<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ctmnt</title><link>https://news.ycombinator.com/user?id=ctmnt</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 22 Apr 2026 08:51:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ctmnt" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ctmnt in "Vercel April 2026 security incident"]]></title><description><![CDATA[
<p>I agree / hope that’s what they meant. It seems disingenuous, though, to describe it as unreadable, since obviously something has to read it to bake it into the deploy. And given their apparent lack of effective security boundaries in one area, why should we assume that they’ve got the deploy system adequately locked down?<p>It’s not like I had a ton of trust in them before, but now they’ve lost almost all credibility.</p>
]]></description><pubDate>Mon, 20 Apr 2026 19:00:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47838992</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47838992</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47838992</guid></item><item><title><![CDATA[New comment by ctmnt in "Vercel April 2026 security incident"]]></title><description><![CDATA[
<p>Where did you see that a Context employee had credentials stolen in February? I haven't run into that particular data point.</p>
]]></description><pubDate>Mon, 20 Apr 2026 15:47:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47836021</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47836021</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47836021</guid></item><item><title><![CDATA[New comment by ctmnt in "Vercel April 2026 security incident"]]></title><description><![CDATA[
<p>Not just into Vercel's env vars, but into Vercel's customer's env vars.</p>
]]></description><pubDate>Mon, 20 Apr 2026 15:45:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47835989</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47835989</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47835989</guid></item><item><title><![CDATA[New comment by ctmnt in "Vercel April 2026 security incident"]]></title><description><![CDATA[
<p>An email from Vercel came to my company at 10:47am UTC. It contained little information, and said:<p>> At this time, we do not have reason to believe that your Vercel credentials or personal data have been compromised.<p>Which is not very reassuring without actual information, since presumably they would have said the same thing on Saturday, if asked.</p>
]]></description><pubDate>Mon, 20 Apr 2026 13:54:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47834396</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47834396</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47834396</guid></item><item><title><![CDATA[New comment by ctmnt in "Vercel April 2026 security incident"]]></title><description><![CDATA[
<p>They mean the latter. Very unclear how that translates to meaningful security.</p>
]]></description><pubDate>Mon, 20 Apr 2026 01:08:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47829246</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47829246</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47829246</guid></item><item><title><![CDATA[New comment by ctmnt in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>You’re right, I should have been more careful in my reference to AWS. No need to be snarky about it.<p>Let me rephrase: aside from that one example from a couple years ago, I haven’t seen any examples of production code written in Lean. I’d be very interested in being proven wrong, this isn’t something I desire, just what I’ve observed. Have you seen any others?<p>More generally, you implicitly make a good point: writing important libraries in Lean and calling in from another language is probably the most likely use case. So not programs / apps / binaries written in Lean, but small critical components.</p>
]]></description><pubDate>Tue, 14 Apr 2026 15:31:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47766981</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47766981</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47766981</guid></item><item><title><![CDATA[New comment by ctmnt in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>You’re right, there is that one example. Feels like we’re in exception that proves the rule territory. But I’d be very interested in being proven wrong! This isn’t a desire of mine, just what I’ve seen. Do you have other examples?<p>Also, part of my confidence comes from both having been a professional programmer for decades, across many languages, and also having programmed in Lean. It’s a great language for math, perhaps the best choice right now. But as a general purpose language it’s incredibly quirky.</p>
]]></description><pubDate>Tue, 14 Apr 2026 15:26:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47766899</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47766899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47766899</guid></item><item><title><![CDATA[New comment by ctmnt in "Franklin's bad ads for Apple II clones and the beloved impersonator they depict"]]></title><description><![CDATA[
<p>That is amazing. Compounded by the fact that there's a product listed as "COMING SOON JULY 2025"! This isn't an abandoned site.</p>
]]></description><pubDate>Tue, 14 Apr 2026 13:31:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47765428</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47765428</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47765428</guid></item><item><title><![CDATA[New comment by ctmnt in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>Sure, but are you worried about someone cheating on their arXiv submission by exploiting a buffer overflow? It’s a real bug, it’s just not very important.</p>
]]></description><pubDate>Tue, 14 Apr 2026 10:05:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763539</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47763539</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763539</guid></item><item><title><![CDATA[New comment by ctmnt in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>There are no Lean applications other than Lean. This is an important point most of the comments are missing. Lean is for proving math. Yes, you can use it for other things; but no, no one is.<p>Still good to have found, but drawing conclusions past “someone could cheat at proving the continuum hypothesis” isn’t really warranted.</p>
]]></description><pubDate>Tue, 14 Apr 2026 10:04:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763527</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47763527</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763527</guid></item><item><title><![CDATA[New comment by ctmnt in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>Hi Kiran, thanks for following up. FWIW, I enjoy your blog and your work. And I do think it was a valuable bug you found; also nice to see how quickly Henrik fixed it.<p>Say more about people running Lean in production. I haven’t run into any. I know of examples of people using Lean to help verify other code (Cedar and Aeneas being the most prominent examples), but not the actual runtime being employed.<p>I took a quick scan of lean-lang.org just now, and, other than the two examples I mentioned, didn’t see a single reference to anything other than proving math.<p>I’m sure you’re in the Lean Zulup, based on what you’ve been up to. Are you seeing people talk about anything other than math? I’m not, but maybe I’m missing it.</p>
]]></description><pubDate>Tue, 14 Apr 2026 10:01:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763497</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47763497</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763497</guid></item><item><title><![CDATA[New comment by ctmnt in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>Yes, it isn’t performant. Lean isn’t a language for writing software, though you technically can; it’s a language for proving math.</p>
]]></description><pubDate>Tue, 14 Apr 2026 09:51:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47763417</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47763417</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47763417</guid></item><item><title><![CDATA[New comment by ctmnt in "Lean proved this program correct; then I found a bug"]]></title><description><![CDATA[
<p>This article’s framing and title are odd. The author, in fact, found no bugs or errors in the proven code. She says so at the end of the article:<p>> The two bugs that were found both sat outside the boundary of what the proofs cover. The denial-of-service was a missing specification. The heap overflow was a deeper issue in the trusted computing base, the C++ runtime that the entire proof edifice assumes is correct.<p>Still an interesting and useful result to find a bug in the Lean runtime, but I’d argue that doesn’t justify the title. Or the claim that “the entire proof edifice” is somehow shaky.<p>It’s important to note that this is the Lean <i>runtime</i> that has a bug, not the Lean kernel, which is the part that actually does the verification (aka proving). [1] So it’s not even immediately clear what this bug would really apply to, since obviously no one’s running any compiled Lean code in any kind of production hot path.<p>[1] <a href="https://lean-lang.org/doc/reference/latest/Elaboration-and-Compilation/" rel="nofollow">https://lean-lang.org/doc/reference/latest/Elaboration-and-C...</a></p>
]]></description><pubDate>Tue, 14 Apr 2026 01:12:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47760024</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47760024</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47760024</guid></item><item><title><![CDATA[New comment by ctmnt in "Ghostmoon.app – A Swiss Army Knife for your macOS menu bar"]]></title><description><![CDATA[
<p>This looks cool enough, but it’s starting to drive me crazy how people are in such a rush to put out their macOS apps they can’t be bothered to get a developer account and run a one line command. It’s not hard.<p>I used to be sympathetic to complaints about not wanting to pay the developer account fee. But when you’re vibe coding, you’re probably paying a good chunk of change to your LLM supplier of choice every month, and the yearly developer account fee seems minor in comparison<p>Also, it’s just such a bad security precedent. This page describes the error you get as “the typical macOS Gatekeeper warning”, as though it were just another piece of corporate silliness, like clicking through a EULA.</p>
]]></description><pubDate>Mon, 30 Mar 2026 11:54:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47573101</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47573101</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47573101</guid></item><item><title><![CDATA[New comment by ctmnt in "Agent-to-agent pair programming"]]></title><description><![CDATA[
<p>I find both to be true. I use Claude for most of the implementation, and Codex always catches mistakes. Always. But both of them benefit from being asked if they’re sure they did everything.</p>
]]></description><pubDate>Fri, 27 Mar 2026 12:42:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47542031</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47542031</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47542031</guid></item><item><title><![CDATA[New comment by ctmnt in "Anthropic Subprocessor Changes"]]></title><description><![CDATA[
<p>To be clear, for those reading these comments and thinking “oh no Azure”, this is an addition to the list of cloud companies that provide “cloud infrastructure worldwide” for “all products”. Alongside GCP and AWS. This is not a GitHub style announcement that they’ve moved all operations to Azure.</p>
]]></description><pubDate>Fri, 27 Mar 2026 07:07:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47539802</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47539802</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47539802</guid></item><item><title><![CDATA[New comment by ctmnt in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>Ah, my mistake! Thanks for the correction.<p>But I believe you can replace versions on both, nonetheless. It’s a multi step process, unpublish then publish again. But the net effect is the same.</p>
]]></description><pubDate>Wed, 25 Mar 2026 14:04:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=47517503</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47517503</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47517503</guid></item><item><title><![CDATA[New comment by ctmnt in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>They absolutely do. In this case litellm 1.82.8 had been out for at least a week (can’t recall the exact date offhand). The compromised version was a replacement.</p>
]]></description><pubDate>Wed, 25 Mar 2026 10:30:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47515514</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47515514</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47515514</guid></item><item><title><![CDATA[New comment by ctmnt in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>This is fantastic, thank you. Your reporting has been great. But also, damn, the playlist.</p>
]]></description><pubDate>Wed, 25 Mar 2026 00:17:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47511494</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47511494</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47511494</guid></item><item><title><![CDATA[New comment by ctmnt in "GitHub appears to be struggling with measly three nines availability"]]></title><description><![CDATA[
<p>I get the email notifications from Anthropic’s status monitor, and I think they might be my most frequent emailer these days.</p>
]]></description><pubDate>Mon, 23 Mar 2026 13:38:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47489389</link><dc:creator>ctmnt</dc:creator><comments>https://news.ycombinator.com/item?id=47489389</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47489389</guid></item></channel></rss>