lemmy.net.au

46 readers
1 users here now

This instance is hosted in Sydney, Australia and Maintained by Australian administrators.

Feel free to create and/or Join communities for any topics that interest you!

Rules are very simple

Mobile apps

https://join-lemmy.org/apps

What is Lemmy?

Lemmy is a selfhosted social link aggregation and discussion platform. It is completely free and open, and not controlled by any company. This means that there is no advertising, tracking, or secret algorithms. Content is organized into communities, so it is easy to subscribe to topics that you are interested in, and ignore others. Voting is used to bring the most interesting items to the top.

Think of it as an opensource alternative to reddit!

founded 1 year ago
ADMINS
5326
5327
 
 

Trade MEPs punt a vote to implement the trade deal after Donald Trump sets new tariffs that they say violate the transatlantic accord.

The European Parliament froze ratification of the EU’s trade deal with the United States on Monday amid concerns that President Donald Trump’s latest tariff broadside breaches the terms of the transatlantic accord struck last summer.

Senior trade lawmakers pulled the emergency brake after the U.S. Supreme Court on Friday struck down the main tariffs on which the deal, reached at Trump’s Turnberry Scottish golf resort last July, had been based. Trump said on Saturday he would impose a global tariff of 15 percent under a new legal authority — triggering alarm across the bloc.

“The decision to postpone the vote on the implementation of the U.S. deal is the right one. Given the current enormous uncertainty, a vote would be unjustifiable,” said Anna Cavazzini, who represents the Greens.

MBFC
Archive

5328
 
 

Defense Secretary Pete Hegseth jokingly said any surge in takeout deliveries to the Pentagon — a phenomenon that has accurately predicted the start of major geopolitical events — could be him ordering pizza “just to throw everybody off.”

Asked about the “Pentagon Pizza Report,” an account on X that tracks activity at local pizza joints near the U.S. military hub, Hegseth said he was aware of the account.

“I’ve thought of just ordering lots of pizza on random nights just to throw everybody off,” he said Sunday on Fox News. “Some Friday night when you see a bunch of Dominos orders, it might just be me on an app, throwing the whole system off so we keep everybody off balance. We look at every indicator.”

5329
20
submitted 1 month ago* (last edited 1 month ago) by dil@hexbear.net to c/badposting@hexbear.net
 
 

With everything that's going on in the world, the only thing people seem to actually care about is getting me to apologize for party rocking.

Well I won't do it, consequences be damned. I'm going to be shuffling every day til I die. I'm sexy, and in my heart of hearts I know it.

If this is my last post, I just want to say that it has been a true honor party rocking with you all.

5330
5331
 
 

As first reported by the Nine newspapers, the home affairs minister, Tony Burke, is considering denying Zvi Yehezkeli’s visa into the country based on his previous inflammatory comments.

The TV journalist is due to appear at two events in Sydney and Melbourne in March, supported by the Australian Jewish Association (AJA) and other groups, alongside the former Israeli president Reuven Rivlin.

Yehezkeli, who works on Israeli TV channel i24 as an Arab affairs commentator, is no stranger to controversy in recent years. On air, he said that Israel should have responded to Palestinian militant group Hamas’ 7 October attack by killing 100,000 Gazans.

“I know that those 100,000 will not all be Hamas members,” he said, after estimating Hamas only had around 20,000 members in the besieged strip.

5332
 
 

The government in Tehran sees capitulating to Washington’s demands on uranium enrichment and ballistic missiles as riskier to its survival than going to war, analysts say.

Facing high-stakes brinkmanship as American warships and fighter jets mass off its shores, Iran has refused to concede to President Trump’s demands on its nuclear program and weapons — a stance that has bewildered U.S. officials.

The authoritarian clerics who rule Iran see those concessions — which, in their view, could compromise their core ideology and sovereignty — as a greater threat to their survival than the risk of war.

A dangerous mismatch in perceptions between Iran and the United States is why efforts to negotiate a deal over Iran’s nuclear and military capabilities look increasingly fragile, experts say, and a new regional conflict seems almost inevitable.

MBFC
Archive

5333
 
 

Israeli political commentator Rachel Gur said her son is refusing to study for his math test as he's certain that the exam is going to get canceled due to an Iran attack or counterattack.

"I told him a strike is unlikely before Wednesday," Gur said, adding that Wednesday is also the exam day.

5334
 
 

Trump suggests trade war could escalate as administration says it will stop collecting levies ruled illegal by supreme court

Donald Trump has declared that he can use tariffs in a “much more powerful and obnoxious way”, as the UK and the EU said they were seeking urgent clarity on the US trade deals they struck last summer.

Trump threatened to ramp up his global tariff war on Monday, after a supreme court ruling last week that he had overstepped his legal authority to impose his “liberation day” measures last year.

Keir Starmer’s spokesperson said he did not expect Trump’s new 15% global tariff – announced on Saturday – to affect the “majority” of a UK-US economic deal that was agreed last year.

However, it is still not clear if the new tariffs, collected from Tuesday, will be at the 10% rate on most goods agreed last May, the 15% rate, or customs default to pre-reciprocal day tariffs.

5335
5336
 
 

Hacker News.

Social media is going the way of alcohol, gambling, and other social sins: societies are deciding it’s no longer kids’ stuff. Lawmakers point to compulsive use, exposure to harmful content, and mounting concerns about adolescent mental health. So, many propose to set a minimum age, usually 13 or 16.

In cases when regulators demand real enforcement rather than symbolic rules, platforms run into a basic technical problem. The only way to prove that someone is old enough to use a site is to collect personal data about who they are. And the only way to prove that you checked is to keep the data indefinitely. Age-restriction laws push platforms toward intrusive verification systems that often directly conflict with modern data-privacy law.

This is the age-verification trap. Strong enforcement of age rules undermines data privacy.

5337
5338
 
 

Venezuela’s Foreign Minister Yvan Gil has demanded the immediate release of the country’s President Nicolas Maduro, who was abducted last month in a violent raid orchestrated by the United States.

Addressing the United Nations Human Rights Council in Geneva on Monday, Gil demanded Maduro’s “immediate release” by the US government, alongside his wife, Cilia Flores.

5339
 
 
5340
 
 

The European Parliament decided on Monday to postpone for a second time a vote on the European Union's trade deal with the United States after Donald Trump's imposition of a new blanket 15% import tariff.

The EU assembly has been debating legislative proposals to remove many EU import duties on U.S. goods, a key part of the deal struck in Turnberry, Scotland, last July, as well as to continue zero duties for U.S. lobsters, initially agreed with Trump in 2020. The proposals require approval by the parliament and EU governments.

Parliament's trade committee has now postponed a vote planned for Tuesday. Bernd Lange, the committee chair, said the new temporary U.S. tariff could mean increased levies for some EU exports and no one knew what would happen after they expire in 150 days. EU lawmakers will reconvene on March 4 to assess if the United States had clarified the situation and confirmed its commitment to last year's deal.

5341
 
 

This is a necessary Reddit repost - stay safe folks!

source

Huntarr (afaik) was an attempt to replace the standard arr* apps, such as sonarr, radarr and prowlarr.


Today, after raising security concerns in a post on r/huntarr regarding the lack of development standards in what looks like a 100% vibe-coded project, I was banned. This made my spidey senses tingle, so I decided to do a security review of the codebase. What I found was... not good. TLDR: If you have Huntarr exposed on your stack, anyone can pull your API keys for Sonarr, Radarr, Prowlarr, and every other connected app without logging in, gaining full control over your media stack. The process

I did a security review of Huntarr.io (v9.4.2) and found critical auth bypass vulnerabilities. I'm posting this here because Huntarr sits on top of (and is now trying to replace them as well!) Sonarr, Radarr, Prowlarr, and other *arr apps that have years of security hardening behind them. If you install Huntarr, you're adding an app with zero authentication on its most sensitive endpoints, and that punches a hole through whatever network security you've set up for the rest of your stack.

The worst one: POST /api/settings/general requires no login, no session, no API key. Nothing. Anyone who can reach your Huntarr instance can rewrite your entire configuration and the response comes back with every setting for every integrated application in cleartext. Not just Huntarr's own proxy credentials - the response includes API keys and instance URLs for Sonarr, Radarr, Prowlarr, Lidarr, Readarr, Whisparr, and every other connected app. One curl command and an attacker has direct API access to your entire media stack:

curl -X POST http://your-huntarr:9705/api/settings/general \
  -H "Content-Type: application/json" \
  -d '{"proxy_enabled": true}'

Full config dump with passwords and API keys for every connected application. If your instance is internet-facing - and it often is, Huntarr incorporates features like Requestarr designed for external access - anyone on the internet can pull your credentials without logging in.

Other findings (21 total across critical/high/medium):

  • Unauthenticated 2FA enrollment on the owner account (Critical, proven in CI): POST /api/user/2fa/setup with no session returned the actual TOTP secret and QR code for the owner account. An attacker generates a code, calls /api/user/2fa/verify, enrolls their own authenticator. Full account takeover, no password needed.

  • Unauthenticated setup clear enables full account takeover (Critical, proven in CI): POST /api/setup/clear requires no auth. Returns 200 "Setup progress cleared." An attacker re-arms the setup flow, creates a new owner account, replaces the legitimate owner entirely.curl -X POST http://your-huntarr:9705/api/settings/general
    -H "Content-Type: application/json"
    -d '{"proxy_enabled": true}'

  • Unauthenticated recovery key generation (Critical, proven in CI): POST /auth/recovery-key/generate with {"setup_mode": true} reaches business logic with no auth check (returns 400, not 401/403). The endpoint is unauthenticated.

  • Full cross-app credential exposure (Critical, proven in CI): Writing a single setting returns configuration for 10+ integrated apps. One call, your entire stack's API keys.

  • Unauthenticated Plex account unlink - anyone can disconnect your Plex from Huntarr

  • Auth bypass on Plex account linking via client-controlled setup_mode flag - the server skips session checks if you send {"setup_mode": true}

  • Zip Slip arbitrary file write (High): zipfile.extractall() on user-uploaded ZIPs without filename sanitization. The container runs as root.

  • Path traversal in backup restore/delete (High): backup_id from user input goes straight into filesystem paths. shutil.rmtree() makes it a directory deletion primitive.

  • local_access_bypass trusts X-Forwarded-For headers, which are trivially spoofable - combine with the unauth settings write and you get full access to protected endpoints

How I found this: Basic code review and standard automated tools (bandit, pip-audit). The kind of stuff any maintainer should be running. The auth bypass isn't a subtle bug - auth.py has an explicit whitelist that skips auth for /api/settings/general. It's just not there.

About the maintainer and the codebase:

The maintainer says they have "a series of steering documents I generated that does cybersecurity checks and provides additional hardening" and "Note I also work in cybersecurity." They say they've put in "120+ hours in the last 4 weeks" using "steering documents to advise along the way from cybersecurity, to hardening, and standards". If that's true, it's not showing in the code.

If you work in cybersecurity, you should know not to whitelist your most sensitive endpoint as unauthenticated. You should know that returning TOTP secrets to unauthenticated callers is account takeover. You should know zipfile.extractall() on untrusted input is textbook Zip Slip. This is introductory stuff. The "cybersecurity steering documents" aren't catching what a basic security scan flags in seconds.

Look at the commit history: dozens of commits with messages like "Update", "update", "Patch", "change", "Bug Patch" - hundreds of changed files in commits separated by a few minutes. No PR process, no code review, no second pair of eyes - just raw trunk-based development where 50 features get pushed in a day with zero review. Normal OSS projects are slower for a reason: multiple people look at changes before they go in. Huntarr has none of that.

When called out on this, the maintainer said budget constraints: "With a limited budget, you can only go so far unless you want to spend $1000+. I allot $40 a month in the heaviest of tasks." That's just not true - you can use AI-assisted development 8 hours a day for $20/month. The real problem isn't the budget. It's that the maintainer doesn't understand the security architecture they're building and doesn't understand the tools they're using to build it. You can't guide an AI to implement auth if you don't recognize what's wrong when it doesn't.

They also censor security reports and ban people who raise concerns. A user posted security concerns on r/huntarr and it was removed by the moderator - the maintainer controls the subreddit. I was banned from r/huntarr after pointing out these issues in this thread where the maintainer was claiming to work in cybersecurity (which they now deleted).

One more thing - the project's README has a "Support - Building My Daughter's Future" section soliciting donations. That's a red flag for me. You're asking people to fund your development while shipping code with 21 unpatched security vulnerabilities, no code review process, and banning people who point out the problems, while doing an appeal to emotion about your daughter. If you need money, that's fine - but you should be transparent about what you're spending it on and you should be shipping code that doesn't put your users at risk.

Proof repo with automated CI: https://github.com/rfsbraz/huntarr-security-review

Docker Compose setup that pulls the published Huntarr image and runs a Python script proving each vulnerability. GitHub Actions runs it on every push - check the workflow results yourself or run it locally with docker compose up -d && python3 scripts/prove_vulns.py.

For what it's worth, and to prove I'm not an AI hater, the prove_vulns script itself was vibe coded - I identified the vulnerabilities through code review, wrote up the repro steps, and had AI generate the proof script.

Full security review (21 findings): https://github.com/rfsbraz/huntarr-security-review/blob/main/Huntarr.io_SECURITY_REVIEW.md

What happens next: The maintainer will most likely prompt these problems away - feed the findings to an AI and ship a patch. But fixing 21 specific findings doesn't fix the process that created them. No code review, no PR process, no automated testing, no one who understands security reviewing what ships. The next batch of features will have the next batch of vulnerabilities. This is only the start. If the community doesn't push for better coding standards, controlled development, and a sensible roadmap, people will keep running code that nobody has reviewed.

If you're running Huntarr, keep it off any network you don't fully trust until this is sorted. The *arr apps it wraps have their own API key auth - Huntarr bypasses that entirely.

Please let others know about this. If you have a Huntarr instance, share this with your community. If you know someone who runs one, share it with them. The more people know about the risks, the more pressure there will be on the maintainer to fix them and improve their development process.

Edit: Looks like r/huntarr went private and the repo got deleted or privated https://github.com/plexguide/Huntarr.io . I'm sorry for everyone that donated to this guy's "Daughter College Fund".

Edit 2: Thanks for all the love on the comments, I'll do my best to reach out to everyone I can. People asking me for help on security reviews, believe me when I say I did little more than the basics - the project was terrible.

5342
 
 

In this video, we’ll take a look at how the UK's political polls have changed recently, and try to explain why young Brits are apparently so left-wing.

Invidious link: https://invidious.nerdvpn.de/watch?v=BTMb_5BwsPc

5343
 
 

Baby Gronk and Livvy be damned but I'm going to show these femcels what it means to be tradcath and blackpilled.

5344
5345
 
 

So, it just snowed, but it is above freezing today. I went through the car wash once earlier this year with snow on the car, and the workers did a lot more work than usual, spraying and moving the snow off the top of the car before I went through. Which was nice because I didn't have to do it.

Is it rude to go through the car wash with snow on your car or is that part of the service provided by the car wash?

EDIT: For more context, the car wash is right down the street from where I live, so by going through, I'm removing the snow so I'm NOT driving around with snow on the car.

I'm also removing a lot of snow before leaving the driveway, but not getting 100% off.

Seems like the consensus is that driving with dangerous amounts of snow on a car is not ok, but few people have addressed the carwash portion of the question.

EDIT 2: I think I'm gonna go in and ask the workers today what they think.

EDIT 3: Didn't have time to go to the carwash today, will have to ask later.

5346
 
 

Schools close and flights suspended after military raid kills Jalisco New Generation Cartel leader Nemesio Rubén Oseguera Cervantes

Whole areas of western Mexico have been all but shut down after a surge in cartel violence sparked by a military raid that killed one of the world’s most wanted drug traffickers, known as “El Mencho”.

Schools were closed in several Mexican states, and foreign governments warned their citizens to stay inside after the drug lord, whose real name is Nemesio Rubén Oseguera Cervantes, was declared dead on Sunday.

The 59-year-old cartel leader was killed during a shootout after the Mexican military attempted to capture him in a raid supported by intelligence from Washington. The US has been pushing its southern neighbour to take more aggressive action against groups trafficking fentanyl, methamphetamine and cocaine.

5347
 
 

The least likely scenario: Washington could attack in the more distant future.

...

As time has drawn on, Israeli leaders have made more noise about joining an American-led strike on the regime. This has also increased the probability that Tehran will attack Israel, either in response or in anticipation of expected IDF involvement.

sitting way in the back of the bus as a US citizen "hey, omm do I get a say in this at all or??"

5348
5349
 
 

They are testing a 26Ah battery pouch and were able to charge it at a 11C rate for 3 min and it retained 98.4% charge!!

5350
view more: ‹ prev next ›