<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: luisfdias</title><link>https://news.ycombinator.com/user?id=luisfdias</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 22 Apr 2026 20:11:48 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=luisfdias" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by luisfdias in "The Vercel breach: OAuth attack exposes risk in platform environment variables"]]></title><description><![CDATA[
<p>+1 on vaults. One step further: credentials that never land in the runtime environment at all. App authenticates to a gateway via workload identity, gateway proxies the call, process never sees the secret. Makes env enumeration useless even with valid admin access (I work on an open-source tool in this space, so I'm biased).</p>
]]></description><pubDate>Wed, 22 Apr 2026 15:26:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47864982</link><dc:creator>luisfdias</dc:creator><comments>https://news.ycombinator.com/item?id=47864982</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47864982</guid></item></channel></rss>