<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: nrengan</title><link>https://news.ycombinator.com/user?id=nrengan</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 03 May 2026 17:22:38 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=nrengan" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by nrengan in "Shai-Hulud Themed Malware Found in the PyTorch Lightning AI Training Library"]]></title><description><![CDATA[
<p>Well, people weren't checking CVEs before pip install before CC either, CC just scaled the habit to a larger audience at a faster cadence. The blast radius for day-zero compromises is what changed.</p>
]]></description><pubDate>Thu, 30 Apr 2026 21:04:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47968206</link><dc:creator>nrengan</dc:creator><comments>https://news.ycombinator.com/item?id=47968206</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47968206</guid></item><item><title><![CDATA[New comment by nrengan in "Shai-Hulud Themed Malware Found in the PyTorch Lightning AI Training Library"]]></title><description><![CDATA[
<p>Most of my pip installs come from Claude Code suggesting them now and me just hitting enter. Model was trained months ago, so it has no clue what got compromised this week. We built the worst possible filter for "is this package safe right now".</p>
]]></description><pubDate>Thu, 30 Apr 2026 19:47:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47967352</link><dc:creator>nrengan</dc:creator><comments>https://news.ycombinator.com/item?id=47967352</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47967352</guid></item></channel></rss>