<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: Jlleitschuh</title><link>https://news.ycombinator.com/user?id=Jlleitschuh</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 16 Apr 2026 20:05:46 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=Jlleitschuh" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Digital Travel App TripBFF Exposed Location Data Way Too Accurately]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/bugbountywriteup/digital-travel-app-tripbff-exposed-location-data-way-too-accurately-524cd0792a7d">https://medium.com/bugbountywriteup/digital-travel-app-tripbff-exposed-location-data-way-too-accurately-524cd0792a7d</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46578136">https://news.ycombinator.com/item?id=46578136</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 11 Jan 2026 18:22:46 +0000</pubDate><link>https://medium.com/bugbountywriteup/digital-travel-app-tripbff-exposed-location-data-way-too-accurately-524cd0792a7d</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=46578136</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46578136</guid></item><item><title><![CDATA[What's an OSS Vulnerability Janitor?]]></title><description><![CDATA[
<p>Article URL: <a href="https://infosecwriteups.com/what-is-a-oss-vulnerability-janitor-b7ab176bdd3f">https://infosecwriteups.com/what-is-a-oss-vulnerability-janitor-b7ab176bdd3f</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44747578">https://news.ycombinator.com/item?id=44747578</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 31 Jul 2025 16:57:22 +0000</pubDate><link>https://infosecwriteups.com/what-is-a-oss-vulnerability-janitor-b7ab176bdd3f</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=44747578</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44747578</guid></item><item><title><![CDATA[Burn It with Fire: How to Eliminate an Industry-Wide Supply Chain Vulnerability]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@jonathan.leitschuh/burn-it-with-fire-how-to-eliminate-an-industry-wide-supply-chain-vulnerability-12515516fb56">https://medium.com/@jonathan.leitschuh/burn-it-with-fire-how-to-eliminate-an-industry-wide-supply-chain-vulnerability-12515516fb56</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44446067">https://news.ycombinator.com/item?id=44446067</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 02 Jul 2025 16:58:13 +0000</pubDate><link>https://medium.com/@jonathan.leitschuh/burn-it-with-fire-how-to-eliminate-an-industry-wide-supply-chain-vulnerability-12515516fb56</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=44446067</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44446067</guid></item><item><title><![CDATA[The 160-Comment Fight to Fix SnakeYAML's RCE Default]]></title><description><![CDATA[
<p>Article URL: <a href="https://infosecwriteups.com/️-inside-the-160-comment-fight-to-fix-snakeyamls-rce-default-1a20c5ca4d4c">https://infosecwriteups.com/️-inside-the-160-comment-fight-to-fix-snakeyamls-rce-default-1a20c5ca4d4c</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44192485">https://news.ycombinator.com/item?id=44192485</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 05 Jun 2025 15:15:17 +0000</pubDate><link>https://infosecwriteups.com/️-inside-the-160-comment-fight-to-fix-snakeyamls-rce-default-1a20c5ca4d4c</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=44192485</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44192485</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "When Open Source Isn't: How OpenRewrite Lost Its Way"]]></title><description><![CDATA[
<p>Moderne quietly relicensed community-contributed OpenRewrite code from Apache 2.0 to a proprietary license, abandoning its open source commitments. This decision risks legal exposure, undermines community trust, and sets a dangerous precedent for OSS stewardship.</p>
]]></description><pubDate>Wed, 14 May 2025 18:51:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=43987977</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=43987977</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43987977</guid></item><item><title><![CDATA[When Open Source Isn't: How OpenRewrite Lost Its Way]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@jonathan.leitschuh/when-open-source-isnt-how-openrewrite-lost-its-way-642053be287d">https://medium.com/@jonathan.leitschuh/when-open-source-isnt-how-openrewrite-lost-its-way-642053be287d</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43987976">https://news.ycombinator.com/item?id=43987976</a></p>
<p>Points: 5</p>
<p># Comments: 3</p>
]]></description><pubDate>Wed, 14 May 2025 18:51:35 +0000</pubDate><link>https://medium.com/@jonathan.leitschuh/when-open-source-isnt-how-openrewrite-lost-its-way-642053be287d</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=43987976</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43987976</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "Falsehoods People Believe about CVE's"]]></title><description><![CDATA[
<p>Inspired by Falsehoods Programmers Believe About Names, this is a list of things people (wrongly) believe about CVEs. Some are naive. Some are overly optimistic. A few are just wishful thinking.</p>
]]></description><pubDate>Mon, 14 Apr 2025 16:04:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=43682806</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=43682806</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43682806</guid></item><item><title><![CDATA[Falsehoods People Believe about CVE's]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@jonathan.leitschuh/falsehoods-people-believe-about-cves-85c1d063ffda">https://medium.com/@jonathan.leitschuh/falsehoods-people-believe-about-cves-85c1d063ffda</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43682805">https://news.ycombinator.com/item?id=43682805</a></p>
<p>Points: 3</p>
<p># Comments: 2</p>
]]></description><pubDate>Mon, 14 Apr 2025 16:04:22 +0000</pubDate><link>https://medium.com/@jonathan.leitschuh/falsehoods-people-believe-about-cves-85c1d063ffda</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=43682805</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43682805</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "Codecov Bash Uploader compromised"]]></title><description><![CDATA[
<p>Curious how you found that. Great find though. This is the exact line:<p><a href="https://gist.github.com/davidrans/ca6e9ffa5865983d9f6aa00b7a4a1d10#file-bash-compromised-L525" rel="nofollow">https://gist.github.com/davidrans/ca6e9ffa5865983d9f6aa00b7a...</a></p>
]]></description><pubDate>Thu, 15 Apr 2021 21:07:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=26826126</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=26826126</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26826126</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "Ask HN: Remote repos being used for C2 botnet, or VMS scan?"]]></title><description><![CDATA[
<p>As a company working for one of the companies impacted by this weirdness we are just as concerned about the potential implications here as you are. We have followed up with JFrog about this and are waiting for a response from them about this.<p>I'm glad others are seeing these weird things too and it's giving them pause as well.</p>
]]></description><pubDate>Mon, 19 Aug 2019 17:46:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=20739942</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=20739942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20739942</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "Vulnerability in the Mac Zoom client allows malicious websites to enable camera"]]></title><description><![CDATA[
<p>Thanks for being cool!</p>
]]></description><pubDate>Tue, 09 Jul 2019 07:22:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=20389644</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=20389644</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20389644</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "Vulnerability in the Mac Zoom client allows malicious websites to enable camera"]]></title><description><![CDATA[
<p>If you want to see some part of this fixed, please UPVOTE this issue:<p><a href="https://github.com/mozilla/standards-positions/issues/143" rel="nofollow">https://github.com/mozilla/standards-positions/issues/143</a></p>
]]></description><pubDate>Tue, 09 Jul 2019 03:41:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=20388839</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=20388839</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20388839</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "Vulnerability in the Mac Zoom client allows malicious websites to enable camera"]]></title><description><![CDATA[
<p>Hi I'm the author, AMA<p>Or come hang out in the party chat!<p>Use the exploit to join:
<a href="https://jlleitschuh.org/zoom_vulnerability_poc/zoompwn_iframe.html" rel="nofollow">https://jlleitschuh.org/zoom_vulnerability_poc/zoompwn_ifram...</a></p>
]]></description><pubDate>Tue, 09 Jul 2019 01:25:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=20388242</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=20388242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20388242</guid></item><item><title><![CDATA[New comment by Jlleitschuh in "Want to take over the Java ecosystem? All you need is a MITM"]]></title><description><![CDATA[
<p>Oh hey! My article got shared here! Awesome!<p>I'm the author. AMA!</p>
]]></description><pubDate>Mon, 10 Jun 2019 22:45:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=20151609</link><dc:creator>Jlleitschuh</dc:creator><comments>https://news.ycombinator.com/item?id=20151609</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=20151609</guid></item></channel></rss>