News Nug
Your Code is Worthless

Published: 2026-04-04 | Origin: /r/programming

The individual is a Principal Software Engineer with a strong passion for technology and automation, showing a keen interest in understanding how systems operate.

Gold overtakes U.S. Treasuries as the largest foreign reserve asset

Published: 2026-04-04 | Origin: Hacker News

In 2026, gold has surpassed U.S. Treasuries to become the world's largest foreign reserve asset, with central banks holding nearly $4 trillion worth. This shift, driven by record gold purchases and a price surge above $4,500 per ounce in 2025, has resulted in official gold reserves reaching approximately 36,000 metric tons. Consequently, the value of gold now exceeds that of foreign-held U.S. Treasuries.

Delve removed from Y Combinator

Published: 2026-04-04 | Origin: Hacker News

Failed to fetch content - HTTP Status - 404

How To Write Unmaintainable Code (1999)

Published: 2026-04-04 | Origin: /r/programming

The essay humorously outlines strategies for writing deliberately complicated Java code to ensure that future maintainers struggle to make even minor changes. By employing techniques that obscure the code's structure and meaning, such as intentionally confusing naming conventions and using unrelated constants, the author suggests that programmers can create a work environment where they are irreplaceable due to the difficulty others would face in understanding their code. The author uses the metaphor of viewing code through a toilet paper roll to emphasize the limited perspective of maintainers, encouraging practices

Tell HN: Anthropic no longer allowing Claude Code subscriptions to use OpenClaw

Published: 2026-04-03 | Origin: Hacker News

Starting April 4 at 12 PM PT / 8 PM BST, Claude subscription limits will no longer apply to third-party harnesses like OpenClaw. Users can still access their Claude accounts but will need to enable extra usage for a pay-as-you-go fee. The subscription continues to cover all Claude products. To ease the transition, Anthropic is offering a one-time credit equal to the monthly subscription price and discounts on pre-purchased bundles of extra usage. The changes are intended to manage system

Run Linux containers on Android, no root required

Published: 2026-04-03 | Origin: Hacker News

The content describes Podroid, an application that allows users to run Linux containers on Android devices without the need for root access. It creates a lightweight Alpine Linux virtual machine (VM) using QEMU and provides a working Podman container runtime along with a built-in serial terminal powered by Termux's TerminalView. Key features include: - A terminal with full VT100/xterm emulation and extra keys for navigation. - The capability to forward ports from the VM to the Android device, with rules

The house is a work of art: Frank Lloyd Wright

Published: 2026-04-03 | Origin: Hacker News

Failed to fetch content - HTTP Status - 429

PostgresBench: A Reproducible Benchmark for Postgres Services

Published: 2026-04-03 | Origin: /r/programming

The content discusses the focus on building high-performance systems, highlighting ClickHouse as an example where performance is a core design goal. It emphasizes a similar approach in developing a managed Postgres service, engineered to be one of the fastest available. ClickHouse and Postgres together create a unified data stack suitable for SaaS and AI applications. To compare managed Postgres services, the authors created PostgresBench, utilizing a transparent and reproducible benchmarking methodology akin to ClickBench, which benchmarks over 40 databases

Artemis II crew take “spectacular” image of Earth

Published: 2026-04-03 | Origin: Hacker News

NASA has released the first high-resolution images of Earth taken by the crew of Artemis II during their mission around the Moon. Commander Reid Wiseman captured these images after the team completed a trans-lunar injection burn, setting them on a path to the Moon. One of the images, dubbed "Hello, World," shows the Atlantic Ocean with the Earth appearing upside down, featuring the western Sahara and the Iberian Peninsula on the left and eastern South America on the right, with Venus visible in the screenshot.

Someone is actively publishing malicious packages targeting the Strapi plugin ecosystem right now

Published: 2026-04-03 | Origin: /r/programming

The content outlines a comprehensive security strategy for managing dependencies in software development, particularly focusing on AI coding agents. Key points include: - Scanning and governing dependencies during pull requests and builds. - Blocking malicious packages before they can enter the codebase during installation. - Generating AI-enhanced Bill of Materials (BOMs) using concrete code evidence, not just manifests. - Monitoring all actions taken by AI coding agents. - Maintaining visibility of all AI tools and SDKs in the organization to prevent blind

iNaturalist

Published: 2026-04-03 | Origin: Hacker News

The content encourages individuals to explore and document their observations of the natural world, contributing to biodiversity science. Users can record their findings, share with fellow naturalists, and discuss their observations, which are then shared with scientific data repositories like the Global Biodiversity Information Facility. The initiative allows users to track encounters with various species, connect with experts, and participate in or create projects related to biodiversity. Additionally, it promotes community engagement through events and discussions among naturalists. Mobile apps are available for easy observation,

OpenClaw privilege escalation vulnerability

Published: 2026-04-03 | Origin: Hacker News

The content discusses a potential security issue and redirects users to the official NVD (National Vulnerability Database) website, which requires JavaScript for full functionality. It emphasizes that .gov websites are official U.S. government sites and should be securely accessed via HTTPS. The NVD Dashboard provides various resources and tools including news updates, statistics, and vulnerability searches, along with references to different versions of the CVSS (Common Vulnerability Scoring System) calculators and other related topics. Additionally, it mentions a

Where is every byte?

Published: 2026-04-03 | Origin: /r/programming

The author investigated memory spikes in a Node.js server and streamlined the exploration by analyzing a simpler Python HTTP server using `python3 -m http.server`. Initially consuming 19 MiB of resident memory, the author examined the kernel's `/proc/pid/maps`, which details the virtual memory regions allocated to processes. Each line in this file shows a memory address range, permissions, an offset, a device ID, an inode, and sometimes a filename. An example line from the mappings was broken down:

Using CEL's now() to enforce dependency cooldown periods - block packages published in the last N hours

Published: 2026-04-03 | Origin: /r/programming

The content outlines a security workflow for managing dependencies and mitigating risks from malicious packages in software development. Key features include: - Scanning and governing dependencies for every pull request (PR) and build. - Blocking malicious packages at the time of installation to prevent them from entering the codebase. - Generating Bill of Materials (BOMs) that are enriched with AI insights based on actual code evidence rather than just manifest data. - Monitoring actions taken by AI coding agents across projects and workflows. - Ens

Building DNS query tool from scratch using C

Published: 2026-04-03 | Origin: /r/programming

Failed to fetch content - HTTP Status - 403

Idiomatic Lisp and the nbody benchmark

Published: 2026-04-03 | Origin: /r/programming

The excerpt discusses the philosophy among Lisp programmers of adapting the language to fit specific problems rather than forcing problems to fit within the constraints of Lisp. The author seeks a concrete example of this philosophy in action and highlights an interaction between prominent Lisp programmer @Ngnghm and a new language, Koru, represented by @korulang. The discussion centered around the performance of Lisp in comparison to C, particularly in the context of a benchmark called the "nbody" benchmark. @korulang suggested using this benchmark

Post Mortem: axios NPM supply chain compromise

Published: 2026-04-03 | Origin: Hacker News

On March 31, 2026, two malicious versions of the axios library (1.14.1 and 0.30.4) were published to the npm registry via a compromised account, introducing a dependency known as [email protected], which installed a remote access trojan on various operating systems. These versions were available for approximately three hours before being removed. Users are advised to check their lockfiles and treat any compromised machines accordingly, especially if they installed

How to build .NET obfuscator - Part I

Published: 2026-04-02 | Origin: /r/programming

The content discusses a series on building .NET obfuscators, emphasizing the techniques relevant to C#. It suggests that readers should have a basic understanding of C#, the ECMA-335 specification, and the dnlib library for metadata modification. Familiarity with stack virtual machines and IL opcodes is also recommended, and a cheatsheet is provided for essential instructions related to stack operations, comparisons, and method calls. The author notes that .NET metadata can be likened to database tables and mentions a tool

Towards an Amicable Resolution with Ruby Central

Published: 2026-04-02 | Origin: /r/ruby

On April 2, 2026, three members of Ruby Central's board released statements regarding RubyGems and Bundler. They published an incident report detailing last year's events and announced the completion of a third audit of RubyGems.org's infrastructure, which found no evidence of compromised user data or service integrity. The board acknowledged their communication failures with former maintainers that contributed to confusion and frustration within the community. They expressed a commitment to resolve disputes amicably. The former maintainer declared a

Sidekiq to Temporal: a zero-downtime migration strategy

Published: 2026-04-02 | Origin: /r/ruby

FireHydrant, recently acquired by Freshworks, is an incident management platform that focuses on helping businesses improve their response to incidents and operational reliability. Key features include quickstart guides, integrations with various tools, comprehensive documentation, an API reference for programmatic interaction, and customer stories highlighting successful incident management. Their blog offers insights on incidents and reliability, while guides and events provide best practices. The platform has evolved its runbook automation, enabling customers to manage incidents more effectively and efficiently. FireHydrant uses