News Nug
Post Mortem: axios NPM supply chain compromise

Published: 2026-04-03 | Origin: Hacker News

On March 31, 2026, two malicious versions of the axios library (1.14.1 and 0.30.4) were published to the npm registry via a compromised account, introducing a dependency known as [email protected], which installed a remote access trojan on various operating systems. These versions were available for approximately three hours before being removed. Users are advised to check their lockfiles and treat any compromised machines accordingly, especially if they installed

How to build .NET obfuscator - Part I

Published: 2026-04-02 | Origin: /r/programming

The content discusses a series on building .NET obfuscators, emphasizing the techniques relevant to C#. It suggests that readers should have a basic understanding of C#, the ECMA-335 specification, and the dnlib library for metadata modification. Familiarity with stack virtual machines and IL opcodes is also recommended, and a cheatsheet is provided for essential instructions related to stack operations, comparisons, and method calls. The author notes that .NET metadata can be likened to database tables and mentions a tool

Towards an Amicable Resolution with Ruby Central

Published: 2026-04-02 | Origin: /r/ruby

On April 2, 2026, three members of Ruby Central's board released statements regarding RubyGems and Bundler. They published an incident report detailing last year's events and announced the completion of a third audit of RubyGems.org's infrastructure, which found no evidence of compromised user data or service integrity. The board acknowledged their communication failures with former maintainers that contributed to confusion and frustration within the community. They expressed a commitment to resolve disputes amicably. The former maintainer declared a

Sidekiq to Temporal: a zero-downtime migration strategy

Published: 2026-04-02 | Origin: /r/ruby

FireHydrant, recently acquired by Freshworks, is an incident management platform that focuses on helping businesses improve their response to incidents and operational reliability. Key features include quickstart guides, integrations with various tools, comprehensive documentation, an API reference for programmatic interaction, and customer stories highlighting successful incident management. Their blog offers insights on incidents and reliability, while guides and events provide best practices. The platform has evolved its runbook automation, enabling customers to manage incidents more effectively and efficiently. FireHydrant uses

soak testing a desktop app in zig

Published: 2026-04-02 | Origin: /r/programming

Failed to fetch content - HTTP Status - 403

Tailscale's new macOS home

Published: 2026-04-02 | Origin: Hacker News

Tailscale is a networking service that facilitates seamless device connectivity. It recently updated its product offerings, including Aperture, which focuses on unified AI governance. The Winter Update highlights enhancements in various features like Peer Relays and Services. Tailscale also hosts events, such as TailscaleUp, aimed at engineering, security, and IT leaders, and offers partnership opportunities. A recent issue on some MacBooks involved Tailscale’s icon disappearing behind the notch on newer models' displays, making it

Cursor 3

Published: 2026-04-02 | Origin: Hacker News

Software development is evolving, and Cursor is adapting to these changes. Over the past year, the transition from manual file editing to using agents that autonomously write code is underway, marking a shift to the third era of software development. Despite this progress, engineers find themselves still managing individual agents and multitasking across various tools. To streamline this process, Cursor is launching Cursor 3, a unified workspace designed for working with agents. This new interface enables a higher level of abstraction while still allowing deeper exploration when

Good ideas do not need lots of lies in order to gain public acceptance (2008)

Published: 2026-04-02 | Origin: Hacker News

The content discusses a minor change to the comments section of a website that no longer includes pop-up links. It questions whether this adjustment addresses the issue of comments not appearing on permalinked posts, concluding that it appears not to help. The text also lists a variety of individuals and their associated fields, alongside humorous remarks and references to various personas, including a mix of political figures and creative professionals. Additionally, it encourages readers who may not appreciate the "Daniel Davies" website to remain open to other related content

Google releases Gemma 4 open models

Published: 2026-04-02 | Origin: Hacker News

The content discusses the capabilities of Gemma 4, a model designed for mobile and IoT devices as well as personal computers. It emphasizes the ability to create autonomous agents that can perform tasks using function calling, develop applications with advanced audio and visual capabilities, and offer multilingual support that understands cultural nuances. Users can enhance performance by training Gemma with preferred frameworks and run models on their own hardware for efficient deployment. The models have been rigorously evaluated against various data sets to ensure quality, and they adhere

Decisions that eroded trust in Azure – by a former Azure Core engineer

Published: 2026-04-02 | Origin: Hacker News

The article begins a series discussing a significant misstep by Microsoft that nearly cost them OpenAI, their largest customer, as well as the trust of the US government. The author, who joined Azure Core on May 1, 2023, brings a wealth of experience to the role, having been involved with Azure since its inception in 2010 and having held various positions at Microsoft, including work on Windows, SharePoint Online, and core operating system technologies. The author has also played a key

Bringing Clojure programming to Enterprise

Published: 2026-04-02 | Origin: /r/programming

The blog post discusses the author's decision to use Clojure, a dialect of LISP, for developing a reference data system in the manufacturing domain. Initially skeptical about moving away from standard development languages like Java, the author came to appreciate Clojure's advantages, including its dynamic functional programming features and immutable data structures. Clojure runs on the Java Virtual Machine, providing a rich ecosystem of libraries and tools that facilitate complex data manipulation. Despite being created in 2007 and often regarded as a

Qwen3.6-Plus: Towards real world agents

Published: 2026-04-02 | Origin: Hacker News

Of course! Please provide the content you'd like summarized.

Tried to buy a pint, Finding a Trojan: My First Malware Analysis

Published: 2026-04-02 | Origin: /r/programming

The author recounts an experience of trying to access a trendy bar's website, which redirected them to a suspicious page resembling Cloudflare. When they attempted to verify access, a pop-up copied something to their clipboard, prompting concern about its legitimacy. As a Linux user, the author was safe from executing the script but became intrigued by its workings. They analyze a portion of the script, explaining how it manipulates characters and applies a mathematical operation (XOR) to decode a ciphertext using a specified key

How do you handle calendar functionality in your Rails apps?

Published: 2026-04-02 | Origin: /r/ruby

Failed to fetch content - HTTP Error - Failed to open TCP connection to :80 (Connection refused - connect(2) for nil port 80)

What Would You See Changed in Haskell?

Published: 2026-04-02 | Origin: /r/programming

The report summarizes responses to Question 77 from the State of Haskell Survey 2025, which received 553 diverse answers in terms of clarity and relevance. A team conducted both quantitative and qualitative analyses to identify trends and suggestions from the Haskell community. They aimed to understand the context behind responses while being considerate of participants' efforts. Key findings include a strong recommendation to replace the String type with Text for handling textual data, as current practices often lead to confusion and frustration among users. Additionally, there

Learning API Styles • Lukasz Dynowski & Sam Newman

Published: 2026-04-02 | Origin: /r/programming

Sure! Please provide the content that you would like me to summarize.

Beyond the README: Enforcing Application Guardrails at Runtime

Published: 2026-04-02 | Origin: /r/programming

The content discusses the challenges of executing actions in a development environment, particularly when testing new features. It highlights issues that arise when test notifications accidentally reach real customers, indicating a failure in application safeguards. In standard imperative programming, the action of sending notifications is immediate and inseparable from the decision to do so, lacking a mechanism to intercept misuse. To address this, the text proposes an "Effect System," which advocates treating actions such as sending an SMS or writing to a database as descriptors rather than immediate commands

Packaging 128 languages with Nix

Published: 2026-04-02 | Origin: /r/programming

The content discusses the "quine-relay" project by @mame, which creates a unique "uroboros" quine that translates code through 128 programming languages, ultimately returning to the original Ruby code. While this project is impressive, users have encountered difficulties reproducing it due to issues with the Docker build, particularly for non-Ubuntu operating systems. To alleviate this, an idea from 2021 was revisited: packaging the quine with Nix for easier invocation.

New StackOverflow website looks more like Reddit

Published: 2026-04-02 | Origin: /r/programming

Failed to fetch content - HTTP Status - 403

Why full-stack post-quantum cryptography cannot wait

Published: 2026-04-02 | Origin: /r/programming

At Cisco Live 2026 in Amsterdam, Cisco unveiled the industry’s first full-stack post-quantum cryptography (PQC) architecture, aimed at addressing the security risks posed by quantum computing as enterprises modernize their networks. This architecture implements quantum-safe cryptography at all network layers, using NIST-approved algorithms to ensure device integrity and protect data in transit. Traditional cryptographic methods, such as RSA and Elliptic Curve Cryptography (ECC), remain secure against classical computing but are vulnerable