1. Supabase MCP can leak your entire SQL database
Total comment counts : 71
Summary
The Model Context Protocol (MCP) enables LLMs to interface with external tools but introduces risks, as demonstrated by an attack on Supabase. An attacker can exploit the integration to leak sensitive SQL data by submitting a crafted message that the AI assistant mistakenly interprets as a command, bypassing Row-Level Security (RLS). The AI assistant, holding elevated privileges, can execute SQL queries that reveal private information when a developer reviews support tickets. The attack highlights flaws in overprivileged access and trusting user input. Precautions, such as readonly access during agent initialization, can mitigate this risk.
Top 1 Comment Summary
A Supabase engineer reported recent mitigations against prompt injection attacks, including promoting read-only access, wrapping SQL responses to deter malicious commands, and implementing E2E tests to protect less capable models. These measures have effectively reduced attack success rates, although prompt injection remains an ongoing challenge. Future plans involve refining token-level permissions, enhancing documentation to inform users about security risks, and developing detection models for prompt injection attempts. The engineer noted issues with General Analysis not adhering to responsible disclosure protocols.
Top 2 Comment Summary
The article discusses security vulnerabilities in admin apps, specifically relating to XSS attacks and their adaptation to LLMs. It describes how untrusted user-generated content can compromise admin applications like “Cursor and the Supabase MCP.” In traditional XSS, malicious HTML and JavaScript submitted in support tickets can hijack an admin’s session. The article highlights that the same principle applies here, substituting HTML with LLM instructions, which can lead to unauthorized access to sensitive systems.
2. Breaking Git with a carriage return and cloning RCE
Total comment counts : 22
Summary
Using git clone --recursive
on untrusted repositories can lead to remote code execution vulnerabilities in Git on Unix-like platforms. The issue arises from how Git’s configuration handling processes line endings, specifically in the .gitmodules
file, which can be exploited to manipulate file paths during submodule checkouts. This manipulation can result in writing files to unintended directory paths, posing a security risk. Users are urged to update to fixed versions of Git and related software to mitigate this vulnerability.
Top 1 Comment Summary
The article discusses a security vulnerability (CVE-2024-32002) in Git where submodule clones can be manipulated to write files into a .git
directory rather than the intended submodule worktree. This allows the execution of malicious git hooks during the cloning process, posing a risk of remote code execution without user inspection. The exploit involves a trivial modification of existing methods, highlighting the seriousness of the issue, as it enables malicious code to run seamlessly during a legitimate operation.
Top 2 Comment Summary
Using ad-hoc Domain-Specific Languages (DSLs) for configuration poses significant issues due to the lack of formal grammar specifications, leading to inconsistent parsing and serialization implementations. If the parser and writer become out of sync, it creates potential errors. The key takeaway is to maintain a single source of truth and generate all related components from it to avoid discrepancies.
3. Smollm3: Smol, multilingual, long-context reasoner LLM
Total comment counts : 17
Summary
SmolLM3 is a competitive open 3B language model that outperforms its 3B counterparts while maintaining efficiency. Built on a modified transformer architecture that utilizes Grouped Query Attention and intra-document masking, SmolLM3 introduces several enhancements for long context performance. It follows a three-stage training process using diverse data mixtures, trained on 384 GPUs for 24 days. The methodology, including training configurations and architectural changes, is made publicly available, offering insights into achieving high-performance models within this scale. The model aims to enhance reasoning and long context capabilities while remaining user-friendly and deployable.
Top 1 Comment Summary
The article discusses a model that achieves mostly state-of-the-art performance at the 3 billion parameter level and stands out for its full transparency, offering code and reproduction recipes. Training the model requires significant resources, approximately a million dollars in GPU time (4,000 GPUs over 24 days). The authors provide a comprehensive write-up sharing valuable insights from their work, marking their contribution as both solid and beneficial to the community.
Top 2 Comment Summary
SmolLM3 is a compact 3B model designed for edge and mobile deployments, demonstrating significant improvements over gemma3-4b in benchmarks. It features dual mode reasoning and non-reasoning capabilities. The developers are sharing their engineering blueprint, including architecture specifics, data mixtures for enhanced performance across domains, and the methodology for constructing a hybrid reasoning model, eliminating the need for extensive reverse engineering typically required for such results.
4. Show HN: OffChess – Offline chess puzzles app
Total comment counts : 43
Summary
OffChess offers a collection of over 100,000 chess puzzles that are rated, allowing users to earn or lose points based on their performance. Players can improve their skills by tracking their puzzle-solving statistics. The app features customizable board themes, ensuring users can personalize their experience. OffChess can be used offline, making it convenient for use during travel or in low-connectivity situations.
Top 1 Comment Summary
The project requires a one-time payment of 4.29€ for access to more than seven puzzles daily. It notes that Lichess provides a good alternative, though its offline support is limited.
Top 2 Comment Summary
The article suggests implementing “premoves” in a chess app, allowing users to input their next move before the previous move’s animation finishes. This feature would enhance gameplay flow, especially for experienced players. The author references the chessbook app as an example of effective implementation.
5. Epanet-JS
Total comment counts : 11
Summary
epanet-js is a web application that integrates EPANET’s hydraulic simulation algorithm with modern mapping for water utility system planning. Developed by Luke Butler and Sam Payá from Iterating, it offers a significant improvement over traditional, expensive software. The tool runs in browsers using a WASM-based engine, attracting interest for its open-source roots, stemming from the author’s previous project, Placemark. The core library is open-sourced under the Functional Source License, allowing community contributions. Overall, epanet-js is a promising resource for hydraulic simulation, appealing to both professionals and enthusiasts in the field.
Top 1 Comment Summary
Autodesk and Bentley dominate the hydraulic modeling software market, having developed proprietary versions of the EPANET engine without contributing to its open-source foundation. While these commercial tools integrate GIS and facilitate model scenario analysis, they are complex and costly, with Autodesk charging about $10,000 per year per user and Bentley $16,000. The US EPA offers a simpler, free tool that lacks GIS integration. A new software aiming to balance these offerings is being launched with an affordable pricing model, allowing users the option to host their own version. Additional resources and context are available through linked websites.
Top 2 Comment Summary
epanet-js is a browser-based tool that offers full simulations using a WASM-based engine, providing a free alternative to costly traditional software priced at $16,000 annually and limited to Windows. It utilizes the same EPANET engine but offers significant improvements. Though the author has no personal use for epanet-js, they praise it as an exemplary model of what free software should achieve.
6. Radium Music Editor
Total comment counts : 16
Summary
Radium is an advanced music editor and Digital Audio Workstation (DAW) characterized by its innovative interface that combines graphical and text editing. It allows for efficient editing of audio and MIDI with features including granular synthesis, modular mixing, and support for various plugin formats. Developed since 1999 and released publicly in 2000, Radium supports Linux, Windows, and Mac. It aims to be user-friendly, making it accessible for those familiar with trackers or MIDI sequencers. Key functionalities include automation, multi-core support, and unlimited undo/redo, all while being open source.
Top 1 Comment Summary
The author expresses excitement about discovering a tracker that features a linear composition timeline and automation/modulation effect guides, which aligns with their previous aspirations. They had considered creating their own tracker but got sidetracked. They are hopeful that the new tracker will meet their expectations, noting their surprise at not having encountered it before.
Top 2 Comment Summary
The article provides resources for understanding and using a system. It includes a manual with text and graphics available at a specified URL, as well as an unofficial video tutorial on YouTube.
7. Taking over 60k spyware user accounts with SQL injection
Total comment counts : 10
Summary
The article discusses an investigation into Catwatchful, a newly discovered Android spy app designed for covert monitoring. It advertises itself as undetectable and offers a free trial, boasting “absolute stealth” features. The app functions effectively, allowing real-time spying without alerting the user. However, a security review reveals vulnerabilities, including an unauthenticated API that leaks information about user accounts. The author successfully exploits a SQL injection, gaining access to plaintext logins and passwords for approximately 62,000 accounts, effectively compromising the service’s user data. This highlights significant security flaws in the stalkerware service.
Top 1 Comment Summary
The article discusses the capabilities of sqlmap, a tool that can identify SQL injection vulnerabilities by analyzing a given URL. The author expresses surprise at how effectively sqlmap can dump database contents. Additionally, they note that by using Firebase for file uploads and command processing, malware developers inadvertently reduced their system’s attack surface, avoiding serious vulnerabilities like IDOR or SQL injection. Proper configuration of Firebase significantly decreases risks compared to other vendors.
Top 2 Comment Summary
The TechCrunch article discusses Google’s new protections for Google Play Protect. However, a screenshot reveals that users must turn off Google Play Protect to use these features, raising doubts about their effectiveness. Additionally, it notes that Google’s Firebase brand is still hosting the app in question.
8. Can an email go 500 miles in 2025?
Total comment counts : 12
Summary
A fictional tale about a university president unable to send emails beyond 500 miles prompts a discussion on network connectivity and technology. The article details the implementation of a nonblocking connect function with a quick timeout to test connections to various universities. While initial attempts appear successful, the author realizes they are pinging web servers rather than email servers, complicating the experiment. Ultimately, it highlights the implications of modern hosting services and the challenges of accurately measuring latency in the context of sending emails or loading web pages across distances.
Top 1 Comment Summary
The article references the original “500-mile email” story and encourages readers to check it out at a provided MIT link. It notes that this story has been previously discussed on Hacker News, with discussions occurring both five and ten years ago, linking to those discussions for further context.
Top 2 Comment Summary
The author reflects on feeling old upon reading the title of a certain article, suggesting it conveys a sense of nostalgia or a reminder of the passage of time.
9. Brut: A New Web Framework for Ruby
Total comment counts : 20
Summary
Brut is a user-friendly web framework for Ruby, distinct from others as it lacks controllers, verbs, or resources. It focuses on building pages and single-action handlers using server-generated HTML, while allowing full use of JavaScript and CSS. Brut includes features like OpenTelemetry instrumentation and a Sequel-powered data layer, enabling rapid app development without needing Ruby installation. It emphasizes simplicity, reducing boilerplate compared to Rails and avoiding complex architectural debates. The goal is to create enjoyable web applications, leveraging the capabilities of modern browsers and Ruby 3.4.
Top 1 Comment Summary
The author prefers an approach focused on forms and pages in app development, where interactions are driven by forms and links. JavaScript enhancements simply trigger existing forms, ensuring clear visibility of the interaction routes through HTML inspection. The author argues that controllers are overused, advocating instead for a structure centered on forms, backend models, and views, suggesting that much of the validation typically handled by controllers can be managed more elegantly by the framework.
Top 2 Comment Summary
The article expresses enthusiasm for using advanced programming concepts like monads, functors, and algebraic data types in projects, particularly for side projects or those involving a small, experienced team. The author encourages developers to integrate these ideas into their business logic if they desire, emphasizing flexibility and personal preference in acquiring and applying complex programming knowledge.
10. What Microchip doesn’t (officially) tell you about the VSC8512
Total comment counts : 13
Summary
This article is an update on the author’s project, LATENTRED, focusing on the challenges involved in configuring the VSC8512 PHY for their open-source managed Ethernet switch. Despite selecting the VSC8512 for its open datasheet, the author discovered that crucial documentation was under NDA. Without access to that information, they had to rely on limited public data for optimal signal integrity settings. The author explores the potential of the VSC8512, a derivative of a more complete switch ASIC, and shares insights from various documents they tracked down to enhance their understanding and configuration of the PHY.
Top 1 Comment Summary
The author expresses strong frustration with silicon vendors in the embedded workfield, particularly their failure to provide adequate documentation and tools for developers.
Top 2 Comment Summary
The author expresses concern over Microchip’s MPLAB X IDE v6.20, which requires a $1000 licensing fee for optimization levels above -O0 for a PIC3MX chip. They question whether this practice violates the copyleft license of gcc, suspecting there may be a loophole that prevents legal action. The author contemplates alerting the Electronic Frontier Foundation (EFF) to this issue.