<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: stanguc</title><link>https://news.ycombinator.com/user?id=stanguc</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 11:53:44 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=stanguc" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[Show HN: MyPDFBoy – Free PDF redaction that deletes the data]]></title><description><![CDATA[
<p>Most free PDF "redaction" tools just draw a black box on top. The text is still there -- select all, paste, done. MyPDFBoy actually removes content from the PDF content stream. What's gone is gone.<p>Upload a PDF, draw rectangles over what you want removed, download. Free, no account, 5 languages including Arabic RTL.<p><a href="https://mypdfboy.com" rel="nofollow">https://mypdfboy.com</a><p>Built with React + FastAPI + PyMuPDF. Would love feedback on the UX.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47639470">https://news.ycombinator.com/item?id=47639470</a></p>
<p>Points: 3</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 04 Apr 2026 14:42:04 +0000</pubDate><link>https://mypdfboy.com/</link><dc:creator>stanguc</dc:creator><comments>https://news.ycombinator.com/item?id=47639470</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47639470</guid></item><item><title><![CDATA[New comment by stanguc in "Anthropic officially bans using subscription auth for third party use"]]></title><description><![CDATA[
<p>easily "bypassable", trust me :)</p>
]]></description><pubDate>Thu, 19 Feb 2026 04:35:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47069966</link><dc:creator>stanguc</dc:creator><comments>https://news.ycombinator.com/item?id=47069966</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47069966</guid></item><item><title><![CDATA[New comment by stanguc in "[dead]"]]></title><description><![CDATA[
<p><p><pre><code>  I scanned all 58 official AWS Terraform modules. Here's what I found.

  terraform-aws-modules is the gold standard. 30k+ GitHub stars on the VPC module alone. Used by thousands of teams in production.

  I pointed MonPhare at the entire org:

    monphare scan --github terraform-aws-modules

    45 seconds later: 58 repos scanned, 2,315 files parsed, 3 errors, 692 warnings.


  Even the best-maintained modules in the ecosystem have constraint hygiene gaps -- missing pins, no upper bounds, unbounded providers that welcome breaking changes on any terraform init.

  Now imagine your own infrastructure. Dozens of repos, hundreds of modules, multiple teams pushing changes. Who's checking that a provider upgrade won't break prod on Monday morning?

  That's what MonPhare does.

  One command to audit version constraints across your entire Terraform/OpenTofu state:

  - Scan a local directory, a remote repo, or an entire GitHub/GitLab/Azure DevOps/Bitbucket org
  - Detect missing constraints, unbounded versions, wildcard pins, deprecated modules, and cross-repo conflicts
  - Generate dependency graphs in DOT, Mermaid, or JSON -- see exactly what depends on what
  - Output as formatted CLI tables, machine-readable JSON, or self-contained HTML reports
  - Drop --strict into your CI pipeline -- warnings become blocking errors, nothing slips through
  - Define policies in monphare.yaml -- deprecation lists, required upper bounds, exclusion patterns -- and enforce them across every
  repo

  Written in Rust. Parallel scanning. Shallow clones with local caching. An entire GitHub org in under a minute.

  Open source: https://github.com/tanguc/monphare</code></pre></p>
]]></description><pubDate>Fri, 06 Feb 2026 20:11:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46917548</link><dc:creator>stanguc</dc:creator><comments>https://news.ycombinator.com/item?id=46917548</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46917548</guid></item><item><title><![CDATA[Show HN: Git as Your Secrets-Store]]></title><description><![CDATA[
<p>encrypts your secrets and commits them to git.<p>"npm install" your secrets like any other dependency.<p>Vaults = source of truth
Git = distribution layer
OneSeal: make the bridge between them</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45547710">https://news.ycombinator.com/item?id=45547710</a></p>
<p>Points: 2</p>
<p># Comments: 1</p>
]]></description><pubDate>Sat, 11 Oct 2025 09:14:24 +0000</pubDate><link>https://github.com/oneseal-io/oneseal</link><dc:creator>stanguc</dc:creator><comments>https://news.ycombinator.com/item?id=45547710</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45547710</guid></item><item><title><![CDATA[What's your workflow to pass cloud secrets/config metadata to apps safely?]]></title><description><![CDATA[
<p>I’ve been doing DevOps for about 9 years, and I keep seeing the same mess repeat itself:<p>- Terraform or Pulumi outputs → Vault/KMS → CI replaces values in YAML → K8s secrets operator injects env vars → app starts → DATABASE_PASSWORD typo, chaos ensues.<p>- Copy-pasted creds from Slack or Teams.<p>- Secrets/configs left in plaintext files or repos.<p>- Password managers with outdated entries that no one really trusts.<p>As a developer, what frustrates me most is the lack of predictability.
Between Terraform, Vaults, pipelines, and operators, it’s often unclear who “owns” the truth — and every layer can quietly introduce drift.<p>So I’m curious:<p>- How are you handling that handoff today?
- Are you still pushing everything through Vault + env vars, or have you built something cleaner?
- What has actually worked for you in production — and what’s bitten you later?<p>Would love to hear some real war stories or simple patterns that actually hold up over time.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45535571">https://news.ycombinator.com/item?id=45535571</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 10 Oct 2025 05:21:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=45535571</link><dc:creator>stanguc</dc:creator><comments>https://news.ycombinator.com/item?id=45535571</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45535571</guid></item><item><title><![CDATA[Show HN: Oneseal – Secrets, configs, and platform outputs as code]]></title><description><![CDATA[
<p>I kept hitting the same problem: teams pass secrets/configs/IDs via .env files, Slack, or CI glue; Terraform (or Pulumi) knows the truth, but apps don’t. Things drift.<p>I built Oneseal: a small CLI that turns platform outputs (Terraform state, etc.) into a typed, versioned SDK you can install and import. The goal is to make consumption predictable and diffable, not to replace your vault.<p>What it does
- Reads outputs (secrets, URLs, flags, IDs, connection strings)<p>- Generates a package (TypeScript today) with types + multi-env selection<p>- Deterministic artifacts, safe to commit or publish to your internal registry.<p>If this solves your env-drift pain, tell me where it breaks in your stack !</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=45532859">https://news.ycombinator.com/item?id=45532859</a></p>
<p>Points: 4</p>
<p># Comments: 0</p>
]]></description><pubDate>Thu, 09 Oct 2025 20:43:29 +0000</pubDate><link>https://github.com/oneseal-io/oneseal</link><dc:creator>stanguc</dc:creator><comments>https://news.ycombinator.com/item?id=45532859</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45532859</guid></item></channel></rss>