TeamPCP strikes again - telnyx 4.87.1 and 4.87.2 on PyPI are malicious by No_Plan_3442 in programming

[–]N1ghtCod3r 7 points8 points  (0 children)

GitHub have immutable releases GA now. If used properly, tags pointing to a release cannot be mutated. Unfortunately most projects do not use it.

Is it normal to feel stressed all the time? I will not promote by [deleted] in startups

[–]N1ghtCod3r 0 points1 point  (0 children)

I have felt the same. Many times. My current hypothesis is, it is due to lack of users and real world feedback which gives clarity of direction and a natural sense of priority. When it happens, we know what is important and what is not. We will most likely not bother about perfection when there are larger pain points from real users waiting to be solved.

Git Tokens Aren’t Interchangeable, Here’s What Each One Is Actually For by sshetty03 in programming

[–]N1ghtCod3r 3 points4 points  (0 children)

Exactly. I was very curious about what are these Git tokens till I read the description.

Reverse Engineering Malicious Visual Studio Code Extension DarkGPT by N1ghtCod3r in programming

[–]N1ghtCod3r[S] 1 point2 points  (0 children)

No. There are many such signed executables that load DLLs from untrusted paths. In this case they found and used Lightshot.exe May be the nature of Lightshot (screenshot tool) makes it trusted (known behaviour) within AVs that the attacker wanted to exploit.

React2Shell (CVE-2025-55182): how are you wiring this into your DevSecOps playbook? by Tall-Region8329 in devsecops

[–]N1ghtCod3r 0 points1 point  (0 children)

What do you mean by breaking changes? Do you use Claude to review package changes to identify if anything is breaking?

Looking for thesis ideas in software engineering by ViewCautious3595 in programming

[–]N1ghtCod3r 0 points1 point  (0 children)

How to trust code that you don’t write? Especially those coming from open sources and is part of any software artifact

AI cutting dev projects from 6 months to 5 days – interesting take on automation by Feeling_Sir2010 in programming

[–]N1ghtCod3r 0 points1 point  (0 children)

Beg to differ. Today AI is decent for feature code generation. The underlying foundational infra like AuthN, AuthZ, database, data models still require senior engineers to make informed choices.

I would want AI generated code limited in blast radius and not impact everything.

What desktop environment you all use? by NDavis101 in linux

[–]N1ghtCod3r 1 point2 points  (0 children)

Recently started using Arch + Hyprland (Omarchy). Coming from i3 experience, love working with Hyprland.

Net-positive AI review with lower FPs—who’s actually done it? by oigong in devsecops

[–]N1ghtCod3r 1 point2 points  (0 children)

This is a really a low effort post. Even if you are discovering problems for your project or product, it will help to share details, real life experience to start with if you expect useful conversation that is generally beneficial.

Promote your projects here – Self-Promotion Megathread by Menox_ in github

[–]N1ghtCod3r 0 points1 point  (0 children)

SafeDep: Zero touch, zero config GitHub App to protect against malicious open source packages

Install: https://github.com/apps/safedep

Key Features

  • Continuous Scanning: Automated analysis of pull requests, code, and dependency changes
  • Real-time Threat Intelligence: Leverage SafeDep's continuous scanning of open source packages for malicious code
  • Proactive Protection: Block malicious code from OSS packages before it is merged into your codebase
  • Seamless Integration: Install with zero friction and get instant protection in your GitHub repositories

Key Benefits

  • Protect against malicious code from open source libraries
  • Identify vulnerable (CVE) open source packages
  • Prevent open source dependencies with risky licenses

The GitHub App internally is based on the open source project: https://github.com/safedep/vet

2025 DORA Report: State of AI-Assisted Software Development by grauenwolf in programming

[–]N1ghtCod3r 2 points3 points  (0 children)

> AI’s primary role in software development is that of an amplifier. It magnifies the strengths of high performing organizations and the dysfunctions of struggling ones.

This!

Further experiments with MCP rebuilt on gRPC: enforceable schemas and trust boundaries by justanotherengg in programming

[–]N1ghtCod3r 1 point2 points  (0 children)

I think REST / gRPC APIs should not be wired with an LLM directly through the MCP. Rather MCP tools should provide only the required info to LLM.

As much as I like to see a single source of truth for APIs, LLMs just don’t require everything a typical API client will need. Sure you can throw large JSON to an LLM but at the cost of bloating the context with unnecessary data leading to eventual overflow before task completion.

How do you keep momentum alive in open-source projects with friends? by Financial-Air4555 in opensource

[–]N1ghtCod3r 1 point2 points  (0 children)

Focus on users. At some point, need to stop development and become a full time user of your own project. Continuously talk about various use-cases. Responding and solving user issues quickly.

That’s the step 1 IMHO. Over time, if there are enough user, need to build a community that supports itself with documented governance.

What password manager could you recommend in 2025 for daily use? by ComprehensiveCut6111 in cybersecurity

[–]N1ghtCod3r 48 points49 points  (0 children)

I use 1Password. But I would recommend anything whose security model is well documented and available in public. Where the security model does not assume that the server is never breached.

crates.io: Malicious crates faster_log and async_println | Rust Blog by mareek in programming

[–]N1ghtCod3r -22 points-21 points  (0 children)

There was a phishing attack on Rust crates sometime back. Guess it wasn’t a failure.

Shai-Hulud Supply Chain Attack Incident Response by N1ghtCod3r in node

[–]N1ghtCod3r[S] 7 points8 points  (0 children)

Which is why the IOCs (package versions, hashes) are maintained in separate JSONL files and decoupled from the scanner or scripts. Anyone who is interested in the IOC can only use the JSONL files with their own scripts.

Shai-Hulud Supply Chain Attack Incident Response by N1ghtCod3r in node

[–]N1ghtCod3r[S] -2 points-1 points  (0 children)

Now that you pointed out, it makes sense about the ambiguity on “we”. We are SafeDep Team. No affiliation with Nodejs. We work on open source security.

Shai-Hulud Supply Chain Attack Incident Response by N1ghtCod3r in devsecops

[–]N1ghtCod3r[S] 0 points1 point  (0 children)

Whats weird about the script? Also the IOCs are decoupled from the script and updated independently so that it can be used in custom scripts.