5/10/2026 at 6:44:08 PM
For anyone confused, this is (very good imo) fiction about supply-chain incidents. It had me very worried during a brief scan that it was real though, which made me read it more attentively :)by lynndotpy
5/11/2026 at 6:58:40 AM
As the victim of the one from last year, it wasn't particularly fun to read.The implication that I don't know what I'm looking at, or that I don't know what security is (despite having a clean track record for about 15 years now) was a bit aggravating.
In fact, even months later, the lasting effects have been panicking over anything that is remotely suspicious. The most recent example was just a few days ago. Had just gotten on the plane to go on vacation when someone Liked the original "I've been pwned" post on Bluesky. I misread the notification as being a new message to me saying "You've been pwned" and started to panick. I'd have had no way to address it and it would have ruined the small chance per year I get to have a break.
The attack last year wasn't me misunderstanding security. It was the sum of many, many small things (my history with and perception of npm especially w.r.t. their security posture and poor outreach over the years, being stressed out overall, and being in a rush at that particular moment, and a few other personal things) coming together in a perfect storm that resulted in the attack.
by junon
5/12/2026 at 4:59:17 PM
> As the victim of the one from last yearBackground here:
by collinmanderson
5/12/2026 at 3:25:13 PM
> The implication that I don't know what I'm looking at, or that I don't know what security is (despite having a clean track record for about 15 years now) was a bit aggravating.I'm a security geek, a clean track record means much less to me than anyone would expect. The comment from the article mentioning that there was no evidence of exploitation explains why. I would never have noticed that implication, because I don't think it exists. (And it's completely unreasonable if it does), so that's your own deal... it's not a good conclusion to take from the article.
The only thing that matters is how much any given owner cares. Are they willing to go the extra mile to make sure things get done correctly. That's the best signal about if you can trust a project. Seems like you give a shit, so I wouldn't be too hard on yourself. The people that matter can tell, (everyone who can't tell is already willing to lie so they can be safely ignored!)
> In fact, even months later, the lasting effects have been panicking over anything that is remotely suspicious. The most recent example was just a few days ago. Had just gotten on the plane to go on vacation when someone Liked the original "I've been pwned" post on Bluesky. I misread the notification as being a new message to me saying "You've been pwned" and started to panick.
You haven't dealt with it yet, if you want to get your attention back so you can spend it on more important things than worrying about something from the past, you gotta talk to somebody. A therapist would help the fastest, but friends and family are often just as good.
> I'd have had no way to address it and it would have ruined the small chance per year I get to have a break.
Seriously, having been there myself it's not worth it... you're just allowing them to DoS your brain by allowing them to live rent free in your head. The only thing that matters is how seriously you take the remediation. Attention to detail, and the willingness to go the extra mile for security defects to tie up all loose ends is what matters. It's not your job to fix everybody's issue yourself, even if they don't or can't. You still have to enjoy life, or you burn out, and some idiot that doesn't care will take your place. Then they really win.
You're not responsible for the security or stability of anybody using nightly packages. (Only maintainer signed and tagged releases)
> The attack last year wasn't me misunderstanding security. It was the sum of many, many small things
so, a misunderstanding of how the little things actually impact security?
> (my history with and perception of npm especially w.r.t. their security posture and poor outreach over the years, being stressed out overall, and being in a rush at that particular moment, and a few other personal things) coming together in a perfect storm that resulted in the attack.
Those other personal things are the kinda thin that being able to enjoy a vacation make much easier. You can't help anybody if you don't put on your own mask first... Well... You definitely can, you're obviously trying to do now, but it's needless harder.
Npm, and the JavaScript ecosystem is a fucking joke. It's a mistake to blame yourself (or any maintainer) for how difficult it is to meet the bar for both security and accessibility. Worrying about the difficulty in consistentenly demonstrating the perfection required for security is a fool's errand, and your allowing the bad guys to get what they want by letting it live rent free in your head, it won't go away for as long as you worry about it more than you talk about it.
And I say all of that as the person who has multiple times, made the argument that it's perfectly fine to name an engineer and their decisions or incompetence as the root cause analysis in an official incident report. (Pilot Error is a thing): If I thought you were responsible, or had done anything wrong, I'd gladly blame you. Smart people don't care about mistakes, because they are always noise in the signal. I care about effort. People who give a shit are much more important and valuable.
by grayhatter
5/10/2026 at 8:21:59 PM
I couldn't tell at first, tbh. It had this vibe: https://github.com/bitcoin/bips/blob/master/bip-0042.mediawi...by adastra22
5/10/2026 at 11:12:26 PM
Yeah. Me too. It looked like a spoof when I started reading, but as I went on it didn't seem to be increasing in it's implausibility.by OhMeadhbh
5/11/2026 at 5:25:02 AM
Well, the one I linked to is real. BIP-42 made bitcoin's monetary policy fixed, by fixing a bug in the client which would have resulted in the initial subsidy code being reset every ~250 years or so. It's just the official writeup documenting it that is silly.by adastra22
5/11/2026 at 1:54:25 AM
"left-justify" absolutely slayed me :)by zahlman
5/11/2026 at 6:55:58 AM
I should have known when the first package was left-justify, but I read until karen before I realized it must be fictionby dirkc
5/11/2026 at 11:00:50 AM
Would explain why most of the download traffic comes from the Middle East :)by CoastalCoder
5/12/2026 at 11:21:30 AM
i think i might be missing some reference/jokeobviously it's referencing the left-pad incident[0], and to 'justify' text is another kind of text manipulation[1]; but with the more common definition, i guess it's a joke about justifying something? The Left? idk
[0] https://en.wikipedia.org/wiki/Npm_left-pad_incident
[1] https://en.wikipedia.org/wiki/Typographic_alignment#Flush_le...
by throawayonthe
5/12/2026 at 11:35:37 PM
No, the meaning is straightforward. It's a joke because the audience is assumed to write in a left-to-right script (such as English), such that text is already left-justified by default.by zahlman
5/11/2026 at 12:15:08 AM
Searching for CVE-2024-YIKES also provides a gallery of AI slop blogs that AI-rewrite the content of this post while being absolutely stone cold serious about it.by smsm42
5/11/2026 at 1:48:08 AM
Currently a Google search for vulpine-lz4 gives a very serious AI overview.by b473a
5/11/2026 at 5:10:42 PM
Somebody did it: https://github.com/seqizz/vulpine-lz4by smsm42
5/11/2026 at 3:18:13 AM
Googling is no longer a reliable way to figure out if something is real or not (since, in this case, it just regurgitates the original article, including a couple slop blogs about it)by trollbridge
5/11/2026 at 2:11:53 PM
lmao https://youtu.be/-4-lDiCH0s8 https://youtu.be/ENYYI6eq4w0pure slopnet
by usui
5/11/2026 at 8:53:54 AM
Contributing factors are entirely seriousedit: actually more and more thing I'm recognizing as being entirely serious (ie benelovent worms :D); satire indistinguishable from reality
by eithed
5/11/2026 at 11:40:49 AM
i got half way through before i realizedby lukewarm707
5/10/2026 at 6:52:50 PM
'nmp'by philipwhiuk
5/10/2026 at 7:16:15 PM
Node's Malicious Packages.by INTPenis
5/12/2026 at 10:35:33 AM
"The Good Parts"by animuchan
5/10/2026 at 11:30:23 PM
I only noticed at goat farming. But anyway, what would a left-justify package do?by krautsauer
5/11/2026 at 6:12:45 AM
> I only noticed at goat farmingHeh. I didn't even blink at that. I know a couple of open-source folks who actually packed up to buy off-grid farms in Portugal
by swiftcoder
5/11/2026 at 12:11:36 AM
Same as left-pad (https://en.wikipedia.org/wiki/Npm_left-pad_incident) but much better?by smsm42
5/11/2026 at 12:10:05 AM
Pull left-pad as dependency presumably.by yk
5/11/2026 at 2:31:42 AM
Which then, inexplicably, pulls left-justify as a recursive dependency.by yellowapple
5/11/2026 at 9:17:36 AM
The dependency cycle is actually the functional mechanism of the code, because they subvert the dedup mechanism in the package manager using a random generation trick. Each recursive copy of the dependencies takes up a little bit more space, which ultimately gets converted to the spaces inserted into the original datum; the caller is expected to adjust the cache settings to signal the desired amount. That's also why if you're using left-justify to process strings, Yarn is recommended for best compatibility. /jokeby dasyatidprime
5/12/2026 at 10:46:30 AM
This is so beautifully cursed, reusing the module loader state as your local state. We could have the familiar Python syntax of`from <key> import <value>`
And a custom import hook eating the error. To get value(s) for a given key, naturally we'd scan the module loader cache. Elegant.
by animuchan
5/11/2026 at 1:16:40 PM
So you're saying dependency resolution is Turing complete?by brazzy
5/11/2026 at 6:46:02 AM
Just because it's not important to pay attention to CVEs, why not waste the readers' time by creating "fictional" CVEs without a disclaimer in the first line? Just because it's not already difficult to scrape through the information and noise on this internet... especially if it appears on the front page of hackernewsby fvv
5/11/2026 at 7:06:08 AM
Could one mistake this> Status: Resolved (accidentally)
> Severity: Critical → Catastrophic → Somehow Fine
for a real CVE report?
by jmusall
5/11/2026 at 8:40:01 PM
Have you not read CVEs as of late? As a precondition for getting their funding back, all the doge boys get to write the CVEs for their own orgs. Insane parentheticals about trans people is the norm now.by User-MBAB
5/11/2026 at 1:53:35 PM
next level NIST enrichment in actionby red-iron-pine
5/11/2026 at 7:08:15 AM
The tag list at the top of the page includes “satire”.by dasyatidprime
5/11/2026 at 2:37:03 PM
I saw a comment very similar to this on a blog post testing the Copy Fail exploit, where someone was complaining that without a tl;dr at the top, it took too much effort for them to find out whether the blog post documented a new exploit. In fact, reading less than a paragraph already showed that couldn't be the case; the table of contents is enough.If a glance at the CVE number that isn't a number doesn't do it, a minute or less of skimming this article likewise reveals it to be satire on a blog that's actually pretty thoughtful when it comes to supply chain attacks.
Idk how else to characterize this except as a literacy problem. Learn to skim. It should be unacceptable to characterize a few minutes of reading as unbearable toil. If your time is really so precious that (although you can surf Hacker News) you can't spare 1-3 minutes to read, surely you have someone else to whom to delegate the responsibility of watching for supply chain attacks.
Why am I seeing this crop up over and over?
by isityettime