<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mukesh610</title><link>https://news.ycombinator.com/user?id=mukesh610</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 03:57:02 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mukesh610" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Code of Ur-Nammu]]></title><description><![CDATA[
<p>Article URL: <a href="https://en.wikipedia.org/wiki/Code_of_Ur-Nammu">https://en.wikipedia.org/wiki/Code_of_Ur-Nammu</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45860370">https://news.ycombinator.com/item?id=45860370</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 08 Nov 2025 21:48:48 +0000</pubDate><link>https://en.wikipedia.org/wiki/Code_of_Ur-Nammu</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=45860370</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45860370</guid></item><item><title><![CDATA[New comment by mukesh610 in "Filedb: Disk-based key-value store inspired by Bitcask"]]></title><description><![CDATA[
<p>From the README:<p>A sync process syncs the open disk files once every config.syncInterval. Sync also can be done on every request if config.alwaysFsync is True.</p>
]]></description><pubDate>Sat, 14 Jun 2025 08:10:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=44274983</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=44274983</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44274983</guid></item><item><title><![CDATA[New comment by mukesh610 in "The unreasonable effectiveness of an LLM agent loop with tool use"]]></title><description><![CDATA[
<p>Ah, failed to notice that.<p>I was so excited because this was exactly what I coded up today, I jumped straight to the comments.</p>
]]></description><pubDate>Thu, 15 May 2025 21:44:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=43999626</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=43999626</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43999626</guid></item><item><title><![CDATA[New comment by mukesh610 in "The unreasonable effectiveness of an LLM agent loop with tool use"]]></title><description><![CDATA[
<p>I built this very same thing today! The only difference is that i pushed the tool call outputs into the conversation history and resent it back to the LLM for it to summarize, or perform further tool calls, if necessary, automagically.<p>I used ollama to build this and ollama supports tool calling natively, by passing a `tools=[...]` in the Python SDK. The tools can be regular Python functions with docstrings that describe the tool use. The SDK handles converting the docstrings into a format the LLM can recognize, so my tool's code documentation becomes the model's source of truth. I can also include usage examples right in the docstring to guide the LLM to work closely with all my available tools. No system prompt needed!<p>Moreover, I wrote all my tools in a separate module, and just use `inspect.getmembers` to construct the `tools` list that i pass to Ollama. So when I need to write a new tool, I just write another function in the tools module and it Just Works™<p>Paired with qwen 32b running locally, i was fairly satisfied with the output.</p>
]]></description><pubDate>Thu, 15 May 2025 21:21:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=43999457</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=43999457</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43999457</guid></item><item><title><![CDATA[New comment by mukesh610 in "Don't watermark your legal PDFs with purple dragons in suits"]]></title><description><![CDATA[
<p>Unintentionally discovering a thing you know you're going to hate has got to be top 10 internet experiences.</p>
]]></description><pubDate>Fri, 02 May 2025 07:21:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=43867074</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=43867074</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43867074</guid></item><item><title><![CDATA[New comment by mukesh610 in "Ssl.com: DCV bypass and issue fake certificates for any MX hostname"]]></title><description><![CDATA[
<p>Even then, use of a DNS CAA record should mitigate this, right?</p>
]]></description><pubDate>Sat, 19 Apr 2025 19:29:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=43738802</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=43738802</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43738802</guid></item><item><title><![CDATA[New comment by mukesh610 in "My Own Private Binary: An Idiosyncratic Introduction to Linux Kernel Modules"]]></title><description><![CDATA[
<p>Both articles are correct, from me reading them. When you invoke a shell script directly, it gets passed to the kernel to try and execve. The kernel returns ENOEXEC when it detects it doesn't have a shebang. The shell catches the error, and then as a last resort, tries opening the file and interpreting its instructions.<p>I might be wrong, so do correct me if so.</p>
]]></description><pubDate>Fri, 11 Apr 2025 08:10:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=43651510</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=43651510</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43651510</guid></item><item><title><![CDATA[Advanced web application fingerprinting with favicon hashes]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.razzsecurity.com/2024/09/13/information-gathering/advanced-web-application-fingerprinting-with-favicon-hashes/">https://blog.razzsecurity.com/2024/09/13/information-gathering/advanced-web-application-fingerprinting-with-favicon-hashes/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41532109">https://news.ycombinator.com/item?id=41532109</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 13 Sep 2024 15:26:38 +0000</pubDate><link>https://blog.razzsecurity.com/2024/09/13/information-gathering/advanced-web-application-fingerprinting-with-favicon-hashes/</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=41532109</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41532109</guid></item><item><title><![CDATA[New comment by mukesh610 in "Exploiting CI / CD Pipelines for fun and profit"]]></title><description><![CDATA[
<p>No, in my YAML example, you could see that there were no credentials directly hard-coded into the pipeline. The credentials are configured separately, and the Pipelines are free to use them to do whatever actions they want.<p>This is how all major players in the market recommend you set up your CI pipeline. The problem here lies in implicit trust of the pipeline configuration which is stored along with the code.</p>
]]></description><pubDate>Mon, 09 Sep 2024 11:59:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=41487711</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=41487711</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41487711</guid></item><item><title><![CDATA[New comment by mukesh610 in "Exploiting CI / CD Pipelines for fun and profit"]]></title><description><![CDATA[
<p>You're right, there are other avenues of exploitation. This particular approach was interesting to me because it is easily automatable (scour the internet for exposed credentials, clone the repo and detect if Pipelines are being used, profit).<p>Other exploits might need more targeted steps to achieve. For example, embedding a malware into the source code might require language / framework fingerprinting.</p>
]]></description><pubDate>Mon, 09 Sep 2024 11:55:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=41487668</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=41487668</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41487668</guid></item><item><title><![CDATA[New comment by mukesh610 in "Exploiting CI / CD Pipelines for fun and profit"]]></title><description><![CDATA[
<p>It's pretty common in systems where the final output to be deployed is the same as the root of the source tree. More often than not, lazy developers tend to just git clone the repo and point their web server's document root to the cloned source folder. In default configurations, .git is happily served to anyone asking for it.<p>This seems to be automatically mitigated in systems which might have a "build" / "compilation" phase, because for the application to work in the first place, you only need the compiled output to be deployed. For instance, Apache Tomcat.</p>
]]></description><pubDate>Sun, 08 Sep 2024 23:44:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=41484242</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=41484242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41484242</guid></item><item><title><![CDATA[Exploiting CI / CD Pipelines for fun and profit]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.razzsecurity.com/2024/09/08/exploitation-research/exploiting-ci-cd-pipelines-for-fun-and-profit/">https://blog.razzsecurity.com/2024/09/08/exploitation-research/exploiting-ci-cd-pipelines-for-fun-and-profit/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=41483541">https://news.ycombinator.com/item?id=41483541</a></p>
<p>Points: 124</p>
<p># Comments: 44</p>
]]></description><pubDate>Sun, 08 Sep 2024 21:52:04 +0000</pubDate><link>https://blog.razzsecurity.com/2024/09/08/exploitation-research/exploiting-ci-cd-pipelines-for-fun-and-profit/</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=41483541</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41483541</guid></item><item><title><![CDATA[New comment by mukesh610 in "Windows on Btrfs"]]></title><description><![CDATA[
<p>Don't use this. I once tried it and it changed the UUID of the Linux partition without any warning. Grub was unable to pick up the partition and boot, so I was stuck at grub rescue.<p>God knows what other bugs their software has.</p>
]]></description><pubDate>Sat, 22 Apr 2023 03:23:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=35663071</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=35663071</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35663071</guid></item><item><title><![CDATA[New comment by mukesh610 in "Pgrok – Poor Man’s Ngrok"]]></title><description><![CDATA[
<p>Not exactly sure how streamlined your security process is, but for some orgs it is a red tape roller coaster to even get one TCP port open.<p>Anyways, you could also block all traffic to ngrok servers just to ensure your Dev teams aren't skirting around your firewall.</p>
]]></description><pubDate>Sun, 12 Mar 2023 13:51:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=35120006</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=35120006</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=35120006</guid></item><item><title><![CDATA[New comment by mukesh610 in "GitHub is sued, and we may learn something about Creative Commons licensing"]]></title><description><![CDATA[
<p>IMO fair use is still not a strong argument for Microsoft. They commercialized the product and made  money out of it.<p>Fair use is only allowed if the work you're doing is purely for the greater good. I might be wrong though, IANAL.</p>
]]></description><pubDate>Fri, 06 Jan 2023 15:24:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=34275646</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=34275646</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34275646</guid></item><item><title><![CDATA[New comment by mukesh610 in "Tencent WeChat is now a GitHub secret scanning partner"]]></title><description><![CDATA[
<p>I don't see what your comment is trying to point out.<p>The same could be said for all the other Secret Scanning partners GitHub has, like AWS and so on.<p>That being said, it's impossible that a "bad regexp" is gonna make its way to the GitHub codebase.</p>
]]></description><pubDate>Tue, 20 Dec 2022 15:25:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=34067151</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=34067151</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=34067151</guid></item><item><title><![CDATA[New comment by mukesh610 in "Disputing a Parking Fine with ChatGPT"]]></title><description><![CDATA[
<p>Detecting GPT generated content will take a fairly large language model to be reliable. Obviously this would need to be run in the cloud. Considering Apple's stance on privacy, sending private correspondence to the cloud is a huge no-no for them. Nobody is gonna implement GPT detection, atleast for emails.</p>
]]></description><pubDate>Sun, 11 Dec 2022 04:01:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=33939943</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=33939943</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33939943</guid></item><item><title><![CDATA[New comment by mukesh610 in "Sign in with Google has been removed for your privacy"]]></title><description><![CDATA[
<p>I'm confused. In your first comment you seemed to refer to legitimate sites harvesting credentials using Google SSO (whatever that means)<p>Now you're talking about phishing sites.<p>Can you clarify which kind of websites you're referring to?</p>
]]></description><pubDate>Sun, 11 Dec 2022 03:19:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=33939714</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=33939714</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33939714</guid></item><item><title><![CDATA[New comment by mukesh610 in "Meta fires a software engineer two days after he relocated from India to Canada"]]></title><description><![CDATA[
<p>There's a difference between getting fired and laid off</p>
]]></description><pubDate>Mon, 14 Nov 2022 10:59:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=33592431</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=33592431</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=33592431</guid></item><item><title><![CDATA[New comment by mukesh610 in "Statistical Analysis shows Echos process voice to serve ads"]]></title><description><![CDATA[
<p>Fiction isn't exactly a good argument</p>
]]></description><pubDate>Wed, 27 Apr 2022 09:31:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=31178002</link><dc:creator>mukesh610</dc:creator><comments>https://news.ycombinator.com/item?id=31178002</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31178002</guid></item></channel></rss>