| News Nug |
|---|
|
Post Mortem: axios NPM supply chain compromise Published: 2026-04-03 | Origin: Hacker News On March 31, 2026, two malicious versions of the axios library (1.14.1 and 0.30.4) were published to the npm registry via a compromised account, introducing a dependency known as [email protected], which installed a remote access trojan on various operating systems. These versions were available for approximately three hours before being removed. Users are advised to check their lockfiles and treat any compromised machines accordingly, especially if they installed |
|
How to build .NET obfuscator - Part I Published: 2026-04-02 | Origin: /r/programming The content discusses a series on building .NET obfuscators, emphasizing the techniques relevant to C#. It suggests that readers should have a basic understanding of C#, the ECMA-335 specification, and the dnlib library for metadata modification. Familiarity with stack virtual machines and IL opcodes is also recommended, and a cheatsheet is provided for essential instructions related to stack operations, comparisons, and method calls. The author notes that .NET metadata can be likened to database tables and mentions a tool |
|
Towards an Amicable Resolution with Ruby Central Published: 2026-04-02 | Origin: /r/ruby On April 2, 2026, three members of Ruby Central's board released statements regarding RubyGems and Bundler. They published an incident report detailing last year's events and announced the completion of a third audit of RubyGems.org's infrastructure, which found no evidence of compromised user data or service integrity. The board acknowledged their communication failures with former maintainers that contributed to confusion and frustration within the community. They expressed a commitment to resolve disputes amicably. The former maintainer declared a |
|
Sidekiq to Temporal: a zero-downtime migration strategy Published: 2026-04-02 | Origin: /r/ruby FireHydrant, recently acquired by Freshworks, is an incident management platform that focuses on helping businesses improve their response to incidents and operational reliability. Key features include quickstart guides, integrations with various tools, comprehensive documentation, an API reference for programmatic interaction, and customer stories highlighting successful incident management. Their blog offers insights on incidents and reliability, while guides and events provide best practices. The platform has evolved its runbook automation, enabling customers to manage incidents more effectively and efficiently. FireHydrant uses |
|
soak testing a desktop app in zig Published: 2026-04-02 | Origin: /r/programming Failed to fetch content - HTTP Status - 403 |
|
Tailscale's new macOS home Published: 2026-04-02 | Origin: Hacker News Tailscale is a networking service that facilitates seamless device connectivity. It recently updated its product offerings, including Aperture, which focuses on unified AI governance. The Winter Update highlights enhancements in various features like Peer Relays and Services. Tailscale also hosts events, such as TailscaleUp, aimed at engineering, security, and IT leaders, and offers partnership opportunities. A recent issue on some MacBooks involved Tailscale’s icon disappearing behind the notch on newer models' displays, making it |
|
Cursor 3 Published: 2026-04-02 | Origin: Hacker News Software development is evolving, and Cursor is adapting to these changes. Over the past year, the transition from manual file editing to using agents that autonomously write code is underway, marking a shift to the third era of software development. Despite this progress, engineers find themselves still managing individual agents and multitasking across various tools. To streamline this process, Cursor is launching Cursor 3, a unified workspace designed for working with agents. This new interface enables a higher level of abstraction while still allowing deeper exploration when |
|
Good ideas do not need lots of lies in order to gain public acceptance (2008) Published: 2026-04-02 | Origin: Hacker News The content discusses a minor change to the comments section of a website that no longer includes pop-up links. It questions whether this adjustment addresses the issue of comments not appearing on permalinked posts, concluding that it appears not to help. The text also lists a variety of individuals and their associated fields, alongside humorous remarks and references to various personas, including a mix of political figures and creative professionals. Additionally, it encourages readers who may not appreciate the "Daniel Davies" website to remain open to other related content |
|
Google releases Gemma 4 open models Published: 2026-04-02 | Origin: Hacker News The content discusses the capabilities of Gemma 4, a model designed for mobile and IoT devices as well as personal computers. It emphasizes the ability to create autonomous agents that can perform tasks using function calling, develop applications with advanced audio and visual capabilities, and offer multilingual support that understands cultural nuances. Users can enhance performance by training Gemma with preferred frameworks and run models on their own hardware for efficient deployment. The models have been rigorously evaluated against various data sets to ensure quality, and they adhere |
|
Decisions that eroded trust in Azure – by a former Azure Core engineer Published: 2026-04-02 | Origin: Hacker News The article begins a series discussing a significant misstep by Microsoft that nearly cost them OpenAI, their largest customer, as well as the trust of the US government. The author, who joined Azure Core on May 1, 2023, brings a wealth of experience to the role, having been involved with Azure since its inception in 2010 and having held various positions at Microsoft, including work on Windows, SharePoint Online, and core operating system technologies. The author has also played a key |
|
Bringing Clojure programming to Enterprise Published: 2026-04-02 | Origin: /r/programming The blog post discusses the author's decision to use Clojure, a dialect of LISP, for developing a reference data system in the manufacturing domain. Initially skeptical about moving away from standard development languages like Java, the author came to appreciate Clojure's advantages, including its dynamic functional programming features and immutable data structures. Clojure runs on the Java Virtual Machine, providing a rich ecosystem of libraries and tools that facilitate complex data manipulation. Despite being created in 2007 and often regarded as a |
|
Qwen3.6-Plus: Towards real world agents Published: 2026-04-02 | Origin: Hacker News Of course! Please provide the content you'd like summarized. |
|
Tried to buy a pint, Finding a Trojan: My First Malware Analysis Published: 2026-04-02 | Origin: /r/programming The author recounts an experience of trying to access a trendy bar's website, which redirected them to a suspicious page resembling Cloudflare. When they attempted to verify access, a pop-up copied something to their clipboard, prompting concern about its legitimacy. As a Linux user, the author was safe from executing the script but became intrigued by its workings. They analyze a portion of the script, explaining how it manipulates characters and applies a mathematical operation (XOR) to decode a ciphertext using a specified key |
|
How do you handle calendar functionality in your Rails apps? Published: 2026-04-02 | Origin: /r/ruby Failed to fetch content - HTTP Error - Failed to open TCP connection to :80 (Connection refused - connect(2) for nil port 80) |
|
What Would You See Changed in Haskell? Published: 2026-04-02 | Origin: /r/programming The report summarizes responses to Question 77 from the State of Haskell Survey 2025, which received 553 diverse answers in terms of clarity and relevance. A team conducted both quantitative and qualitative analyses to identify trends and suggestions from the Haskell community. They aimed to understand the context behind responses while being considerate of participants' efforts. Key findings include a strong recommendation to replace the String type with Text for handling textual data, as current practices often lead to confusion and frustration among users. Additionally, there |
|
Learning API Styles • Lukasz Dynowski & Sam Newman Published: 2026-04-02 | Origin: /r/programming Sure! Please provide the content that you would like me to summarize. |
|
Beyond the README: Enforcing Application Guardrails at Runtime Published: 2026-04-02 | Origin: /r/programming The content discusses the challenges of executing actions in a development environment, particularly when testing new features. It highlights issues that arise when test notifications accidentally reach real customers, indicating a failure in application safeguards. In standard imperative programming, the action of sending notifications is immediate and inseparable from the decision to do so, lacking a mechanism to intercept misuse. To address this, the text proposes an "Effect System," which advocates treating actions such as sending an SMS or writing to a database as descriptors rather than immediate commands |
|
Packaging 128 languages with Nix Published: 2026-04-02 | Origin: /r/programming The content discusses the "quine-relay" project by @mame, which creates a unique "uroboros" quine that translates code through 128 programming languages, ultimately returning to the original Ruby code. While this project is impressive, users have encountered difficulties reproducing it due to issues with the Docker build, particularly for non-Ubuntu operating systems. To alleviate this, an idea from 2021 was revisited: packaging the quine with Nix for easier invocation. |
|
New StackOverflow website looks more like Reddit Published: 2026-04-02 | Origin: /r/programming Failed to fetch content - HTTP Status - 403 |
|
Why full-stack post-quantum cryptography cannot wait Published: 2026-04-02 | Origin: /r/programming At Cisco Live 2026 in Amsterdam, Cisco unveiled the industry’s first full-stack post-quantum cryptography (PQC) architecture, aimed at addressing the security risks posed by quantum computing as enterprises modernize their networks. This architecture implements quantum-safe cryptography at all network layers, using NIST-approved algorithms to ensure device integrity and protect data in transit. Traditional cryptographic methods, such as RSA and Elliptic Curve Cryptography (ECC), remain secure against classical computing but are vulnerable |