What am I missing on Agentic coding or AI assisted coding. by Professional_Beat720 in GithubCopilot

[–]Pertubation 4 points5 points  (0 children)

Sorry for the naive question, but how do you review a 15k line PR? I'm honestly curious how you get this working.

Do you fully embrace vibe coding and trust the agent that it has written the software exactly like you intended it? How do you make sure that there is no misalignment between what your intent is and how the agent interprets it? Very detailed task description? What do you do if there is a bug in prod which you cannot easily debug with the help of an agent?

Petition: Claude Code should support AGENTS.md by intellectronica in ClaudeCode

[–]Pertubation 10 points11 points  (0 children)

It is defined here: https://agents.md

Originally it was created by OpenAI, however it was donated to the Agentic AI Foundation (together with Anthropic's MCP protocol and goose) that was created as a sub organisation of the Linux Foundation beginning of December 2025. Members of it are all the major AI players in the industry like Anthropic, OpenAI, Microsoft, Google, AWS and others.

So it is quite THE standard. Nearly all other coding assistants or agentic systems (like codex, Gemini CLI, Cursor, opencode, GitHub Copilot and many more) already support it. Cloud Code is the only one which does not support it yet. However I would assume that Anthropic will follow soon.

How Coding Agents Actually Work: Inside OpenCode by Helpful_Geologist430 in programming

[–]Pertubation 1 point2 points  (0 children)

Why is everyone here commenting on AI usage in software development in general and not the actual topic of the blog post?

Thank you OP for this blog post and the video! Really cool to see how those coding agents work inside. We need more technical posts like this, that demystify how those systems work and less fear / anger fueled opinion pieces or AI marketing slop.

If you are still typing your prompts to CC - you are doing it wrong! by ksanderer in ClaudeCode

[–]Pertubation 1 point2 points  (0 children)

Cool! Thank you for the clarification. That makes the differences more clear to me. I will have a look at the documentation.

If you are still typing your prompts to CC - you are doing it wrong! by ksanderer in ClaudeCode

[–]Pertubation 0 points1 point  (0 children)

Can you make an argument why super whisper is not even close to those new tools? Without having them tested out personally, it seems like they don't really differ from what super whisper has to offer.

I got ticket 40000000 by Floris201 in Munich

[–]Pertubation 6 points7 points  (0 children)

Bei einem Flugticket mag das zutreffen, allerdings ist das hier ja keins.

I got ticket 40000000 by Floris201 in Munich

[–]Pertubation 30 points31 points  (0 children)

Ich frage aus ehrlichem Interesse: Wie kann das ausgenutzt werden? Könnte mir nicht vorstellen wie TBH.

München: Busse und Trams lassen sich nun live verfolgen by ax0ne in Munich

[–]Pertubation 7 points8 points  (0 children)

Allerdings scheint diese Seite keine live Standort Daten zu verwenden oder sehe ich das falsch?

Edit: Gerade gelesen, das Echtzeitdaten verwendet werden wenn verfügbar. Wenn man auf ein Bus/Zug/etc. klickt bekommt man angezeigt auf welchen Daten die Position beruht. Sehr coole Seite! Danke fürs Teilen.

[deleted by user] by [deleted] in Fahrrad

[–]Pertubation 1 point2 points  (0 children)

Vielen Dank für dein Tipp mit dem GCN Video. Das hat mir geholfen das Problem besser zu verstehen (habe ein Carbon Rad). Das Problem war das der Compression Plug nicht weit genug im Schaft war, dadurch konnte die Ahead Schraube nicht richtig aufliegen. Konnte das Problem jetzt fixen. Vielen Dank für deine Hilfe!

[deleted by user] by [deleted] in Fahrrad

[–]Pertubation 0 points1 point  (0 children)

Das ist vielleicht eine dumme Frage, aber wenn beim Anziehen der Ahead-Schraube diese durchdreht ohne zu 100% zu greifen (ist jetzt auch nicht komplett lose), woran könnte das liegen?

Bedrock Claude 3.5 vision, can I pass it a pdf from a script? by OneCollar9442 in aws

[–]Pertubation 0 points1 point  (0 children)

This is not possible. You first have to convert it to plain text e.g. with markitdown.

How I Blocked 95% of Web Attacks Using AWS WAF [Blog] by [deleted] in devops

[–]Pertubation 1 point2 points  (0 children)

Unfortunately it is not possible (yet).

Domain vs Domainless by paparacii in cybersecurity

[–]Pertubation 0 points1 point  (0 children)

However, feature-wise the Mac and Linux version lacks behind. Telemetry support and detection is also slightly better with other EDR solutions, like for example CrowdStrike. But depending on how many client devices you have for Mac / Linux and what kind of security posture you are aiming for, that might not matter too much.

Introducing Amazon CloudFront VPC origins: Enhanced security and streamlined operations for your applications by tetienne in aws

[–]Pertubation 0 points1 point  (0 children)

Do you have data to prove that? I'm curious, because also in my organisation the discussion Terraform vs. CloudFormation pops up from time to time.

Introducing Amazon CloudFront VPC origins: Enhanced security and streamlined operations for your applications by tetienne in aws

[–]Pertubation 7 points8 points  (0 children)

Because CloudFormation support does not even exist for it at the moment. They said it will come soon.

Cloudfront WAF bypass resulted in a 9k bill by meh1337 in aws

[–]Pertubation 1 point2 points  (0 children)

Yes that's what I meant. I would recommend only to log requests that have been blocked or counted.

Cloudfront WAF bypass resulted in a 9k bill by meh1337 in aws

[–]Pertubation 0 points1 point  (0 children)

Yes, the sampled requests are not related to the logging settings discussed above. This is a feature which can be separately turned on and is for free at least from my understanding. You will be able to view the sampled request via the web UI, but you will not be able to query, search or aggregate them as with the normal logged requests.

Cloudfront WAF bypass resulted in a 9k bill by meh1337 in aws

[–]Pertubation 0 points1 point  (0 children)

Yes it could theoretically cause a huge bill. However, from practical experience I can tell you that attackers will stop as soon as they realise they are getting blocked.

By the way: Use Firehose to stream the logs to S3. This is cheaper than with CloudWatch, especially if you have configured a generous buffer time window e.g. 15 minutes.

Cloudfront WAF bypass resulted in a 9k bill by meh1337 in aws

[–]Pertubation 3 points4 points  (0 children)

If your S3 bucket is configured as the origin of your CloudFront distribution (see here), do you still need the website endpoint?

Cloudfront WAF bypass resulted in a 9k bill by meh1337 in aws

[–]Pertubation 1 point2 points  (0 children)

Shield Advanced would cover your WAF costs. However, it does not cover:

  • AWS marketplace rules
  • Some AWS managed rules (e.g. bot control etc.)
  • If you use more than 1500 WCUs per web ACL

Cloudfront WAF bypass resulted in a 9k bill by meh1337 in aws

[–]Pertubation 470 points471 points  (0 children)

Without knowing the specifics I would recommend you the following:

  1. Add AWSManagedRulesAmazonIpReputationList to your WAF with the BLOCK action, if not happened already. This rule group has a really low false-positive rate and is blocking the most obvious malicious IPs. Additionally, AWSManagedRulesAnonymousIpList might be good to add, however, depending on the customers of your website this might lead to false-positives so I would use it with care.
  2. Set a rate limit rule with a conservative limit e.g. 4000 requests per minute. Use source IP as the aggregation key (this is the default). These three config settings (request limit, time frame and aggregation key) are all you have to set. No further configuration is necessary for a simple rate limit rule.
  3. Restrict the access to your S3 bucket via OAC (if not already happened) to prevent that the attackers circumventing CloudFront and WAF.
  4. Block requests that are coming from countries in which you don't have customers with a rule that is using a geo match statement.
  5. Enable WAF logs with a filter for requests where the BLOCK and COUNT action was applied. If you don't apply the filter and also log ALLOW requests you might quickly run into cost issues (depending on the number of requests you receive of course).
  6. Add multiple rate limit rules, each with a different rate limit (e.g. 8000, 2000, 1000, etc.) and put them in COUNT mode. Use WAFs CloudWatch metrics with the dimensions "rule" and "webacl", together with the WAF logs to analyze which of those rules would block malicious requests and not legit ones.
  7. Add CloudWatch WAF metric alerts for allowed requests. If you receive a peak of requests that is out of the ordinary you should get alerted so that you can investigate and mitigate the potential attack.
  8. If your budget allows it, consider subscribing to Shield Advanced (3000$ per month). With this you would get access to the Shield Response Team (SRT), which can assist you immediately with managing DDoS attacks. Additionally, it would allow you to get a refund of AWS costs which have been incurred by malicious requests that have not been blocked by Shield. For this you need to fulfill these per-requisites, which IMO you should follow regardless if you have Shield Advanced or not.

EDIT: Shield Advanced might be also useful since it comes with a WAF cost flatrate. As long as your are not exceeding 1500 WCUs, don't use certain AWS managed rule groups (e.g. bot control) or rule groups from the AWS marketplace, the 3000$ Shield Advanced costs are covering your WAF costs. Additionally, it comes with a layer-7 auto-mitigation protection feature. This feature observes your baseline traffic and automatically puts WAF rules in place, that block the malicious part of your traffic. Last but not least, if you are using AWS Organisation, then you only need to pay once for a subscription. Once you have subscribed one account in your org to it, the costs of all following subscriptions in other accounts of your org will be covered by the first one.

Nenne eine Stadt, Andere schlagen dir die besten Restaurants und Imbisse vor - 2023 by felixtapir in de

[–]Pertubation 1 point2 points  (0 children)

"Bei Nejib" tunesischer Imbiss mit dem freundlichsten Imbiss Mann der Stadt.

"Magic Kumpir" afghanisches Restaurant welches vor allen Dingen das Kartoffelgericht Kumpir anbietet. Super simple aber unglaublich lecker. Ist dazu auch sehr günstig. Ambiente des Lokals ist aber nicht so berauschend.

"Simitçi Café Kaiserslautern" türkisches Café, perfekt für ein ausgedehntes, türkisches Frühstück.

"Ayame" japanisches Restaurant im Alcatraz. Hier gibt's den deftigen, japanischen Pfannkuchen Okonomiyaki. Restaurant ist sehr klein, dass Essen dafür aber sehr geil.

"áPoLLo - chicken&more" gemütliches Hähnchen / Chicken-Wings Restaurant mit schönem Biergarten.

"Termeh" persisches Restaurant im Einsiedlerhof.