Kissaki

joined 2 years ago
MODERATOR OF
[–] Kissaki@programming.dev 2 points 1 day ago

Quite regularly, tbh.

4
submitted 1 day ago* (last edited 1 day ago) by Kissaki@programming.dev to c/dotnet@programming.dev
 

Today we are excited to announce the new NuGet.org Sponsorship feature which makes it easier than ever for consumers to recognize and support the authors behind their favorite packages.

Approved sponshorship platforms: GitHub Sponsors, Patreon, Open Collective, Ko-fi, Tidelift, Liberapay

[–] Kissaki@programming.dev 2 points 1 day ago

That’s a three year history of accessibility incompetence from the OpenAI team. From the same company asking authors to use ARIA to better slurp / steal their content.

💀

[–] Kissaki@programming.dev 0 points 1 day ago* (last edited 1 day ago)

Visual Studio provides some kind of AI even without Copilot.

Inline (single line) completions - I not always but regularly find quite useful

Repeated edits continuation - I haven't seen them in a while, but have use them on maybe two or three occasions. I am very selective about these because they're not deterministic like refractorings and quick actions, which I can be confident in correctness even when doing those across many files and lines. For example invert if changes many line indents; if an LLM does that change you can't be sure it didn't change any of those lines.

Multi-line completions/suggestions - I disabled those because it offsets/moves away the code and context I want to see around it, as well as noisy movement, for - in my limited experience - marginal if any use[fulness].

In my company we're still in selective testing phase regarding customer agreements and then source code integration into AI providers. My team is not part of that yet. So I don't have practical experience regarding any analysis, generating, or chat functionality with project context. I'm skeptical but somewhat interested.

I did do private projects, I guess one, a Nushell plugin in Rust, which is largely unfamiliar to me, and tried to make use of Copilot generating methods for me etc. It felt very messy and confusing. Generated code was often not correct or sound.

I use Phind and more recently more ChatGPT for research/search queries. I'm mindful of the type of queries I use and which provider or service I use. In general, I'm a friend of ref docs, which is the only definite source after all. I'm aware of and mindful of the environmental impact of indirectly costly free AI search/chat. Often, AI can have a quicker response to my questions than searching via search ending and on and in upstream docs. Especially when I am familiar with the tech, and can relatively quickly be reminded, or guide the AI when it responds bullshit or suboptimal or questionable stuff, or also relatively quickly disregard the entire AI when it doesn't seem capable to respond to what I am looking for.

[–] Kissaki@programming.dev 2 points 2 days ago (1 children)

demo login says invalid username or password. Is it possible someone changed the password on the demo account?

[–] Kissaki@programming.dev 8 points 2 days ago

The entire SDK is programmed in CMake! 😱

… okay, it's git submodules

submodules screenshot

[–] Kissaki@programming.dev 10 points 2 days ago (2 children)

cdrewind Rewind CDROMs before ejection.

lol wut

 

Alternative press article: https://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/

Identified extensions are mainly on OpenVSX - an alternative VS Code Extension Marketplace.

Update (Oct 19, 2025): A new infected extension detected in Microsoft's VSCode marketplace - still active.

Bleepingcomputer:

Microsoft has removed the malicious extension frrom its marketplace following the researchers' alert.

 

Alternative press article: https://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/

Identified extensions are mainly on OpenVSX - an alternative VS Code Extension Marketplace.

Update (Oct 19, 2025): A new infected extension detected in Microsoft's VSCode marketplace - still active.

Bleepingcomputer:

Microsoft has removed the malicious extension frrom its marketplace following the researchers' alert.

[–] Kissaki@programming.dev 3 points 2 days ago

One of the two associations is in power and actively dismantling society. The other develops a technical product and runs a Lemmy instance many people and other instances have blocked.

Handling or concluding them a bit differently seems quite fine to me.

That being said, I've seen plenty of Lemmy dev connection criticism on this platform. I can't say the same about FUTO.

[–] Kissaki@programming.dev 3 points 2 days ago

No Gotos, All Subs

That's sub-optimal

😏

[–] Kissaki@programming.dev 1 points 3 days ago* (last edited 3 days ago) (1 children)

I don't think Microsoft will hold your hand. It's the local IT or usage support.

In my eyes the main issue is the decision makers falling for familiarity and marketing/sales pushing.

Which makes it even more absurd/ironic that after the switch investment, they invest again into a switch into something that is not really better.

Either way, this time though, there's a lot more relevance and pressure to make a change, and a lasting change. The environment is not the same as before.

[–] Kissaki@programming.dev 1 points 3 days ago

I diffusely remember reading about two/twice. But I can't provide sources either.

[–] Kissaki@programming.dev 5 points 3 days ago

What is the vulnerability, what is the attack vector, and how does it work? The technical context from the linked source Edera

This vulnerability is a desynchronization flaw that allows an attacker to "smuggle" additional archive entries into TAR extractions. It occurs when processing nested TAR files that exhibit a specific mismatch between their PAX extended headers and ustar headers.

The flaw stems from the parser's inconsistent logic when determining file data boundaries:

  1. A file entry has both PAX and ustar headers.
  2. The PAX header correctly specifies the actual file size (size=X, e.g., 1MB).
  3. The ustar header incorrectly specifies zero size (size=0).
  4. The vulnerable tokio-tar parser incorrectly advances the stream position based on the ustar size (0 bytes) instead of the PAX size (X bytes).

By advancing 0 bytes, the parser fails to skip over the actual file data (which is a nested TAR archive) and immediately encounters the next valid TAR header located at the start of the nested archive. It then incorrectly interprets the inner archive's headers as legitimate entries belonging to the outer archive.

This leads to:

  • File overwriting attacks within extraction directories.
  • Supply chain attacks via build system and package manager exploitation.
  • Bill-of-materials (BOM) bypass for security scanning.
[–] Kissaki@programming.dev 3 points 3 days ago

The attack surface is the flaw. The chain of trust is the flaw/risk.

Who's behind the project? Who has control? How's the release handled? What are the risks and vulnerabilities of the entirely product delivery?

It's much more obvious and established/vetted with Mozilla. With any other fork product, you first have to evaluate it yourself.

 

This post marks the successful completion of my Google Summer of Code 2025 project: Complete Build Retooling of jenkins.io. Over the past months, we’ve transformed the Jenkins documentation infrastructure from legacy systems to a modern, performant, and well-organized platform.

4
submitted 1 week ago* (last edited 1 week ago) by Kissaki@programming.dev to c/dotnet@programming.dev
 

[…] We are announcing the .NET Security Group, a group of organizations that will collaborate on delivering security fixes to the broadest set of .NET users, simultaneously with Microsoft. We’re all better served by getting more deployments patched, quickly and predictably.

We’re believers in the concept of upstream open source projects. That includes sharing vulnerability information with other organizations that distribute .NET. We’ve done that with a small set of companies since 2016, starting with Red Hat. Members receive source patches prior to public disclosure so that binary packages can be built, validated, and published at the same time as Microsoft. Membership of this group has been private, by invitation only, and grew to include Canonical, IBM, Red Hat, and Microsoft. That’s how the .NET Security Group started.

We are expanding the program to enable organizations that ship their own distribution of .NET to have the same ability to better protect their users. By sharing information about vulnerabilities with trusted partners early, we hope to reduce the time between public disclosure of CVEs and when updates are available for distributions other than Microsoft’s. We believe this will help strengthen the security of the .NET ecosystem.

[…] Several Linux distributions do this, as do independent software vendors (across both Windows and Linux). In fact, we worked in collaboration with these same organizations to reduce the cost of building .NET, resulting in the dotnet/dotnet repo. We want it to be straightforward and low-cost to distribute security fixes to users.

More recently, other organizations came to us asking if they could get access to patches for their End-of-Life servicing businesses. These requests made us realize that it was time to publicize the .NET Security Group and better define its goals. Program members need to be active participants in the .NET upstream project and publish builds for supported .NET versions. Doing that demonstrates a strong commitment to the ecosystem and earned credibility to all participants.

 

This month you will find that these CVEs have been fixed:

CVE # Title Applies to
CVE-2025-55248 .NET Information Disclosure Vulnerability .NET 9.0, .NET 8.0
CVE-2025-55315 .NET Security Feature Bypass Vulnerability .NET 9.0, .NET 8.0
CVE-2025-55247 .NET Denial of Service Vulnerability .NET 9.0, .NET 8.0
CVE-2025-21176 .NET Remote Code Execution Vulnerability .NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8, 4.8.1
 

About Bun:

Bun is a fast, incrementally adoptable all-in-one JavaScript, TypeScript & JSX toolkit. Use individual tools like bun test or bun install in Node.js projects, or adopt the complete stack with a fast JavaScript runtime, bundler, test runner, and package manager built in. Bun aims for 100% Node.js compatibility.

1.3 release:

The highlights:

  • Full‑stack dev server (with hot reloading, browser -> terminal console logs) built into Bun.serve()
  • Builtin MySQL client, alongside our existing Postgres and SQLite clients
  • Builtin Redis client
  • Better routing, cookies, WebSockets, and HTTP ergonomics
  • Isolated installs, catalogs, minimumRelease, and more for workspaces
  • Many, many Node.js compatibility improvements
4
submitted 2 weeks ago* (last edited 2 weeks ago) by Kissaki@programming.dev to c/dotnet@programming.dev
 
  • GC: Garbage Collector manages the allocation and release of memory for your application
  • DATAS: Dynamic Adaptation To Application Sizes

In .NET 9 we enabled DATAS by default. But .NET 9 is not an LTS release so for many people they will be getting DATAS for the first time when they upgrade to .NET 10. This was a tough decision because GC features are usually the kind that don’t require user intervention — but DATAS is a bit different. That’s why this post is titled “preparing for” instead of just “what’s new” 😊.

I’ll talk about how we generally decide which performance features to add, why DATAS is so different from typical GC features, and the tuning changes introduced since my last DATAS blog post. I’ll also share two examples of how I tuned DATAS in first-party scenarios.

 

Interop 2025 is a cross-browser effort to improve the interoperability of the web — to reach a state where each technology works exactly the same in every browser.

The WPT Dashboard, wpt.fyi, displays results for the web-platform-tests, or WPT, which are a group of test suites for many web platform specifications.

I linked to the stable view. Experimental has much higher scores. (Hopefully stable soon? :))

view more: next ›