<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ramimac</title><link>https://news.ycombinator.com/user?id=ramimac</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 24 May 2026 22:33:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ramimac" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[A Guide to Keyboard Customization]]></title><description><![CDATA[
<p>Article URL: <a href="https://aresluna.org/key-in-sight/">https://aresluna.org/key-in-sight/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=48212706">https://news.ycombinator.com/item?id=48212706</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 20 May 2026 19:21:39 +0000</pubDate><link>https://aresluna.org/key-in-sight/</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=48212706</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48212706</guid></item><item><title><![CDATA[New comment by ramimac in "We reproduced Anthropic's Mythos findings with public models"]]></title><description><![CDATA[
<p>Carlini's unprompted talk is one source: <a href="https://www.youtube.com/watch?t=204&v=1sd26pWhfmg" rel="nofollow">https://www.youtube.com/watch?t=204&v=1sd26pWhfmg</a></p>
]]></description><pubDate>Fri, 17 Apr 2026 14:58:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47806663</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47806663</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47806663</guid></item><item><title><![CDATA[If [static analysis] could have, why didn't it?]]></title><description><![CDATA[
<p>Article URL: <a href="https://alexgaynor.net/2026/apr/13/why-didnt-it/">https://alexgaynor.net/2026/apr/13/why-didnt-it/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47762417">https://news.ycombinator.com/item?id=47762417</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 14 Apr 2026 07:28:51 +0000</pubDate><link>https://alexgaynor.net/2026/apr/13/why-didnt-it/</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47762417</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47762417</guid></item><item><title><![CDATA[Brocards for Vulnerability Triage]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.yossarian.net/2026/04/11/Brocards-for-vulnerability-triage">https://blog.yossarian.net/2026/04/11/Brocards-for-vulnerability-triage</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47738099">https://news.ycombinator.com/item?id=47738099</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sun, 12 Apr 2026 10:30:14 +0000</pubDate><link>https://blog.yossarian.net/2026/04/11/Brocards-for-vulnerability-triage</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47738099</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47738099</guid></item><item><title><![CDATA[New comment by ramimac in "Telnyx package compromised on PyPI"]]></title><description><![CDATA[
<p>We haven't blogged this yet, but a variety of teams found this in parallel.<p>The packages are quarantined by PyPi<p>Follow the overall incident: <a href="https://ramimac.me/teampcp/#phase-10" rel="nofollow">https://ramimac.me/teampcp/#phase-10</a><p>Aikido/Charlie with a very quick blog: <a href="https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm" rel="nofollow">https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-...</a><p>ReversingLabs, JFrog also made parallel reports</p>
]]></description><pubDate>Fri, 27 Mar 2026 08:59:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47540400</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47540400</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47540400</guid></item><item><title><![CDATA[Telnyx package compromised on PyPI]]></title><description><![CDATA[
<p><a href="https://github.com/team-telnyx/telnyx-python/issues/235" rel="nofollow">https://github.com/team-telnyx/telnyx-python/issues/235</a><p><a href="https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-canisterworm" rel="nofollow">https://www.aikido.dev/blog/telnyx-pypi-compromised-teampcp-...</a></p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47540388">https://news.ycombinator.com/item?id=47540388</a></p>
<p>Points: 133</p>
<p># Comments: 135</p>
]]></description><pubDate>Fri, 27 Mar 2026 08:57:02 +0000</pubDate><link>https://telnyx.com/resources/telnyx-python-sdk-supply-chain-security-notice-march-2026</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47540388</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47540388</guid></item><item><title><![CDATA[New comment by ramimac in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>It's a spam flood by the attacker to complicate information sharing[1]. They did the same thing in the Trivy discussion, with many of the same accounts.[2]<p>[1] <a href="https://ramimac.me/teampcp/#spam-flood-litellm" rel="nofollow">https://ramimac.me/teampcp/#spam-flood-litellm</a>  
[2] <a href="https://ramimac.me/teampcp/#discussion-flooded" rel="nofollow">https://ramimac.me/teampcp/#discussion-flooded</a></p>
]]></description><pubDate>Wed, 25 Mar 2026 09:22:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47515089</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47515089</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47515089</guid></item><item><title><![CDATA[New comment by ramimac in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>Blood, sweat, and tears.<p>The investment compounds! I have enough context to quickly vet incoming information, then it's trivial to update a static site with a new blurb</p>
]]></description><pubDate>Tue, 24 Mar 2026 18:42:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=47507281</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47507281</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47507281</guid></item><item><title><![CDATA[New comment by ramimac in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>This is tied to the TeamPCP activity over the last few weeks. I've been responding, and keeping an up to date timeline. I hope it might help folks catch up and contextualize this incident:<p><a href="https://ramimac.me/trivy-teampcp/#phase-09" rel="nofollow">https://ramimac.me/trivy-teampcp/#phase-09</a></p>
]]></description><pubDate>Tue, 24 Mar 2026 13:36:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47502402</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47502402</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47502402</guid></item><item><title><![CDATA[New comment by ramimac in "Scaling Vulnerability Management with AI: What Worked"]]></title><description><![CDATA[
<p>> Upon issue creation another workflow spins up three independent coding agents to analyze the finding.<p>I'm curious<p>1) what the current statistics are for consensus<p>2) how the agents may/may not perform independently<p>3) what the agent profiles are and how they differ (model, harness, prompt/persona, all three?)</p>
]]></description><pubDate>Thu, 19 Mar 2026 13:34:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=47439177</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47439177</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47439177</guid></item><item><title><![CDATA[It's Their Mona Lisa]]></title><description><![CDATA[
<p>Article URL: <a href="https://ironicsans.ghost.io/its-t-mona-lisa/">https://ironicsans.ghost.io/its-t-mona-lisa/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47425186">https://news.ycombinator.com/item?id=47425186</a></p>
<p>Points: 75</p>
<p># Comments: 17</p>
]]></description><pubDate>Wed, 18 Mar 2026 12:53:15 +0000</pubDate><link>https://ironicsans.ghost.io/its-t-mona-lisa/</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47425186</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47425186</guid></item><item><title><![CDATA[Child's Play: Tech's new generation and the end of thinking]]></title><description><![CDATA[
<p>Article URL: <a href="https://harpers.org/archive/2026/03/childs-play-sam-kriss-ai-startup-roy-lee/">https://harpers.org/archive/2026/03/childs-play-sam-kriss-ai-startup-roy-lee/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47088685">https://news.ycombinator.com/item?id=47088685</a></p>
<p>Points: 451</p>
<p># Comments: 265</p>
]]></description><pubDate>Fri, 20 Feb 2026 14:48:34 +0000</pubDate><link>https://harpers.org/archive/2026/03/childs-play-sam-kriss-ai-startup-roy-lee/</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=47088685</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47088685</guid></item><item><title><![CDATA[Building Multi-Agent Systems (Part 3)]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.sshh.io/p/building-multi-agent-systems-part-c0c#footnote-anchor-2-184887421">https://blog.sshh.io/p/building-multi-agent-systems-part-c0c#footnote-anchor-2-184887421</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46680526">https://news.ycombinator.com/item?id=46680526</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 19 Jan 2026 16:06:19 +0000</pubDate><link>https://blog.sshh.io/p/building-multi-agent-systems-part-c0c#footnote-anchor-2-184887421</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=46680526</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46680526</guid></item><item><title><![CDATA[New comment by ramimac in "Shai-Hulud compromised a dev machine and raided GitHub org access: a post-mortem"]]></title><description><![CDATA[
<p>Reach out if you'd like me to check - I did the same for the trigger.dev team in fact[1].<p>(personal site linked in bio, who links you onward to my linkedin)<p>[1] <a href="https://x.com/ramimacisabird/status/1994598075520749640?s=20" rel="nofollow">https://x.com/ramimacisabird/status/1994598075520749640?s=20</a></p>
]]></description><pubDate>Sun, 14 Dec 2025 21:17:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=46267017</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=46267017</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46267017</guid></item><item><title><![CDATA[Okta's NextJS-0auth troubles]]></title><description><![CDATA[
<p>Article URL: <a href="https://joshua.hu/ai-slop-okta-nextjs-0auth-security-vulnerability">https://joshua.hu/ai-slop-okta-nextjs-0auth-security-vulnerability</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45963350">https://news.ycombinator.com/item?id=45963350</a></p>
<p>Points: 372</p>
<p># Comments: 152</p>
]]></description><pubDate>Tue, 18 Nov 2025 10:17:20 +0000</pubDate><link>https://joshua.hu/ai-slop-okta-nextjs-0auth-security-vulnerability</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=45963350</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45963350</guid></item><item><title><![CDATA[New comment by ramimac in "Replicate is joining Cloudflare"]]></title><description><![CDATA[
<p>Probably, but you can check out a more robust list here: <a href="https://blog.cloudflare.com/tag/acquisitions/" rel="nofollow">https://blog.cloudflare.com/tag/acquisitions/</a><p>* BastionZero<p>* Kivera<p>* Baselime<p>* PartyKit<p>* Area 1<p>* Vectrix<p>* Zaraz<p>* Linc<p>* S2 Systems Corporation<p>* Neumob<p>* Eager<p>* CryptoSeal<p>* StopTheHacker</p>
]]></description><pubDate>Mon, 17 Nov 2025 16:13:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=45954929</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=45954929</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45954929</guid></item><item><title><![CDATA[New comment by ramimac in "AWS Secret-West Region is now available"]]></title><description><![CDATA[
<p>Always a funny title, see previously: Announcing the New AWS Secret Region (2017) [1]<p>[1] <a href="https://news.ycombinator.com/item?id=15741108">https://news.ycombinator.com/item?id=15741108</a></p>
]]></description><pubDate>Thu, 23 Oct 2025 16:12:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=45683577</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=45683577</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45683577</guid></item><item><title><![CDATA[Visibility at scale: How Figma detects sensitive data exposure]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.figma.com/blog/visibility-at-scale-how-figma-detects-sensitive-data-exposure/">https://www.figma.com/blog/visibility-at-scale-how-figma-detects-sensitive-data-exposure/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45683560">https://news.ycombinator.com/item?id=45683560</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 23 Oct 2025 16:11:13 +0000</pubDate><link>https://www.figma.com/blog/visibility-at-scale-how-figma-detects-sensitive-data-exposure/</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=45683560</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45683560</guid></item><item><title><![CDATA[If Managers Were Angels]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.bonnycode.com/posts/if-managers-were-angels/">https://www.bonnycode.com/posts/if-managers-were-angels/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45675318">https://news.ycombinator.com/item?id=45675318</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 22 Oct 2025 21:22:35 +0000</pubDate><link>https://www.bonnycode.com/posts/if-managers-were-angels/</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=45675318</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45675318</guid></item><item><title><![CDATA[Dismantling a Critical Supply Chain Risk in VSCode Extension Marketplaces]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.wiz.io/blog/supply-chain-risk-in-vscode-extension-marketplaces">https://www.wiz.io/blog/supply-chain-risk-in-vscode-extension-marketplaces</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45594056">https://news.ycombinator.com/item?id=45594056</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 15 Oct 2025 15:27:19 +0000</pubDate><link>https://www.wiz.io/blog/supply-chain-risk-in-vscode-extension-marketplaces</link><dc:creator>ramimac</dc:creator><comments>https://news.ycombinator.com/item?id=45594056</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45594056</guid></item></channel></rss>