<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: jfaganel99</title><link>https://news.ycombinator.com/user?id=jfaganel99</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 26 Apr 2026 18:47:17 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=jfaganel99" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by jfaganel99 in "Vibe Coding Is a Security Disaster That Is About to Happen"]]></title><description><![CDATA[
<p>As promised here is the open-source GitRepo so you can give it a go with your tooling: <a href="https://github.com/kolega-ai/Real-Vuln-Benchmark" rel="nofollow">https://github.com/kolega-ai/Real-Vuln-Benchmark</a><p>Updated benchmark results published here also. BTW, with v002 we are consistently hitting 75+</p>
]]></description><pubDate>Fri, 27 Mar 2026 16:15:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47544669</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47544669</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47544669</guid></item><item><title><![CDATA[Show HN: ClawFinder, an open-source discovery and negotiation layer for agents]]></title><description><![CDATA[
<p>Article URL: <a href="https://github.com/kolega-ai/clawfinder-skill">https://github.com/kolega-ai/clawfinder-skill</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47518755">https://news.ycombinator.com/item?id=47518755</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 25 Mar 2026 15:32:01 +0000</pubDate><link>https://github.com/kolega-ai/clawfinder-skill</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47518755</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47518755</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Vibe Coding Is a Security Disaster That Is About to Happen"]]></title><description><![CDATA[
<p>Working on a model benchmark focused on which model is good for these tasks. Keep you posted</p>
]]></description><pubDate>Sun, 22 Mar 2026 20:55:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47482032</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47482032</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47482032</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Vibe Coding Is a Security Disaster That Is About to Happen"]]></title><description><![CDATA[
<p>This is one of the most practical breakdowns I’ve seen for a while. The spec.md as a living architecture map is smart, and documenting auth guard pattern sites as new modules get added is exactly the kind of thing that prevents issues creeping in.<p>The bit I’d push on: do your reviewer agents catch logic errors… things like a double negative auth check or a race condition in a payment flow. Those usually pass a check because code looks intentional and clean. Curious whether your reviewers are prompted specifically for security logic or more for spec conformance?<p>“Don’t merge code you don’t understand” is the right closer. Most setups don’t force that discipline cause people dont have the knowledge :)</p>
]]></description><pubDate>Sun, 22 Mar 2026 18:06:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47480317</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47480317</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47480317</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Vibe Coding Is a Security Disaster That Is About to Happen"]]></title><description><![CDATA[
<p>Author here. The finding that surprised me most while writing this wasn’t the breach numbers. It was the Stanford result: developers with AI assistance introduced more flaws than those without, and felt more confident about their code. The confidence gap is the problem, not just the code quality.<p>The LLM secret predictability angle is something I’m still digging into and will be a separate article. There’s a lot more to it than I could cover here.<p>Genuinely curious: for anyone shipping vibe-coded projects, are you actually running any kind of security check before it goes live? Prompting the AI for a review, using a scanner, doing it manually, or just crossing your fingers? And if you are using an agent workflow for it, what does that look like? Any specific agent skills or tools you’ve found useful versus just adding noise?</p>
]]></description><pubDate>Sun, 22 Mar 2026 17:15:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47479736</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47479736</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47479736</guid></item><item><title><![CDATA[Vibe Coding Is a Security Disaster That Is About to Happen]]></title><description><![CDATA[
<p>Article URL: <a href="https://medium.com/@jostfaganel/vibe-coding-is-a-security-disaster-that-is-about-to-happen-9f72f39756e9">https://medium.com/@jostfaganel/vibe-coding-is-a-security-disaster-that-is-about-to-happen-9f72f39756e9</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47479724">https://news.ycombinator.com/item?id=47479724</a></p>
<p>Points: 9</p>
<p># Comments: 7</p>
]]></description><pubDate>Sun, 22 Mar 2026 17:14:41 +0000</pubDate><link>https://medium.com/@jostfaganel/vibe-coding-is-a-security-disaster-that-is-about-to-happen-9f72f39756e9</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47479724</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47479724</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Vulnerabilities in 45 Open Source Projects (vLLM, Langfuse, Phase, NocoDB)"]]></title><description><![CDATA[
<p>That's a great question. This is how I would think about it:<p>The number of vulnerabilities by itself doesn't mean much. It has more to do with the size of the codebase and the attack surface than with the quality of the code. There is a big difference between 10 findings in 500 lines and 10 findings in 500k lines.<p>What matters more:<p>1. How bad it is and how easy it is to use. An auth bypass is not the same as a timing attack in theory. Check to see if the vulnerabilities are in code paths that can be reached in your deployment.<p>2. The strongest signal is the maintainer's response. How quickly do they reply? Do they take the results seriously or ignore them? A project that fixes problems quickly and gets people involved in a good way is much better than one that has no findings and no security process. For LangFuse specifically, they agreed with two of the findings and said that two of them were acceptable risks. This is a reasonable response. It's worth following up on the V4 non-response, but maintainers are busy and things get missed.<p>3. The kind of bugs is important. It's normal for any codebase to have logic errors, like the ones we found. You don't want to see the same type of vulnerability happen over and over again, because that means there is a systemic gap.<p>The only reason a project shows up in our results is because it's popular enough for us to look at it. I'd be more worried about projects that have never been looked at for security.<p>If you want to know more about LangFuse specifically, you can find all the information on the site: <a href="https://www.kolega.dev/security-wins/" rel="nofollow">https://www.kolega.dev/security-wins/</a></p>
]]></description><pubDate>Wed, 25 Feb 2026 15:42:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47153046</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47153046</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47153046</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Show HN: Skill or Kill – Can you spot the malicious AI agent skill?"]]></title><description><![CDATA[
<p>Hi HN - side project.<p>After reading about the ClawHavoc campaign and seeing how fast malicious 
skills were spreading on ClawHub (1,100+ at last count), I figured it 
would be useful to have something where people can actually practice 
telling the difference between a legit skill and a bad one.<p>The game gives you realistic skill snippets. Some are safe, some are 
modeled on real attack patterns - fake driver installs, hidden bash 
execution, credential pass-through to the LLM context window. You 
classify each one under time pressure and get feedback on what you 
missed and why.<p>5 rounds, runs in the browser, no signup.<p>Happy to talk about the attack patterns or how I put the scenarios 
together.</p>
]]></description><pubDate>Wed, 25 Feb 2026 13:57:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47151509</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47151509</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47151509</guid></item><item><title><![CDATA[Show HN: Skill or Kill – Can you spot the malicious AI agent skill?]]></title><description><![CDATA[
<p>Article URL: <a href="https://skillorkill.dev/">https://skillorkill.dev/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47151497">https://news.ycombinator.com/item?id=47151497</a></p>
<p>Points: 3</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 25 Feb 2026 13:56:46 +0000</pubDate><link>https://skillorkill.dev/</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=47151497</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47151497</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Discord/Twitch/Snapchat age verification bypass"]]></title><description><![CDATA[
<p>[flagged]</p>
]]></description><pubDate>Thu, 12 Feb 2026 08:39:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=46986273</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=46986273</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46986273</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Vulnerabilities in 45 Open Source Projects (vLLM, Langfuse, Phase, NocoDB)"]]></title><description><![CDATA[
<p>Author here. We built a security scanner called Kolega that does semantic analysis instead of pattern matching. To see if it actually worked, we ran it against 45 open source projects and reported what it found through responsible disclosure.<p>225 vulnerabilities. 41 reviewed by maintainers so far, 37 accepted, 4 rejected. 90% acceptance rate.<p>The bugs weren't exotic. They were things like:<p>if not user_id is not None - a double negative in Phase that means the permission check never runs. Nine auth bypasses total.<p>torch.load() without weights_only=True in vLLM - RCE via pickle deserialization in one of the most popular inference frameworks.<p>RestrictedPython sandbox in Agenta where __import__ was explicitly added to safe_builtins. Four different escape routes to arbitrary code execution.<p>SQL injection in NocoDB's Oracle client - Semgrep scanned the same codebase and found 222 issues, 208 of which were false positives, and missed this one entirely.<p>The interesting part to me wasn't that we found bugs. It's that these are all syntactically correct - the code compiles, runs, looks fine in review. The problems are semantic. No pattern matcher catches not X is not None because it's valid Python. You have to understand what the developer intended.<p>Every finding is published with full details - code locations, CWEs, PR numbers, disclosure timelines: <a href="https://www.kolega.dev/security-wins/" rel="nofollow">https://www.kolega.dev/security-wins/</a><p>135 findings are still waiting on maintainer response. 4 were rejected - some we thought were exploitable, maintainers disagreed. We document those too.<p>Happy to discuss specifics on any of the projects or argue about methodology.</p>
]]></description><pubDate>Wed, 11 Feb 2026 14:11:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46975146</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=46975146</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46975146</guid></item><item><title><![CDATA[Vulnerabilities in 45 Open Source Projects (vLLM, Langfuse, Phase, NocoDB)]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.kolega.dev/blog/why-we-found-225-security-flaws-in-45-open-source-projects-that-sast-missed/">https://www.kolega.dev/blog/why-we-found-225-security-flaws-in-45-open-source-projects-that-sast-missed/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46975123">https://news.ycombinator.com/item?id=46975123</a></p>
<p>Points: 2</p>
<p># Comments: 3</p>
]]></description><pubDate>Wed, 11 Feb 2026 14:09:55 +0000</pubDate><link>https://www.kolega.dev/blog/why-we-found-225-security-flaws-in-45-open-source-projects-that-sast-missed/</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=46975123</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46975123</guid></item><item><title><![CDATA[New comment by jfaganel99 in "It's all a blur"]]></title><description><![CDATA[
<p>How do we apply this to geospatial face and licence plate blurs?</p>
]]></description><pubDate>Wed, 11 Feb 2026 14:04:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=46975073</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=46975073</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46975073</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Windows Notepad App Remote Code Execution Vulnerability"]]></title><description><![CDATA[
<p>Yeah, way more than the good old Notepad :)</p>
]]></description><pubDate>Wed, 11 Feb 2026 11:59:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46973878</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=46973878</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46973878</guid></item><item><title><![CDATA[New comment by jfaganel99 in "Windows Notepad App Remote Code Execution Vulnerability"]]></title><description><![CDATA[
<p>Notepad had one job...  Seems like bringing markdown features killed it :)</p>
]]></description><pubDate>Wed, 11 Feb 2026 08:34:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46972385</link><dc:creator>jfaganel99</dc:creator><comments>https://news.ycombinator.com/item?id=46972385</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46972385</guid></item></channel></rss>