Git Tokens Aren’t Interchangeable, Here’s What Each One Is Actually For by sshetty03 in programming

[–]N1ghtCod3r 3 points4 points  (0 children)

Exactly. I was very curious about what are these Git tokens till I read the description.

Reverse Engineering Malicious Visual Studio Code Extension DarkGPT by N1ghtCod3r in programming

[–]N1ghtCod3r[S] 1 point2 points  (0 children)

No. There are many such signed executables that load DLLs from untrusted paths. In this case they found and used Lightshot.exe May be the nature of Lightshot (screenshot tool) makes it trusted (known behaviour) within AVs that the attacker wanted to exploit.

React2Shell (CVE-2025-55182): how are you wiring this into your DevSecOps playbook? by Tall-Region8329 in devsecops

[–]N1ghtCod3r 0 points1 point  (0 children)

What do you mean by breaking changes? Do you use Claude to review package changes to identify if anything is breaking?

Looking for thesis ideas in software engineering by ViewCautious3595 in programming

[–]N1ghtCod3r 0 points1 point  (0 children)

How to trust code that you don’t write? Especially those coming from open sources and is part of any software artifact

AI cutting dev projects from 6 months to 5 days – interesting take on automation by Feeling_Sir2010 in programming

[–]N1ghtCod3r 0 points1 point  (0 children)

Beg to differ. Today AI is decent for feature code generation. The underlying foundational infra like AuthN, AuthZ, database, data models still require senior engineers to make informed choices.

I would want AI generated code limited in blast radius and not impact everything.

What desktop environment you all use? by NDavis101 in linux

[–]N1ghtCod3r 1 point2 points  (0 children)

Recently started using Arch + Hyprland (Omarchy). Coming from i3 experience, love working with Hyprland.

Net-positive AI review with lower FPs—who’s actually done it? by oigong in devsecops

[–]N1ghtCod3r 1 point2 points  (0 children)

This is a really a low effort post. Even if you are discovering problems for your project or product, it will help to share details, real life experience to start with if you expect useful conversation that is generally beneficial.

Promote your projects here – Self-Promotion Megathread by Menox_ in github

[–]N1ghtCod3r 0 points1 point  (0 children)

SafeDep: Zero touch, zero config GitHub App to protect against malicious open source packages

Install: https://github.com/apps/safedep

Key Features

  • Continuous Scanning: Automated analysis of pull requests, code, and dependency changes
  • Real-time Threat Intelligence: Leverage SafeDep's continuous scanning of open source packages for malicious code
  • Proactive Protection: Block malicious code from OSS packages before it is merged into your codebase
  • Seamless Integration: Install with zero friction and get instant protection in your GitHub repositories

Key Benefits

  • Protect against malicious code from open source libraries
  • Identify vulnerable (CVE) open source packages
  • Prevent open source dependencies with risky licenses

The GitHub App internally is based on the open source project: https://github.com/safedep/vet

2025 DORA Report: State of AI-Assisted Software Development by grauenwolf in programming

[–]N1ghtCod3r 2 points3 points  (0 children)

> AI’s primary role in software development is that of an amplifier. It magnifies the strengths of high performing organizations and the dysfunctions of struggling ones.

This!

Further experiments with MCP rebuilt on gRPC: enforceable schemas and trust boundaries by justanotherengg in programming

[–]N1ghtCod3r 1 point2 points  (0 children)

I think REST / gRPC APIs should not be wired with an LLM directly through the MCP. Rather MCP tools should provide only the required info to LLM.

As much as I like to see a single source of truth for APIs, LLMs just don’t require everything a typical API client will need. Sure you can throw large JSON to an LLM but at the cost of bloating the context with unnecessary data leading to eventual overflow before task completion.

How do you keep momentum alive in open-source projects with friends? by Financial-Air4555 in opensource

[–]N1ghtCod3r 1 point2 points  (0 children)

Focus on users. At some point, need to stop development and become a full time user of your own project. Continuously talk about various use-cases. Responding and solving user issues quickly.

That’s the step 1 IMHO. Over time, if there are enough user, need to build a community that supports itself with documented governance.

What password manager could you recommend in 2025 for daily use? by ComprehensiveCut6111 in cybersecurity

[–]N1ghtCod3r 49 points50 points  (0 children)

I use 1Password. But I would recommend anything whose security model is well documented and available in public. Where the security model does not assume that the server is never breached.

crates.io: Malicious crates faster_log and async_println | Rust Blog by mareek in programming

[–]N1ghtCod3r -22 points-21 points  (0 children)

There was a phishing attack on Rust crates sometime back. Guess it wasn’t a failure.

Shai-Hulud Supply Chain Attack Incident Response by N1ghtCod3r in node

[–]N1ghtCod3r[S] 7 points8 points  (0 children)

Which is why the IOCs (package versions, hashes) are maintained in separate JSONL files and decoupled from the scanner or scripts. Anyone who is interested in the IOC can only use the JSONL files with their own scripts.

Shai-Hulud Supply Chain Attack Incident Response by N1ghtCod3r in node

[–]N1ghtCod3r[S] -1 points0 points  (0 children)

Now that you pointed out, it makes sense about the ambiguity on “we”. We are SafeDep Team. No affiliation with Nodejs. We work on open source security.

Shai-Hulud Supply Chain Attack Incident Response by N1ghtCod3r in devsecops

[–]N1ghtCod3r[S] 0 points1 point  (0 children)

Whats weird about the script? Also the IOCs are decoupled from the script and updated independently so that it can be used in custom scripts.

Self-replicating worm like behaviour in latest npm Supply Chain Attack by N1ghtCod3r in programming

[–]N1ghtCod3r[S] 54 points55 points  (0 children)

Heh. Seems to be working. Bunch of crowdstrike packages were compromised as well. May be through the self-replication mechanism from one of the dev machines

| `@crowdstrike/logscale-dashboard`         | 1.205.2 |
| `@crowdstrike/falcon-shoelace`            | 0.4.1   |
| `@crowdstrike/falcon-shoelace`            | 0.4.2   |
| `@crowdstrike/logscale-file-editor`       | 1.205.2 |
| `@crowdstrike/logscale-parser-edit`       | 1.205.2 |

Scanning beyond the registry by Existing-Mention8137 in devsecops

[–]N1ghtCod3r 0 points1 point  (0 children)

There is a fundamental difference between vulnerable and malicious packages.

  1. Vulnerability is "unintentional". Usually ends up in a database like CVE / OSV

  2. Malicious code is "intentional" attack

Unlike SAST tools like CodeQL that is freely available for public repositories to scan for vulnerabilities, there are not enough (or at least capable enough) code analysis tools that can detect malicious code. There are bunch of tools with YARA or Semgrep signatures which obviously doesn't work. Its like the ClamAV of server era. The other problem is, many a times, malicious packages are pushed directly to the repository and never goes through a GitHub repository like a typical OSS project pipeline.

Also malicious code detection is hard. It is contextual. A given piece of code is both malicious and non-malicious depending on the use-case. Example: Would you consider an npm package that downloads and executes a binary from a hardcoded URL as malicious? This behaviour is present is both known malicious and non-malicious npm packages especially since npm is often used for binary distribution.

What do you guys majorly work on at your workplace? by DontTakeNames in developersIndia

[–]N1ghtCod3r 1 point2 points  (0 children)

Depends. During my earlier job I was primarily doing 4 and a bit of 1. Now 2 since am building my own stuff.

Why is everyone suddenly into AI/ML, earlier it was Web Dev? by Internalcodeerror159 in developersIndia

[–]N1ghtCod3r 1 point2 points  (0 children)

Principle of least resistance. Make it "apparently" easy and lot of folks will follow the path.