to a private network resource; the user can allow specific web pages to access local resources (e.g. when using Intranet services).

https://jshelter.org/nbs/

BenGosub•25m ago
It feels that today security is secondary to growth. As long as your growing, a few incidents here and there aren't going to make a difference.