<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: securesaml</title><link>https://news.ycombinator.com/user?id=securesaml</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 17:35:42 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=securesaml" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by securesaml in "GitHub RCE Vulnerability: CVE-2026-3854 Breakdown"]]></title><description><![CDATA[
<p>Github enterprise cloud is on github.com and with more features:
<a href="http://github.com/account/enterprises/new" rel="nofollow">http://github.com/account/enterprises/new</a><p>They don't host github enterprise server for you (though gitlab has something called gitlab dedicated which they host gitlab ee for you).</p>
]]></description><pubDate>Tue, 28 Apr 2026 21:19:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47940951</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=47940951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47940951</guid></item><item><title><![CDATA[New comment by securesaml in "Claude Cowork exfiltrates files"]]></title><description><![CDATA[
<p>there's still some risk of publishing an attacker's key. For example, what if the attacker's key had access to sensitive user data?</p>
]]></description><pubDate>Thu, 15 Jan 2026 02:41:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46627367</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46627367</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46627367</guid></item><item><title><![CDATA[New comment by securesaml in "Claude Cowork exfiltrates files"]]></title><description><![CDATA[
<p>it is less of a problem for revoking attacker's keys (but maybe it has access to victim's contents?).<p>agreed it shouldn't be used to revoke non-malicious/your own keys</p>
]]></description><pubDate>Thu, 15 Jan 2026 00:06:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=46625950</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46625950</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46625950</guid></item><item><title><![CDATA[New comment by securesaml in "Claude Cowork exfiltrates files"]]></title><description><![CDATA[
<p>I wouldn’t recommend this. What if GitHub’s token scanning service went down. Ideally GitHub should expose an universal token revocation endpoint.
Alternatively do this in a private repo and enable token revocation (if it exists)</p>
]]></description><pubDate>Wed, 14 Jan 2026 22:26:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=46624660</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46624660</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46624660</guid></item><item><title><![CDATA[New comment by securesaml in "GitHub should charge everyone $1 more per month to fund open source"]]></title><description><![CDATA[
<p>I'm not too sure about the root cause about tj-actions. IIRC there are some libraries that compromised by actions injections vulnerabilities, where a security specialist could have helped.</p>
]]></description><pubDate>Wed, 14 Jan 2026 20:02:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46622141</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46622141</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46622141</guid></item><item><title><![CDATA[New comment by securesaml in "GitHub should charge everyone $1 more per month to fund open source"]]></title><description><![CDATA[
<p>I have seen small utility libraries like tj-actions get compromised because there aren't any security specialists looking at the library.<p>My main concern is supply chain compromise.</p>
]]></description><pubDate>Wed, 14 Jan 2026 19:28:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46621455</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46621455</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46621455</guid></item><item><title><![CDATA[New comment by securesaml in "GitHub should charge everyone $1 more per month to fund open source"]]></title><description><![CDATA[
<p>The problem is lots of open source is unmaintained/insecure, and there aren't any security engineers on those open source libraries.<p>For the library to be secure, there needs to be funding, not by magic and expecting maintainers will do stuff on there free will.</p>
]]></description><pubDate>Wed, 14 Jan 2026 18:13:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46619875</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46619875</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46619875</guid></item><item><title><![CDATA[New comment by securesaml in "GitHub should charge everyone $1 more per month to fund open source"]]></title><description><![CDATA[
<p>Correct, maintainers can say that and get shamed.<p>And it leads to unmaintained libraries, since companies don't want to pay.<p>At some point, is open sourcing your work a liability?</p>
]]></description><pubDate>Wed, 14 Jan 2026 18:04:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46619699</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46619699</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46619699</guid></item><item><title><![CDATA[New comment by securesaml in "GitHub should charge everyone $1 more per month to fund open source"]]></title><description><![CDATA[
<p>The problem is more so maintenance.<p>The expectation of FOSS is that the users and maintainer work together to resolve bug fixes/features/security issues.<p>However many companies will dump these issues to the maintainer and take it for granted when they are resolved.<p>It's not a sustainable model, and will lead to burnout/unmaintained libraries.<p>If the companies don't have the engineering resources/specialization to complete bug fixes/features, they should sponsor the maintainers.</p>
]]></description><pubDate>Wed, 14 Jan 2026 17:12:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=46618785</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=46618785</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46618785</guid></item><item><title><![CDATA[New comment by securesaml in "PSA: Libxslt is unmaintained and has 5 unpatched security bugs"]]></title><description><![CDATA[
<p>Google has a program where you can submit patches to OSS projects (including 
libxslt)
<a href="https://bughunters.google.com/about/rules/open-source/4928084514701312/patch-rewards-program-rules" rel="nofollow">https://bughunters.google.com/about/rules/open-source/492808...</a><p>The patches need to fix a systemtic design flaw (which seems like you are trying to do).<p>You are eligible even if you are a contributor:<p>> Q: I'm a core developer working on one of the in-scope projects. Do my own patches qualify?<p>> A: They most certainly do.<p>Additionally, github has: <a href="https://resources.github.com/github-secure-open-source-fund/" rel="nofollow">https://resources.github.com/github-secure-open-source-fund/</a><p>Companies have changed after seeing the log4j incident and are open to funding open source security (but we still need more)</p>
]]></description><pubDate>Fri, 29 Aug 2025 17:03:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=45066640</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=45066640</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45066640</guid></item><item><title><![CDATA[New comment by securesaml in "Funding Open Source like public infrastructure"]]></title><description><![CDATA[
<p>I agree MSFT should have paid way more.<p>My point is if that FFmpeg, tried to raise more awareness of the issue, say talk to news outlets, they could get much more funding from MSFT.<p>Furthermore, big companies like Google, Microsoft care a lot about security. So they could raise money for security engineering like fixing memory corruption issues.
Of course, FFmpeg could complain Google, Microsft doesn't care about all the 
high severity vulnerabilities in FFmpeg. 
That would be much more of an eye catcher.</p>
]]></description><pubDate>Thu, 14 Aug 2025 13:06:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=44899918</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44899918</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44899918</guid></item><item><title><![CDATA[New comment by securesaml in "Funding Open Source like public infrastructure"]]></title><description><![CDATA[
<p>It's usually the more user-facing products that can thrive on this freemium model (probably full web apps or a lot of code).  For example, laravel might get a lot of funding from this.<p>However, the underlying infrastructure libraries, will not get any funding from this, even though they have much more users. For example, libxml2, xzutils, http parser ...<p>You can't build any product off of an infrastructure library, purchasing support doesn't make sense, and there are little bonus features to be made.<p>One way to remedy this, is to have well funded open source projects take ownership of its dependencies.</p>
]]></description><pubDate>Thu, 14 Aug 2025 12:59:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=44899865</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44899865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44899865</guid></item><item><title><![CDATA[New comment by securesaml in "Funding Open Source like public infrastructure"]]></title><description><![CDATA[
<p><a href="https://news.ycombinator.com/item?id=39912916">https://news.ycombinator.com/item?id=39912916</a> 
they did get some funding after asking.</p>
]]></description><pubDate>Thu, 14 Aug 2025 12:42:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=44899720</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44899720</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44899720</guid></item><item><title><![CDATA[New comment by securesaml in "Funding Open Source like public infrastructure"]]></title><description><![CDATA[
<p>> Companies say "This my code when I need it, and it's your code when it breaks", and developers read the fine print very late, because they thought exposure is valuable.<p>I think that this is an accurate description of working relationship. But, the fine print (MIT license) explicitly says that the companies are responsible:<p>> THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  IMPLIED</p>
]]></description><pubDate>Thu, 14 Aug 2025 11:29:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=44899170</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44899170</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44899170</guid></item><item><title><![CDATA[New comment by securesaml in "Funding Open Source like public infrastructure"]]></title><description><![CDATA[
<p>I agree that open source infrastructure needs to be funded. I think first there needs to be a mindset shift in who's responsible for open source.<p>Currently when new vulnerabilities pop up (i.e. xz-utils compromise, log4j shell), people are quick to blame the maintainers for it. Why shouldn't companies instead be responsible for these vulnerabilities?<p>Currently, companies treat open source code as someone else's, so they don't bother to audit, maintain it, or fund it.
Clearly, this is wrong, and reflected in the oss license, which states that code is solely consumer's responsibility.</p>
]]></description><pubDate>Thu, 14 Aug 2025 09:36:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=44898519</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44898519</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44898519</guid></item><item><title><![CDATA[New comment by securesaml in "Funding Open Source like public infrastructure"]]></title><description><![CDATA[
<p>sure. But companies believe that open source developers owe everything to the them (i.e. fixing bugs, contributing to feature requests, critical security releases ...).</p>
]]></description><pubDate>Thu, 14 Aug 2025 09:23:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=44898450</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44898450</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44898450</guid></item><item><title><![CDATA[New comment by securesaml in "Abusing Entra OAuth for fun and access to internal Microsoft applications"]]></title><description><![CDATA[
<p>For me, I don't think that the application is public exposed is really the problem (i.e. not in intranet).<p>I think the real problem is that these applications (Entra ID) are multi-tenant, rather than a dedicated single-tenant instance.<p>Here, we have critical identity information that is being stored and shared in the same database with other tenants (malicious attackers). This makes multi-tenancy violations common.
Even if Entra ID had a robust mechanism to perform tenancy checks i.e. object belongs to some tenant, there are still vulnerabilities.
For example, as you saw in the blog post, multi-tenant requests (requests that span >= 2 tenants), are fundamentally difficult to authorize. A single mistake, can lead to complete compromise.<p>Compare this to a single tenant app. First, the attacker would need to be authenticated as an user within your tenant. This makes pre-auth attacks more difficult.</p>
]]></description><pubDate>Sun, 10 Aug 2025 16:50:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=44856425</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44856425</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44856425</guid></item><item><title><![CDATA[New comment by securesaml in "SAML Shield: Drop-in protection that works for any stack"]]></title><description><![CDATA[
<p>I am working on an SAML Attacker (that basically tests web apps against all known SAML exploits). It includes all the test cases.<p>I can share you the repository if you want to integrate it in RubySAML (or any other library). Email me [alex]@[securesaml.com] (without the [ ])</p>
]]></description><pubDate>Tue, 05 Aug 2025 20:25:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=44803782</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44803782</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44803782</guid></item><item><title><![CDATA[New comment by securesaml in "Unexpected security footguns in Go's parsers"]]></title><description><![CDATA[
<p>Issue is not with go's parser, but instead about processing layer using different input than verifying layer [1]<p>We patched the gosaml2 (and other go saml libraries), by ensuring only the authenticated bytes are processed (not the original XML document). You can see the patches here: <a href="https://github.com/russellhaering/goxmldsig/commit/e1c8a5b89d1d03089aa1a0ec546b33aaf80ee02f">https://github.com/russellhaering/goxmldsig/commit/e1c8a5b89...</a>
<a href="https://github.com/russellhaering/gosaml2/commit/9957448932742ee3995e2f35f4e39431a5505c5e">https://github.com/russellhaering/gosaml2/commit/99574489327...</a><p>> I just wrote my own for my SAML.<p>Curious to see your implementation for SAML and XML Signatures.<p>[1]: <a href="https://bsky.app/profile/filippo.abyssdomain.expert/post/3lezjsf6wc2os" rel="nofollow">https://bsky.app/profile/filippo.abyssdomain.expert/post/3le...</a></p>
]]></description><pubDate>Sat, 21 Jun 2025 18:04:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=44339461</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44339461</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44339461</guid></item><item><title><![CDATA[New comment by securesaml in "Unexpected security footguns in Go's parsers"]]></title><description><![CDATA[
<p>The correct conclusion is: <a href="https://news.ycombinator.com/item?id=44337330">https://news.ycombinator.com/item?id=44337330</a><p>The problem of trying to ensure that each parser behaves the same for all input is twofold:
- JSON and XML specifications are complex, lots of quirks. So not feasible. 
- Does not solve the fundamental issue of the processing layer not using the same data that is verified in the verification layer.<p>Note: the processing layer parses the original input bytes, while the verification layer verifies a struct that is parsed using another parser.<p>Processed: Proc(input)
Verified: VerifyingParser(input)</p>
]]></description><pubDate>Sat, 21 Jun 2025 15:31:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=44338326</link><dc:creator>securesaml</dc:creator><comments>https://news.ycombinator.com/item?id=44338326</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44338326</guid></item></channel></rss>