<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: nstart</title><link>https://news.ycombinator.com/user?id=nstart</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 17:55:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=nstart" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by nstart in "Obsidian plugin was abused to deploy a remote access trojan"]]></title><description><![CDATA[
<p>This is a misleading headline. It makes it seem like another supply chain attack where some good plug-in was taken over and used to deliver malware. Thats not the case here. Victims are invited to collaborate on a synced vault which comes preloaded with a non official plug-in that delivers the rat. Very very different story</p>
]]></description><pubDate>Mon, 11 May 2026 13:41:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=48094890</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=48094890</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48094890</guid></item><item><title><![CDATA[New comment by nstart in "Reports of code's death are greatly exaggerated"]]></title><description><![CDATA[
<p>Before software, there were accountants. It was The qualification to have.<p>Today accountants are still needed. But it's a commodified job. And you start at the absolute bottom of the bottom rungs and slave it out till you can separate yourself and take on a role on a path to CFO or some respectable level of seniority.<p>I'm oversimplifying here but that is sufficient to show <i>A</i> path forward for software engineers imo. In this parallel, most of us will become AI drivers. We'll go work in large companies but we'll also go work in a back room department of small to medium businesses, piloting AI on a bottom of the rung salary. Some folks will take on specialisms and gain certifications in difficult areas (similar to ACCA). Or maybe ultra competitive areas like how it is in actuarial science. Those few will eventually separate themselves and lead departments of software engineers (soon to be known as AI pilots). Others will embed in research and advance state of art that eventually is commoditized by AI. Those people will either be paid mega bucks or will be some poor academia based researcher.<p>The vast majority? Overworked drones having to be ready to stumble to their AI agent's interface when their boss calls them at 10 PM saying the directors want to see a feature setup for the meeting tomorrow.</p>
]]></description><pubDate>Mon, 23 Mar 2026 14:41:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47490218</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47490218</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47490218</guid></item><item><title><![CDATA[New comment by nstart in "It Took Me 30 Years to Solve This VFX Problem – Green Screen Problem [video]"]]></title><description><![CDATA[
<p>Good spot! That is the product working as intended though. The background doesn't exist except as an asset that replaces the green screen. The tool is meant to replace the green screen without the need for manual rotoscoping. Even in a traditional process, the distortion needs to be done by VFX as a separate process. To do that though, they still need the green screen keyed out and this tool does that.</p>
]]></description><pubDate>Wed, 18 Mar 2026 03:27:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47421313</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47421313</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47421313</guid></item><item><title><![CDATA[New comment by nstart in "Glassworm is back: A new wave of invisible Unicode attacks hits repositories"]]></title><description><![CDATA[
<p>Yup. That's correct. And I understand that. I was looking at the changes to yarn.lock that got reintroduced. I couldn't figure out what was happening. It turns out that not only was it force pushed, but GitHub also retains the old commit information even if it's been "deleted".<p>I still don't quite understand what GitHub is doing to allow someone to say that dependabot coauthored a spoofed commit. This isn't the commit message itself I'm talking about. It's the GitHub interface that officially recognizes this as a dependabot co authored commit. My hunch is that the malicious author squashed two commits, the original good commit to yarn.lock and a malicious change to package.json, and that somehow maintains the dependabot authorship instead of reassigning it fully to the squash-er.</p>
]]></description><pubDate>Tue, 17 Mar 2026 00:47:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47407180</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47407180</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47407180</guid></item><item><title><![CDATA[New comment by nstart in "Glassworm is back: A new wave of invisible Unicode attacks hits repositories"]]></title><description><![CDATA[
<p>I don't quite understand how this is working tbh. I looked at one of the affected repos, ironically named "reworm".<p>The malicious code was introduced in this commit - <a href="https://github.com/pedronauck/reworm/commit/d50cd8c8966893c6269153a3c093c801fd62ba16" rel="nofollow">https://github.com/pedronauck/reworm/commit/d50cd8c8966893c6...</a><p>It says coauthored by dependabot and refers to a PR opened in 2020 (<a href="https://github.com/pedronauck/reworm/pull/28" rel="nofollow">https://github.com/pedronauck/reworm/pull/28</a>).<p>That PR itself was merged in 2020 here - <a href="https://github.com/pedronauck/reworm/commit/df8c1803c519f599c3b61abd6613c0f98ab44fa4" rel="nofollow">https://github.com/pedronauck/reworm/commit/df8c1803c519f599...</a><p>But the commit with the worm (d50cd8c), re-introduces the same change from df8c180 to the file `yarn.lock`.<p>And when you look at the history of yarn.lock inside of github, all references to the original version bump (df8c180) are gone...? In fact if you look at the overall commit history, the clean df8c180 commit does not exist.<p>I'm struggling to understand what kind of shenanigans happened here exactly.</p>
]]></description><pubDate>Mon, 16 Mar 2026 03:38:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47394962</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47394962</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47394962</guid></item><item><title><![CDATA[New comment by nstart in "A GitHub Issue Title Compromised 4k Developer Machines"]]></title><description><![CDATA[
<p>Yea. It's a pretty lol-sob future when I think about it. I imagine the agent frameworks eventually getting trusted actors and RBAC like features. Users end up in "confirm this action permanently/temporarily" loops. But then someone gets their account compromised and it gets used to send messages to folks who trust them. Or even worse, the attacker silently adds themselves to a trusted list and quietly spends months exfiltrating data without being noticed.<p>We'll probably also have some sub agent inspecting what the main agent is doing and it'll be told to reach out to the owner if it spots suspicious exfiltration like behaviour. Until someone figures out how to poison that too.<p>The innovation factor of this tech while cool, drives me absolutely nuts with its non deterministic behaviour.</p>
]]></description><pubDate>Mon, 09 Mar 2026 05:06:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47305083</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47305083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47305083</guid></item><item><title><![CDATA[New comment by nstart in "A GitHub Issue Title Compromised 4k Developer Machines"]]></title><description><![CDATA[
<p>Every communication point (including whatsapp, telegram, etc) is turning into a potential RCE now. And because the agents want to behave in an end to end integrated manner, even sandboxes are less meaningful since data exfiltration is practically a feature at this point.<p>All those years of security training trying to get folks to double check senders, and to beware of what you share and what you click, and now we have to redo it for agents.</p>
]]></description><pubDate>Mon, 09 Mar 2026 04:53:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47304993</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47304993</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47304993</guid></item><item><title><![CDATA[New comment by nstart in "A GitHub Issue Title Compromised 4k Developer Machines"]]></title><description><![CDATA[
<p>That's really cool. Do you have any write-ups I can checkout? I'm still new to this area of offensive sec so would love to learn from folks who've been in the thick of it.</p>
]]></description><pubDate>Mon, 09 Mar 2026 04:46:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47304965</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47304965</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47304965</guid></item><item><title><![CDATA[New comment by nstart in "A GitHub Issue Title Compromised 4k Developer Machines"]]></title><description><![CDATA[
<p>This is how people intend to run open claw instances too. Some folks are trying to add automated bug report creation by pointing agents at a company's social media mentions.<p>I personally think it's crazy. I'm currently assisting in developing AI policies at work. As a proof of concept, I sent an email from a personal mail address whose content was a lot of angry words threatening contract cancellation and legal action if I did not adhere to compliance needs and  provide my current list of security tickets from my project management tool.<p>Claude which was instructed to act as my assistant dumped all the details without warning. Only by the grace of the MCP not having send functionality did the mail not go out.<p>All this Wild West yolo agent stuff is akin to the sql injection shenanigans of the past. A lot of people will have to get burnt before enough guard rails get built in to stop it</p>
]]></description><pubDate>Fri, 06 Mar 2026 09:25:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47272818</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47272818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47272818</guid></item><item><title><![CDATA[New comment by nstart in "How close are we to a vision for 2010?"]]></title><description><![CDATA[
<p>One piece that I find interesting is how hopeful people sounded about tech that had access to your data. Folks higher up in the tech world often complain about how the media complains about them too much. And while the media definitely has issues in how they report, it's easier to see how we got to this point where tech is vilified. You compare the hope of the past and match it to the exploitation of the present, and you can't help but feel sometimes that in a game of picking straws, the current timeline picked dystopian over utopian.</p>
]]></description><pubDate>Mon, 23 Feb 2026 11:43:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47121017</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=47121017</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47121017</guid></item><item><title><![CDATA[New comment by nstart in "Learning from context is harder than we thought"]]></title><description><![CDATA[
<p>Is this correct? My assumption is that all the data collected during usage is part of the RLHF loop of LLM providers. Assumption is based on information from books like empire of ai which specifically mention intent of AI providers to train/tune their models further based on usage feedback (eg: whenever I say the model is wrong in its response, thats a human feedback which gets fed back into improving the model).</p>
]]></description><pubDate>Sat, 07 Feb 2026 08:54:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46922392</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46922392</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46922392</guid></item><item><title><![CDATA[New comment by nstart in "In praise of –dry-run"]]></title><description><![CDATA[
<p>Design patterns are one of those things where you have to go through the full cycle to really use it effectively. It goes through the stages:<p>no patterns. -> Everything must follow the gang of four's patterns!!!! -> omg I can't read code anymore I'm just looking at factories. No more patterns!!! -> Patterns are useful as a response to very specific contexts.<p>I remember being religious about strategy patterns on an app I developed once where I kept the db layer separated from the code so that I could do data management as a strategy. Theoretically this would mean that if I ever switched DBs it would be effortless to create a new strategy and swap it out using a config. I could even do tests using in memory structures instead of DBs which made TDD ultra fast.<p>DB switchover never happened and the effort I put into maintaining the pattern was more than the effort it would have taken me to swap a db out later :,) .</p>
]]></description><pubDate>Sun, 01 Feb 2026 02:46:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=46843156</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46843156</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46843156</guid></item><item><title><![CDATA[New comment by nstart in "To those who fired or didn't hire tech writers because of AI"]]></title><description><![CDATA[
<p>Yea. I think people underestimate this. Yesterday I was writing an obsidian plugin using the latest and most powerful Gemini model and I wanted it to make use of the new keychain in Obsidian to retrieve values for my plugin. Despite reading the docs first upon my request it still used a non existent method (retrieveSecret) to get the individual secret value. When it ran into an error, instead of checking its assumptions it assumed that the method wasnt defined in the interface so it wrote an obsidian.shim.ts file that defined a retrieveSecret interface. The plug-in compiled but obviously failed because no implementation of that method exists. When it understood it was supposed to used getSecret instead it ended up updating the shim instead of getting rid of it entirely. Add that up over 1000s of sessions/changes (like the one cursor has shared on letting the agent run until it generated 3M LOC for a browser) and it's likely that code based will be polluted with tiny papercuts stemming from LLM hallucinations</p>
]]></description><pubDate>Thu, 15 Jan 2026 12:03:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46631302</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46631302</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46631302</guid></item><item><title><![CDATA[New comment by nstart in "2025: The Year in LLMs"]]></title><description><![CDATA[
<p>The problem with X is that so many people who have no verifiable expertise are super loud in shouting "$INDUSTRY is cooked!!" every time a new model releases. It's exhausting and untrue. The kind of video generation we see might nail realism but if you want to use it to create something meaningful which involves solving a ton of problems and making difficult choices in order to express an idea, you run into the walls of easy work pretty quickly. It's insulting then for professionals to see manga PFPs on X put some slop together and say "movie industry is cooked!". It betrays a lack of understanding of what it takes to make something good and it gives off a vibe of "the loud ones are just trying to force this objectively meh-by-default thing to happen".<p>The other day there was that dude loudly arguing about some code they wrote/converted even after a woman with significant expertise in the topic pointed out their errors.<p>Gen AI has its promise. But when you look at the lack of ethics from the industry, the cacophony of voices of non experts screaming "this time it's really doom", and the weariness/wariness that set in during the crypto cycle, it's a natural tendency that people are going to call snake oil.<p>That said, I think the more accurate representation here is that HN as a whole is calling the hype snake oil. There's very little question anymore about the tools being capable of advanced things. But there is annoyance at proclamations of it being beyond what it really is at the moment which is that it's still at the stage of being an expertise+motivation multiplier for deterministic areas of work. It's not replacing that facet any time soon on its current trend (which could change wildly in 2026). Not until it starts training itself I think. Could be famous last words</p>
]]></description><pubDate>Thu, 01 Jan 2026 05:19:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=46451517</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46451517</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46451517</guid></item><item><title><![CDATA[New comment by nstart in "Pricing Changes for GitHub Actions"]]></title><description><![CDATA[
<p>I initially felt a bit offended when I saw this. Then I thought about it and at the end of the day there's a decent amount of infrastructure that goes into displaying the build information, updating it, scanning for secrets and redacting, etc.<p>I don't know if it's worth the amount they are targeting, but it's definitely not zero either.</p>
]]></description><pubDate>Tue, 16 Dec 2025 17:34:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=46291446</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46291446</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46291446</guid></item><item><title><![CDATA[New comment by nstart in "SoundCloud confirms breach after member data stolen, VPN access disrupted"]]></title><description><![CDATA[
<p>Curious... Why does VPN access disruption suggest the breach may be deeper than initially disclosed?<p>My understanding is that this prevents anonymous access to servers which would help during investigation if any further unauthorized access showed up. But it doesn't confirm that unauthorized access continued. Just curious how you are thinking about this though.</p>
]]></description><pubDate>Tue, 16 Dec 2025 07:09:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46285667</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46285667</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46285667</guid></item><item><title><![CDATA[New comment by nstart in "Advent of Sysadmin 2025"]]></title><description><![CDATA[
<p>Time pressures during christmas/holidays mean that the original calendars were becoming too stressful to handle. Seen several calendars switching to 12 consecutive days or 1 every 2 days challenges.</p>
]]></description><pubDate>Mon, 01 Dec 2025 08:07:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46104759</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46104759</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46104759</guid></item><item><title><![CDATA[New comment by nstart in "Okta's NextJS-0auth troubles"]]></title><description><![CDATA[
<p>Yea. I can see what the parent is getting at. However the linked PR's contain the employee name. Their username is the same name mentioned in the article. So it would have been the same even if the author had just mentioned the username instead (which would be completely acceptable in all cases). I think junior employee or not, it's clear that they have the autonomy to check a PR for errors and fix it. So it's very much on them.</p>
]]></description><pubDate>Fri, 21 Nov 2025 01:11:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46000078</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=46000078</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46000078</guid></item><item><title><![CDATA[New comment by nstart in "Open-source Zig book"]]></title><description><![CDATA[
<p>Welp. I wish I had read the comments first to discover that this is AI generated. On the other hand, I got to experience the content without bias.<p>I opted to give it a try instead of reading the comments and the book was arranged in a super strange way where it's discussing concepts that a majority of programmers would never be concerned with when starting out with learning a language. It's very different to learn about some of these concepts if you are reading a language doc in order to work on the language itself. But if you want to learn how to use the language, something like:<p><pre><code>  > Choose between std.debug.print, unbuffered writers, and buffered stdout depending on the output channel and performance needs.
</code></pre>
is absolutely never going to be something you dump into chapter 1. I skimmed through a few chapters from there and it's blocks of stuff thrown in randomly. The introduction to the if conditional throws in Zig Intermediate Representation with absolutely no explanation of what it is and why it's even being discussed.<p>Came here to comment that this has been written pretty poorly or just targets a very niche audience and now I discover it's slop. What a waste of time. The one thing AI was supposed to save.</p>
]]></description><pubDate>Mon, 17 Nov 2025 12:43:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=45953083</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=45953083</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45953083</guid></item><item><title><![CDATA[New comment by nstart in "Gemini CLI GitHub Actions"]]></title><description><![CDATA[
<p>Also, if you are on Google Workspace, then everything changes there too. Activating the Gemini CLI is a smile while crying emoji kind of activity if you are trying to provide this to an entire organization [1]<p>[1]: <a href="https://github.com/google-gemini/gemini-cli/blob/main/docs/cli/authentication.md" rel="nofollow">https://github.com/google-gemini/gemini-cli/blob/main/docs/c...</a></p>
]]></description><pubDate>Thu, 07 Aug 2025 13:54:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=44824498</link><dc:creator>nstart</dc:creator><comments>https://news.ycombinator.com/item?id=44824498</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44824498</guid></item></channel></rss>