<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: vin10</title><link>https://news.ycombinator.com/user?id=vin10</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 13 May 2026 14:13:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=vin10" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by vin10 in "SecurityBaseline.eu"]]></title><description><![CDATA[
<p>There should be a metric for sites hosting malicious content!<p>https[:]//erasmus-plus.ec.europa.eu/sites/default/files/2026-05/mortal-kombat-2-cs.pdf</p>
]]></description><pubDate>Wed, 13 May 2026 08:21:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=48119219</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=48119219</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48119219</guid></item><item><title><![CDATA[New comment by vin10 in "Vm.overcommit_memory=2 is the right setting for servers"]]></title><description><![CDATA[
<p>it's a (then-)safe default from the age when having 1GB of RAM and 2GB of swap was the norm: <a href="https://linux-kernel.vger.kernel.narkive.com/U64kKQbW/should-calculation-of-vm-overcommit-ratio-be-changed#" rel="nofollow">https://linux-kernel.vger.kernel.narkive.com/U64kKQbW/should...</a></p>
]]></description><pubDate>Fri, 19 Dec 2025 20:49:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46330729</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=46330729</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46330729</guid></item><item><title><![CDATA[New comment by vin10 in "Vm.overcommit_memory=2 is the right setting for servers"]]></title><description><![CDATA[
<p>> he way stuff fails when it runs out of memory is really confusing<p>have you checked what your `vm.overcommit_ratio` is? If its < 100%, then you will get OOM kills even if plenty of RAM is free since the default is 50 i.e. 50% of RAM can be COMMITTED and no more.<p>curious what kind of failures you are alluding to.</p>
]]></description><pubDate>Fri, 19 Dec 2025 20:35:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46330585</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=46330585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46330585</guid></item><item><title><![CDATA[New comment by vin10 in "Vm.overcommit_memory=2 is the right setting for servers"]]></title><description><![CDATA[
<p>For anyone feeling brave enough to disable overcommit after reading this, be mindful that default `vm.overcommit_ratio` is 50% which means that if no swap is available, on a system with 2GB of total RAM, more than 1GB of RAM can't be allocated and requests will fail with preemptive OOMs. (e.g. postgresql servers typically disable overcommit)<p>- <a href="https://github.com/torvalds/linux/blob/master/mm/util.c#L753" rel="nofollow">https://github.com/torvalds/linux/blob/master/mm/util.c#L753</a></p>
]]></description><pubDate>Fri, 19 Dec 2025 20:33:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=46330561</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=46330561</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46330561</guid></item><item><title><![CDATA[New comment by vin10 in "Al-LLM powered eBPF based security platform"]]></title><description><![CDATA[
<p>Nice usability features definitely. Apart from that how would you say it compares against something like sysdig falco / cilium + tetragon?<p>Apart from this a major issue is DNS based dynamic filtering which is way batter to get right in a Kubernetes environment with something like Cilium. IP lists are impossible to manage with modern level of third party integrations.</p>
]]></description><pubDate>Thu, 29 May 2025 14:03:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=44126242</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=44126242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44126242</guid></item><item><title><![CDATA[New comment by vin10 in "How to harden GitHub Actions"]]></title><description><![CDATA[
<p>Interesting project, I think I just found a way to crash the sandbox, just reported via an advisory.</p>
]]></description><pubDate>Thu, 08 May 2025 16:27:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=43927811</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=43927811</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43927811</guid></item><item><title><![CDATA[New comment by vin10 in "How are cyber criminals rolling in 2025?"]]></title><description><![CDATA[
<p>I would have expected at least Virustotal to flag them if that were the case. It does more than just looking up in a database of known malicious URLs and I think the reputation of the domains is the key factor here.<p><a href="https://www.virustotal.com/gui/url/6dd23e90ee436e1ff066725aa7ebcd5cfa238966b2b1712e856dffedbee0429f/details" rel="nofollow">https://www.virustotal.com/gui/url/6dd23e90ee436e1ff066725aa...</a><p>> BitDefender - government<p>> Sophos - government<p>> Forcepoint ThreatSeeker - government<p>- <a href="https://docs.virustotal.com/docs/how-it-works" rel="nofollow">https://docs.virustotal.com/docs/how-it-works</a></p>
]]></description><pubDate>Tue, 06 May 2025 12:28:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=43904323</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=43904323</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43904323</guid></item><item><title><![CDATA[New comment by vin10 in "How are cyber criminals rolling in 2025?"]]></title><description><![CDATA[
<p>It is the same for nested links as well. They mostly have a chain of links, each one taking you to a new one with hop count ranging anywhere from 5 up to 10 or more.</p>
]]></description><pubDate>Mon, 05 May 2025 17:46:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=43897580</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=43897580</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43897580</guid></item><item><title><![CDATA[How are cyber criminals rolling in 2025?]]></title><description><![CDATA[
<p>Article URL: <a href="https://vin01.github.io/piptagole/cybcecrime/security/cybersecurity/2025/05/05/state-cyber-security.html">https://vin01.github.io/piptagole/cybcecrime/security/cybersecurity/2025/05/05/state-cyber-security.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=43896188">https://news.ycombinator.com/item?id=43896188</a></p>
<p>Points: 266</p>
<p># Comments: 92</p>
]]></description><pubDate>Mon, 05 May 2025 15:33:57 +0000</pubDate><link>https://vin01.github.io/piptagole/cybcecrime/security/cybersecurity/2025/05/05/state-cyber-security.html</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=43896188</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43896188</guid></item><item><title><![CDATA[New comment by vin10 in "Unfashionably secure: why we use isolated VMs"]]></title><description><![CDATA[
<p>> If you wouldn't trust running it on your host, you probably shouldn't run it in a container as well.<p>- From a Docker/Moby Maintainer</p>
]]></description><pubDate>Thu, 25 Jul 2024 20:05:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=41072790</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=41072790</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41072790</guid></item><item><title><![CDATA[CVE-2024-38396: Abusing escape sequences in iTerm2 for code execution]]></title><description><![CDATA[
<p>Article URL: <a href="https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html">https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40706136">https://news.ycombinator.com/item?id=40706136</a></p>
<p>Points: 5</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 17 Jun 2024 14:47:39 +0000</pubDate><link>https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=40706136</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40706136</guid></item><item><title><![CDATA[New comment by vin10 in "Abusing url handling in iTerm2 and Hyper for code execution"]]></title><description><![CDATA[
<p>It is guarded by a warning and requires explicit approval similar to browsers but yes, it does broaden the attack surface: <a href="https://gitlab.com/gnachman/iterm2/-/commit/fc9ae5c90f53cb1ed54d338a3bf1e09f22d22894#c7949d378a5b9fa837d1322ccfded21fa5e97bc4_565_578" rel="nofollow">https://gitlab.com/gnachman/iterm2/-/commit/fc9ae5c90f53cb1e...</a></p>
]]></description><pubDate>Wed, 22 May 2024 19:03:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=40444834</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=40444834</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40444834</guid></item><item><title><![CDATA[New comment by vin10 in "Abusing url handling in iTerm2 and Hyper for code execution"]]></title><description><![CDATA[
<p>It is the first one, they need to be printed and clicked.</p>
]]></description><pubDate>Wed, 22 May 2024 05:00:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=40437497</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=40437497</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40437497</guid></item><item><title><![CDATA[Abusing url handling in iTerm2 and Hyper for code execution]]></title><description><![CDATA[
<p>Article URL: <a href="https://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execution/2024/05/21/arbitrary-url-schemes-terminal-emulators.html">https://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execution/2024/05/21/arbitrary-url-schemes-terminal-emulators.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=40428032">https://news.ycombinator.com/item?id=40428032</a></p>
<p>Points: 141</p>
<p># Comments: 56</p>
]]></description><pubDate>Tue, 21 May 2024 13:09:10 +0000</pubDate><link>https://vin01.github.io/piptagole/escape-sequences/iterm2/hyper/url-handlers/code-execution/2024/05/21/arbitrary-url-schemes-terminal-emulators.html</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=40428032</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40428032</guid></item><item><title><![CDATA[New comment by vin10 in "You cannot simply publicly access private secure links, can you?"]]></title><description><![CDATA[
<p>This is a very well formulated suggestion. Nicely written!</p>
]]></description><pubDate>Thu, 07 Mar 2024 20:33:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=39634268</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=39634268</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39634268</guid></item><item><title><![CDATA[New comment by vin10 in "You cannot simply publicly access private secure links, can you?"]]></title><description><![CDATA[
<p>You are right about short expiry times but another catch here is that if pre-signed URLs are being leaked in an automated fashion, these services also keep the downloaded content from these URLs around. I found various such examples where links no longer work, but PDFs downloaded from pre-signed URLs were still stored by scanning services.<p>From <a href="https://urlscan.io/blog/2022/07/11/urlscan-pro-product-updates-for-q2-2022/" rel="nofollow">https://urlscan.io/blog/2022/07/11/urlscan-pro-product-updat...</a><p>> In the process of scanning websites, urlscan.io will sometimes encounter file downloads triggered by the website. If we are able to successfully download the file, we will store it, hash it and make it available for downloading by our customers.</p>
]]></description><pubDate>Thu, 07 Mar 2024 19:46:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=39633742</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=39633742</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39633742</guid></item><item><title><![CDATA[You cannot simply publicly access private secure links, can you?]]></title><description><![CDATA[
<p>Article URL: <a href="https://vin01.github.io/piptagole/security-tools/soar/urlscan/hybrid-analysis/data-leaks/urlscan.io/cloudflare-radar%22/2024/03/07/url-database-leaks-private-urls.html">https://vin01.github.io/piptagole/security-tools/soar/urlscan/hybrid-analysis/data-leaks/urlscan.io/cloudflare-radar%22/2024/03/07/url-database-leaks-private-urls.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=39630985">https://news.ycombinator.com/item?id=39630985</a></p>
<p>Points: 420</p>
<p># Comments: 218</p>
]]></description><pubDate>Thu, 07 Mar 2024 16:29:47 +0000</pubDate><link>https://vin01.github.io/piptagole/security-tools/soar/urlscan/hybrid-analysis/data-leaks/urlscan.io/cloudflare-radar%22/2024/03/07/url-database-leaks-private-urls.html</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=39630985</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39630985</guid></item><item><title><![CDATA[New comment by vin10 in "SSH ProxyCommand == unexpected code execution (CVE-2023-51385)"]]></title><description><![CDATA[
<p>OP here. Another interesting attack vector I have been working on is OSC 8 for hyperlink support in terminals. Mostly they allow arbitrary url schemes including "ssh://" without any prompt or user interaction to consent to open an external tool like ssh client in this case.<p>A good discussion on this: <a href="https://gist.github.com/egmontkob/eb114294efbcd5adb1944c9f3cb5feda" rel="nofollow noreferrer">https://gist.github.com/egmontkob/eb114294efbcd5adb1944c9f3c...</a></p>
]]></description><pubDate>Mon, 25 Dec 2023 10:29:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=38761436</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=38761436</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38761436</guid></item><item><title><![CDATA[SSH ProxyCommand == unexpected code execution (CVE-2023-51385)]]></title><description><![CDATA[
<p>Article URL: <a href="https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html">https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=38754304">https://news.ycombinator.com/item?id=38754304</a></p>
<p>Points: 30</p>
<p># Comments: 14</p>
]]></description><pubDate>Sun, 24 Dec 2023 15:55:12 +0000</pubDate><link>https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html</link><dc:creator>vin10</dc:creator><comments>https://news.ycombinator.com/item?id=38754304</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38754304</guid></item></channel></rss>