Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. I wonder if this was made by AI or a shit programmer

I wonder if this was made by AI or a shit programmer

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
170 Posts 93 Posters 1 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • C [email protected]

    Disabling index and making the names UUID would make the directory inviolable even if the address was publicly available.

    V This user is from outside of this forum
    V This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #107

    Bet you could reuse/keep UUIDs for someone/stuff that gets updated and get that new data even if you "shouldn't".

    It could work in theory but in practice there are always a billion things that go wrong IMO.

    B 1 Reply Last reply
    0
    • F [email protected]

      while True:

      Jesus Christ

      mobotsar@sh.itjust.worksM This user is from outside of this forum
      mobotsar@sh.itjust.worksM This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #108

      There's nothing wrong with manually breaking a loop.

      F grrgyle@slrpnk.netG 2 Replies Last reply
      5
      • R [email protected]

        I can tell you exactly what happened. "Hey Claude, I need to configure and setup a DB with Firebase to store images from our application." and then promptly hit shift+tab and then went to go browse Reddit.

        nothing was tested. nothing was verified. They let the AI do its thing they checked in on it after an hour or so. once it was done it was add all, commit -m "done", push origin master. AI doesn't implement security stuff. there was zero security here.

        mobotsar@sh.itjust.worksM This user is from outside of this forum
        mobotsar@sh.itjust.worksM This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #109

        Shift + tab?

        R 1 Reply Last reply
        0
        • mobotsar@sh.itjust.worksM [email protected]

          There's nothing wrong with manually breaking a loop.

          F This user is from outside of this forum
          F This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #110

          There's nothing wrong with eating a banana with a knife and fork, either.

          Except living with the shame.

          B L 2 Replies Last reply
          5
          • lena@gregtech.euL [email protected]
            This post did not contain any content.
            R This user is from outside of this forum
            R This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #111

            This is hilarious

            1 Reply Last reply
            0
            • lena@gregtech.euL [email protected]
              This post did not contain any content.
              jackbydev@programming.devJ This user is from outside of this forum
              jackbydev@programming.devJ This user is from outside of this forum
              [email protected]
              wrote on last edited by [email protected]
              #112

              Hack has at least two definitions in a computing context.

              1. A nifty trick or shortcut that is useful. "Check out this hack to increase your productivity."
              2. Accessing something you shouldn't. "They hacked into the database."

              A lot of times they sort of get used in conjunction to describe interesting ways to gain access to secure systems, but using it to describe accessing insecure things you shouldn't is still a valid usage of the phrase.

              That said I definitely wanna see the company face charges for this, this is insane.

              spicehoarder@lemmy.zipS spacecowboy@lemmy.caS 2 Replies Last reply
              30
              • emilyistrans@lemmy.blahaj.zoneE [email protected]

                I absolutely despise Firebase Firestore (the database technology that was "hacked"). It's like a clarion call for amateur developers, especially low rate/skill contractors who clearly picked it not as part of a considered tech stack, but merely as the simplest and most lax hammer out there. Clearly even DynamoDB with an API gateway is too scary for some professionals. It almost always interfaces directly with clients/the internet without sufficient security rules preventing access to private information (or entire database deletion), and no real forethought as to ongoing maintenance and technical debt.

                A Firestore database facing the client directly on any serious project is a code smell in my opinion.

                meme_historian@lemmy.dbzer0.comM This user is from outside of this forum
                meme_historian@lemmy.dbzer0.comM This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #113

                Ah yes, Firebase.
                The Google version of leaking all your company data through a public S3 bucket

                I remember when they launched and started pushing it in the Android dev community.
                Actually won a Google Pixel at a Firebase sponsored hackathon in my town...after that I never touched Firestore again.
                Using that ACL language to restrict access, you could see the massive foot gun from a mile away

                1 Reply Last reply
                6
                • G [email protected]

                  Make a PR

                  A This user is from outside of this forum
                  A This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #114

                  Be the change you want to see in the world.

                  1 Reply Last reply
                  5
                  • D [email protected]

                    You've probably already made your Big Dumb Mistake, it just hasn't been triggered yet.

                    Or, you just weren't there any more when it triggered.

                    D This user is from outside of this forum
                    D This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #115

                    Most likely they never recognized that they fucked up. It was always other person fault.

                    1 Reply Last reply
                    2
                    • jackbydev@programming.devJ [email protected]

                      Hack has at least two definitions in a computing context.

                      1. A nifty trick or shortcut that is useful. "Check out this hack to increase your productivity."
                      2. Accessing something you shouldn't. "They hacked into the database."

                      A lot of times they sort of get used in conjunction to describe interesting ways to gain access to secure systems, but using it to describe accessing insecure things you shouldn't is still a valid usage of the phrase.

                      That said I definitely wanna see the company face charges for this, this is insane.

                      spicehoarder@lemmy.zipS This user is from outside of this forum
                      spicehoarder@lemmy.zipS This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #116

                      No, this was a data leak. The word "hack" has legal implications and shifts the blame away from the company and onto the individual who discovered the leak.

                      I jackbydev@programming.devJ 2 Replies Last reply
                      15
                      • F [email protected]

                        Aside from the fact that a strong enough supercomputer won't exist for decades, you're not limited by the speed of UUID generation. Even if you had an infinitely fast supercomputer, it wouldn't speed up your brute force attempts, since you're limited by the speed of the backend. Wherever Tea stores their images, that server has only a limited capacity for responding to requests, far less than the speed with which you can generate UUIDs. That's a hard cap - you won't try guesses faster than that.

                        B This user is from outside of this forum
                        B This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #117

                        Even assuming 0 latency on their backend, if you wanted to check each UUIDv4 value again their database during your lifetime, you would need to check 1.686 x 10^27 UUIDv4 per second for 100 years straight. Supercomputers are measured in exaflops, which is 10^18 operations per second, so even distributing the work across many machines, you would need about 1 billion of super computers to be able to have a chance of checking every UUIDv4 value within 100 years.

                        1 Reply Last reply
                        1
                        • spicehoarder@lemmy.zipS [email protected]

                          No, this was a data leak. The word "hack" has legal implications and shifts the blame away from the company and onto the individual who discovered the leak.

                          I This user is from outside of this forum
                          I This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #118

                          Based on this comment alone, I am 100% sure that you are not a lawyer.

                          spicehoarder@lemmy.zipS 1 Reply Last reply
                          4
                          • diplomjodler3@lemmy.worldD [email protected]

                            I always get irrationally angry when i see python code using os.path instead of pathlib. What is this, the nineties?

                            I This user is from outside of this forum
                            I This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #119

                            And what's with the string addition? Never heard of f-strings or even .format()?

                            1 Reply Last reply
                            3
                            • V [email protected]

                              Bet you could reuse/keep UUIDs for someone/stuff that gets updated and get that new data even if you "shouldn't".

                              It could work in theory but in practice there are always a billion things that go wrong IMO.

                              B This user is from outside of this forum
                              B This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #120

                              Not really sure what you mean by reusing UUIDs but theres nothing bad about using UUIDs in URLs for content you don't want scrapped by bots. Sites like Google Photos are already are using UUIDs in the URL for the photos, and do not require any authentication to see the image as long as you have the URL. You can try this for yourself and copy the URL of an image and open it in a Private Browsing Window. Every so often someone realizes the actual image URL is public and think they've found a serious issue, but the reason why it isn't is because of the massive key space UUID provides and that it would be infeasible to check every possible URL, even if it's publicly available.

                              V 1 Reply Last reply
                              0
                              • 01189998819991197253@infosec.pub0 [email protected]

                                Wow. It actually identified something?

                                W This user is from outside of this forum
                                W This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #121

                                It's good enough for corporate (with multiple other lines of defense).

                                1 Reply Last reply
                                0
                                • mobotsar@sh.itjust.worksM [email protected]

                                  There's nothing wrong with manually breaking a loop.

                                  grrgyle@slrpnk.netG This user is from outside of this forum
                                  grrgyle@slrpnk.netG This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #122

                                  An infinite loop used to be such a rank code smell back when I was a junior, specifically because I was a noob and made giant loops like 50 lines long and invariably didn't plan the exit condition right, and then my computer would lock up and I would have to hard power cycle.

                                  But yeah, now it's it's a totally acceptable little pattern imho.

                                  1 Reply Last reply
                                  2
                                  • lena@gregtech.euL [email protected]
                                    This post did not contain any content.
                                    grrgyle@slrpnk.netG This user is from outside of this forum
                                    grrgyle@slrpnk.netG This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #123

                                    What is the Tea hack?

                                    F 1 Reply Last reply
                                    8
                                    • D [email protected]

                                      Security by obscurity.

                                      vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                      vanilla_puddinfudge@infosec.pubV This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #124

                                      this man ssh'd in on a five-digit port

                                      1 Reply Last reply
                                      0
                                      • spicehoarder@lemmy.zipS [email protected]

                                        No, this was a data leak. The word "hack" has legal implications and shifts the blame away from the company and onto the individual who discovered the leak.

                                        jackbydev@programming.devJ This user is from outside of this forum
                                        jackbydev@programming.devJ This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #125

                                        It can be both. The company can be at fault for not keeping something secure while the people who steal the data are at fault for stealing data. Data leaks and hacks are not mutually exclusive.

                                        P 1 Reply Last reply
                                        5
                                        • F [email protected]

                                          There's nothing wrong with eating a banana with a knife and fork, either.

                                          Except living with the shame.

                                          B This user is from outside of this forum
                                          B This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #126

                                          Well these people probably don't wash their hands so knife fork is the most sanitary way.

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups