<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: MajesticHobo2</title><link>https://news.ycombinator.com/user?id=MajesticHobo2</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 19:05:13 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=MajesticHobo2" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by MajesticHobo2 in "Carrot Disclosure: Forgejo"]]></title><description><![CDATA[
<p>I'd say also add a test that shows the HTML injection (which spurred the PR) isn't possible. Given an attacker-controlled URL of:<p><pre><code>    foo onclick
</code></pre>
the following shouldn't render:<p><pre><code>    <a class="item muted sidebar-item-link" href=foo onclick>
</code></pre>
The following should:<p><pre><code>    <a class="item muted sidebar-item-link" href="foo onclick"></code></pre></p>
]]></description><pubDate>Wed, 29 Apr 2026 01:36:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47943184</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=47943184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47943184</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>It was definitely partially about model quality. The frontier models are capable of producing valid findings with (reasonably) complex exploit chains on the first pass (or with limited nudging) and are much less prone to making up the kinds of nonsensical reports that were submitted to curl. Compared to now, the old models essentially didn't work for security.<p>If those script kiddies had been using today's models instead and _still_ didn't do any filtering, a lot more of those bugs would have been true positives.</p>
]]></description><pubDate>Mon, 30 Mar 2026 22:02:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47580266</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=47580266</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47580266</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>> With decompilation I think there's a higher risk of it missing the intention of the code.<p>I'm not sure but suspect the lack of comments and documentation might be an advantage to LLMs for this use case. For security/reverse engineering work, the code's actual behavior matters a lot more than the developer's intention.</p>
]]></description><pubDate>Mon, 30 Mar 2026 20:54:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47579594</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=47579594</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47579594</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Vulnerability research is cooked"]]></title><description><![CDATA[
<p>That was then, this is now. The new models are scarily good. If you're skeptical, just take an hour to replicate the strategy the article references. Point Claude at any open-source codebase you find interesting and instruct it to find exploitable vulnerabilities. Give it a well-defined endpoint if you want (e.g., "You must develop a Python script that triggers memory corruption via a crafted request") and see how well it does.</p>
]]></description><pubDate>Mon, 30 Mar 2026 20:33:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47579372</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=47579372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47579372</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "We mourn our craft"]]></title><description><![CDATA[
<p>Third or fourth, maybe, not first.</p>
]]></description><pubDate>Sun, 08 Feb 2026 04:03:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46931232</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=46931232</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46931232</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing"]]></title><description><![CDATA[
<p>Yes, but it would likely have to be chained with other bugs - at minimum, something that gives you an info leak.</p>
]]></description><pubDate>Tue, 27 Jan 2026 19:54:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=46785535</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=46785535</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46785535</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Fixing a Buffer Overflow in Unix v4 Like It's 1973"]]></title><description><![CDATA[
<p>Yeah, somebody came up with one here: <a href="https://news.ycombinator.com/item?id=46469897">https://news.ycombinator.com/item?id=46469897</a></p>
]]></description><pubDate>Fri, 09 Jan 2026 01:07:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=46548863</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=46548863</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46548863</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Humans May Be Able to Grow New Teeth Within Just 4 Years"]]></title><description><![CDATA[
<p>It’s a phase 1 clinical trial designed only to assess safety and determine the appropriate dosage. Future trials will focus on efficacy.</p>
]]></description><pubDate>Wed, 31 Dec 2025 00:21:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=46439902</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=46439902</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46439902</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "We pwned X, Vercel, Cursor, and Discord through a supply-chain attack"]]></title><description><![CDATA[
<p>Wouldn't platforms see the supposed XSS payloads in their logs and publish analyses of them, or at the very least, announce that they happened?</p>
]]></description><pubDate>Thu, 18 Dec 2025 23:36:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46320343</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=46320343</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46320343</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "XKeyscore"]]></title><description><![CDATA[
<p>I'm sure they can store far more than 20 TB now, but it is true that the content pool is much larger. I would guess it's not a favorable ratio.</p>
]]></description><pubDate>Sun, 07 Dec 2025 23:17:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46186395</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=46186395</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46186395</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Show HN: Cadence – A guitar theory app"]]></title><description><![CDATA[
<p>Thanks for making this! I've been looking for something like this for a while.</p>
]]></description><pubDate>Wed, 22 Oct 2025 23:05:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=45676276</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=45676276</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45676276</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "iOS 18.6.1 0-click RCE POC"]]></title><description><![CDATA[
<p><p><pre><code>  xxd IMGP0847.DNG | grep 03e400:
  0003e400: ffd8 ffc3 000e 0e10 800c 5002 0011 0001  ..........P.....
</code></pre>
Look at the byte at offset 11 (0xb), it's there.</p>
]]></description><pubDate>Wed, 27 Aug 2025 15:51:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=45041330</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=45041330</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45041330</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "iOS 18.6.1 0-click RCE POC"]]></title><description><![CDATA[
<p>Yes:<p><pre><code>  dd status=none if=IMGP0847.DNG bs=1 skip=0x3e40b count=1 | xxd
  00000000: 02</code></pre></p>
]]></description><pubDate>Wed, 27 Aug 2025 02:50:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=45034939</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=45034939</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45034939</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "iOS 18.6.1 0-click RCE POC"]]></title><description><![CDATA[
<p>You need to click the link that says "RAW (33.0MB)". The filename should be "IMGP0847.DNG".</p>
]]></description><pubDate>Wed, 27 Aug 2025 02:36:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=45034861</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=45034861</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45034861</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "iOS 18.6.1 0-click RCE POC"]]></title><description><![CDATA[
<p>I AirDropped the PoC to my vulnerable iPhone. It didn't cause a crash until I tried to edit it in the Photos app.</p>
]]></description><pubDate>Tue, 26 Aug 2025 17:26:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=45029630</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=45029630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45029630</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Cross-Site Request Forgery"]]></title><description><![CDATA[
<p>That's exactly why I don't agree that GETs should be broadly exempted from CSRF protections. I'm not talking about CORS at all.</p>
]]></description><pubDate>Thu, 14 Aug 2025 18:56:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=44904212</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=44904212</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44904212</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Cross-Site Request Forgery"]]></title><description><![CDATA[
<p>The problem boils down to the lack of equivalence between a site and an origin. The article explains how <a href="https://app.example.com" rel="nofollow">https://app.example.com</a> and <a href="https://marketing.example.com" rel="nofollow">https://marketing.example.com</a> may sit at very different trust levels, but are considered the same site by the browser. You don't want <a href="https://marketing.example.com" rel="nofollow">https://marketing.example.com</a> to be able to make requests to <a href="https://app.example.com" rel="nofollow">https://app.example.com</a> with your authentication cookies, but SameSite wouldn't prevent that.</p>
]]></description><pubDate>Wed, 13 Aug 2025 19:18:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=44892619</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=44892619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44892619</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Cross-Site Request Forgery"]]></title><description><![CDATA[
<p>Not sure I agree with this part:<p>> Allow all GET, HEAD, or OPTIONS requests.<p>> These are safe methods, and are assumed not to change state at various layers of the stack already.<p>Plenty of apps violate this assumption and do allow GET requests to alter state.</p>
]]></description><pubDate>Wed, 13 Aug 2025 19:12:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=44892547</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=44892547</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44892547</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "What is X-Forwarded-For and when can you trust it? (2024)"]]></title><description><![CDATA[
<p>XFF handling is the bug that keeps on giving. I'd estimate I've seen incorrect parsing of it in at least half of the web applications I've audited professionally.<p>The funniest is when the app renders user IP addresses somewhere and you can get XSS through it.</p>
]]></description><pubDate>Sat, 26 Jul 2025 15:21:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=44694779</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=44694779</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44694779</guid></item><item><title><![CDATA[New comment by MajesticHobo2 in "Local-first software (2019)"]]></title><description><![CDATA[
<p>You can use FTP and SVN.</p>
]]></description><pubDate>Sun, 06 Jul 2025 00:35:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=44476732</link><dc:creator>MajesticHobo2</dc:creator><comments>https://news.ycombinator.com/item?id=44476732</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44476732</guid></item></channel></rss>