<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ievans</title><link>https://news.ycombinator.com/user?id=ievans</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 24 Apr 2026 20:25:43 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ievans" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ievans in "Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign"]]></title><description><![CDATA[
<p>Top comment has a great explicit refutation:<p>> This plan works by letting software supply chain companies find security issues in new releases. Many security companies have automated scanners for popular and less popular libraries, with manual triggers for those libraries which are not in the top N.</p>
]]></description><pubDate>Thu, 23 Apr 2026 19:38:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47880626</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=47880626</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47880626</guid></item><item><title><![CDATA[New comment by ievans in "Making frontier cybersecurity capabilities available to defenders"]]></title><description><![CDATA[
<p>Not super surprising that Anthropic is shipping a vulnerability detection feature -- OpenAI announced Aardvark back in October (<a href="https://openai.com/index/introducing-aardvark/" rel="nofollow">https://openai.com/index/introducing-aardvark/</a>) and Google announced BigSleep in Nov 2024 (<a href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap" rel="nofollow">https://cloud.google.com/blog/products/identity-security/clo...</a>).<p>The impact question is really around scale; a few weeks ago Anthropic claimed 500 "high-severity" vulnerabilities discovered by Opus 4.6 (<a href="https://red.anthropic.com/2026/zero-days/" rel="nofollow">https://red.anthropic.com/2026/zero-days/</a>). There's been some skepticism about whether they are truly high severity, but it's a much larger number than what BigSleep found (~20) and Aardvark hasn't released public numbers.<p>As someone who founded a company in the space (Semgrep), I really appreciated that the DARPA AIxCC competition required players using LLMs for vulnerability discovery to disclose $cost/vuln and the confusion matrix of false positives along with it. It's clear that LLMs are super valuable for vulnerability discovery, but without that information it's difficult to know which foundation model is really leading.<p>What we've found is that giving LLM security agents access to good tools (Semgrep, CodeQL, etc.) makes them significantly better esp. when it comes to false positives. We think the future is more "virtual security engineer" agents using tools with humans acting as the appsec manager.  Would be very interested to hear from other people on HN who have been trying this approach!</p>
]]></description><pubDate>Fri, 20 Feb 2026 18:59:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47092277</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=47092277</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47092277</guid></item><item><title><![CDATA[New comment by ievans in "Strengthening supply chain security: Preparing for the next malware campaign"]]></title><description><![CDATA[
<p>"Staged publishing: A new publication model that gives maintainers a review period before packages go live, with MFA-verified approval from package owners. This empowers teams to catch unintended changes before they reach downstream users—a capability the community has been requesting for years."<p>Overdue but welcome!</p>
]]></description><pubDate>Wed, 07 Jan 2026 19:08:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46530998</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=46530998</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46530998</guid></item><item><title><![CDATA[Poisoning Attacks on LLMs Require a Near-Constant Number of Poison Samples]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2510.07192">https://arxiv.org/abs/2510.07192</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45675398">https://news.ycombinator.com/item?id=45675398</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 22 Oct 2025 21:28:32 +0000</pubDate><link>https://arxiv.org/abs/2510.07192</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=45675398</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45675398</guid></item><item><title><![CDATA[Dayssincelastsupplychainattack.com]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.dayssincelastsupplychainattack.com/">https://www.dayssincelastsupplychainattack.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45171010">https://news.ycombinator.com/item?id=45171010</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 08 Sep 2025 17:20:32 +0000</pubDate><link>https://www.dayssincelastsupplychainattack.com/</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=45171010</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45171010</guid></item><item><title><![CDATA[Dayssincelastsupplychainattack.com]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.dayssincelastsupplychainattack.com/">https://www.dayssincelastsupplychainattack.com/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45054313">https://news.ycombinator.com/item?id=45054313</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 28 Aug 2025 16:48:00 +0000</pubDate><link>https://www.dayssincelastsupplychainattack.com/</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=45054313</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45054313</guid></item><item><title><![CDATA[New comment by ievans in "Reflections on OpenAI"]]></title><description><![CDATA[
<p>This is explicitly not the conclusion Pascal drew with the wager, as described in the next section of the Wikipedia article: "Pascal's intent was not to provide an argument to convince atheists to believe, but (a) to show the fallacy of attempting to use logical reasoning to prove or disprove God..."</p>
]]></description><pubDate>Wed, 16 Jul 2025 14:12:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=44582607</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=44582607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44582607</guid></item><item><title><![CDATA[Chromium Security: The Rule of 2]]></title><description><![CDATA[
<p>Article URL: <a href="https://chromium.googlesource.com/chromium/src/+/main/docs/security/rule-of-2.md">https://chromium.googlesource.com/chromium/src/+/main/docs/security/rule-of-2.md</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43416943">https://news.ycombinator.com/item?id=43416943</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 19 Mar 2025 20:29:31 +0000</pubDate><link>https://chromium.googlesource.com/chromium/src/+/main/docs/security/rule-of-2.md</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=43416943</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43416943</guid></item><item><title><![CDATA[New comment by ievans in "Archival Storage"]]></title><description><![CDATA[
<p>Do you store your SSDs powered? They can lose information if they're not semi-frequently powered on.</p>
]]></description><pubDate>Mon, 17 Mar 2025 23:44:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=43394020</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=43394020</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43394020</guid></item><item><title><![CDATA[New comment by ievans in "Show HN: Globstar – Open-source static analysis toolkit"]]></title><description><![CDATA[
<p>For C, you might be interested in <a href="https://github.com/weggli-rs/weggli">https://github.com/weggli-rs/weggli</a> or <a href="https://github.com/semgrep/semgrep">https://github.com/semgrep/semgrep</a> (I work on the latter). Both are also tree-sitter based.</p>
]]></description><pubDate>Fri, 28 Feb 2025 18:27:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=43208767</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=43208767</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43208767</guid></item><item><title><![CDATA[New comment by ievans in "CLI tool to insert spacers when command output stops"]]></title><description><![CDATA[
<p>Looks like the `ets` readme has a direct comparison:<p>> The purpose of ets is similar to that of moreutils ts(1), but ets differentiates itself from similar offerings by running commands directly within ptys, hence solving thorny issues like pipe buffering and commands disabling color and interactive features when detecting a pipe as output. (ets does provide a reading-from-stdin mode if you insist.) ets also recognizes carriage return as a line seperator, so it doesn't choke if your command prints a progress bar. A more detailed comparison of ets and ts can be found below.</p>
]]></description><pubDate>Mon, 23 Dec 2024 18:32:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=42496539</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=42496539</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42496539</guid></item><item><title><![CDATA[New comment by ievans in "Refactoring Python with Tree-sitter and Jedi"]]></title><description><![CDATA[
<p>I wrote up a Semgrep rule as a comparison to add! (also tree-sitter based, `pip install Semgrep`, <a href="https://github.com/semgrep/semgrep">https://github.com/semgrep/semgrep</a>,  or play with live editor link: <a href="https://semgrep.dev/playground/s/nJ4rY" rel="nofollow">https://semgrep.dev/playground/s/nJ4rY</a>)<p><pre><code>    pattern: |-
       def $FUNC(..., database, ...):
           $...BODY
    fix: |-
      def $FUNC(..., db, ...):
          $...BODY</code></pre></p>
]]></description><pubDate>Sat, 28 Sep 2024 03:47:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=41677710</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=41677710</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41677710</guid></item><item><title><![CDATA[New comment by ievans in "Eliminating Memory Safety Vulnerabilities at the Source"]]></title><description><![CDATA[
<p>So the argument is because the vulnerability lifetime is exponentially distributed, focusing on secure defaults like memory safety in <i>new code</i> is disproportionately valuable, both theoretically and now evidentially seen over six years on the Android codebase.<p>Amazing, I've never seen this argument used to support shift/left secure guardrails but it's great. Especially for those with larger, legacy codebases who might otherwise say "why bother, we're never going to benefit from memory-safety on our 100M lines of C++."<p>I think it also implies any lightweight vulnerability detection has disproportionate benefit -- even if it was to only look at new code & dependencies vs the backlog.</p>
]]></description><pubDate>Wed, 25 Sep 2024 22:21:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=41652478</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=41652478</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41652478</guid></item><item><title><![CDATA[98% of PyMySQL forks are vulnerable to SQL Injection]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.cramhacks.com/p/stop-forking-deps">https://www.cramhacks.com/p/stop-forking-deps</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41368925">https://news.ycombinator.com/item?id=41368925</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 27 Aug 2024 15:54:45 +0000</pubDate><link>https://www.cramhacks.com/p/stop-forking-deps</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=41368925</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41368925</guid></item><item><title><![CDATA[Semgrep: Semantic Grep for Code]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/semgrep/semgrep">https://github.com/semgrep/semgrep</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40212548">https://news.ycombinator.com/item?id=40212548</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 30 Apr 2024 16:01:14 +0000</pubDate><link>https://github.com/semgrep/semgrep</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=40212548</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40212548</guid></item><item><title><![CDATA[New comment by ievans in "Difftastic, a structural diff tool that understands syntax"]]></title><description><![CDATA[
<p>Absolutely agreed, and copying from a comment I wrote last year: I think the fact that tree-sitter is dependency-free is worth highlighting. For context, some of my teammates maintain the OCaml tree-sitter bindings and often contribute to grammars as part of our work on Semgrep (Semgrep uses tree-sitter for searching code and parsing queries that are code snippets themselves into AST matchers).<p>Often when writing a linter, you need to bring along the runtime of the language you're targeting. E.g., in python if you're writing a parser using the builtin `ast` module, you need to match the language version & features. So you can't parse Python 3 code with Pylint running on Python 2.7, for instance. This ends up being more obnoxious than you'd think at first, especially if you're targeting multiple languages.<p>Before tree-sitter, using a language's built-in AST tooling was often the best approach because it is guaranteed to keep up with the latest syntax. IMO the genius of tree-sitter is that it's made it way easier than with traditional grammars to keep the language parsers updated. Highly recommend Max Brunsfield's strange loop talk if you want to learn more about the design choices behind tree-sitter: <a href="https://www.youtube.com/watch?v=Jes3bD6P0To" rel="nofollow">https://www.youtube.com/watch?v=Jes3bD6P0To</a><p>And this has resulted in a bunch of new tools built off on tree-sitter, off the top of my head in addition to difftastic: neovim, Zed, Semgrep, and Github code search!</p>
]]></description><pubDate>Thu, 21 Mar 2024 16:44:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=39780995</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=39780995</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39780995</guid></item><item><title><![CDATA[Semgrep Secrets]]></title><description><![CDATA[
<p>Article URL: <a href="https://semgrep.dev/blog/2023/introducing-semgrep-secrets/">https://semgrep.dev/blog/2023/introducing-semgrep-secrets/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38001501">https://news.ycombinator.com/item?id=38001501</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 24 Oct 2023 16:28:32 +0000</pubDate><link>https://semgrep.dev/blog/2023/introducing-semgrep-secrets/</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=38001501</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38001501</guid></item><item><title><![CDATA[The Evolution of Open Source Business Models]]></title><description><![CDATA[
<p>Article URL: <a href="https://tomtunguz.com/evolution-of-open-source-business-models/">https://tomtunguz.com/evolution-of-open-source-business-models/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37397366">https://news.ycombinator.com/item?id=37397366</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 05 Sep 2023 20:36:42 +0000</pubDate><link>https://tomtunguz.com/evolution-of-open-source-business-models/</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=37397366</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37397366</guid></item><item><title><![CDATA[White House RFI on Open-Source Software Security and Memory Safe Languages]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.whitehouse.gov/oncd/briefing-room/2023/08/10/fact-sheet-office-of-the-national-cyber-director-requests-public-comment-on-open-source-software-security-and-memory-safe-programming-languages/">https://www.whitehouse.gov/oncd/briefing-room/2023/08/10/fact-sheet-office-of-the-national-cyber-director-requests-public-comment-on-open-source-software-security-and-memory-safe-programming-languages/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37082064">https://news.ycombinator.com/item?id=37082064</a></p>
<p>Points: 17</p>
<p># Comments: 2</p>
]]></description><pubDate>Thu, 10 Aug 2023 21:32:09 +0000</pubDate><link>https://www.whitehouse.gov/oncd/briefing-room/2023/08/10/fact-sheet-office-of-the-national-cyber-director-requests-public-comment-on-open-source-software-security-and-memory-safe-programming-languages/</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=37082064</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37082064</guid></item><item><title><![CDATA[Guardrails for PromQL Using Semgrep]]></title><description><![CDATA[
<p>Article URL: <a href="https://semgrep.dev/blog/2023/promql-and-semgrep">https://semgrep.dev/blog/2023/promql-and-semgrep</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=37052385">https://news.ycombinator.com/item?id=37052385</a></p>
<p>Points: 14</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 08 Aug 2023 17:15:23 +0000</pubDate><link>https://semgrep.dev/blog/2023/promql-and-semgrep</link><dc:creator>ievans</dc:creator><comments>https://news.ycombinator.com/item?id=37052385</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37052385</guid></item></channel></rss>