lemmy.net.au

46 readers
1 users here now

This instance is hosted in Sydney, Australia and Maintained by Australian administrators.

Feel free to create and/or Join communities for any topics that interest you!

Rules are very simple

Mobile apps

https://join-lemmy.org/apps

What is Lemmy?

Lemmy is a selfhosted social link aggregation and discussion platform. It is completely free and open, and not controlled by any company. This means that there is no advertising, tracking, or secret algorithms. Content is organized into communities, so it is easy to subscribe to topics that you are interested in, and ignore others. Voting is used to bring the most interesting items to the top.

Think of it as an opensource alternative to reddit!

founded 1 year ago
ADMINS
5351
 
 
5352
 
 

The European Parliament decided on Monday to postpone for a second time a vote on the European Union's trade deal with the United States after Donald Trump's imposition of a new blanket 15% import tariff.

The EU assembly has been debating legislative proposals to remove many EU import duties on U.S. goods, a key part of the deal struck in Turnberry, Scotland, last July, as well as to continue zero duties for U.S. lobsters, initially agreed with Trump in 2020. The proposals require approval by the parliament and EU governments.

Parliament's trade committee has now postponed a vote planned for Tuesday. Bernd Lange, the committee chair, said the new temporary U.S. tariff could mean increased levies for some EU exports and no one knew what would happen after they expire in 150 days. EU lawmakers will reconvene on March 4 to assess if the United States had clarified the situation and confirmed its commitment to last year's deal.

5353
 
 

This is a necessary Reddit repost - stay safe folks!

source

Huntarr (afaik) was an attempt to replace the standard arr* apps, such as sonarr, radarr and prowlarr.


Today, after raising security concerns in a post on r/huntarr regarding the lack of development standards in what looks like a 100% vibe-coded project, I was banned. This made my spidey senses tingle, so I decided to do a security review of the codebase. What I found was... not good. TLDR: If you have Huntarr exposed on your stack, anyone can pull your API keys for Sonarr, Radarr, Prowlarr, and every other connected app without logging in, gaining full control over your media stack. The process

I did a security review of Huntarr.io (v9.4.2) and found critical auth bypass vulnerabilities. I'm posting this here because Huntarr sits on top of (and is now trying to replace them as well!) Sonarr, Radarr, Prowlarr, and other *arr apps that have years of security hardening behind them. If you install Huntarr, you're adding an app with zero authentication on its most sensitive endpoints, and that punches a hole through whatever network security you've set up for the rest of your stack.

The worst one: POST /api/settings/general requires no login, no session, no API key. Nothing. Anyone who can reach your Huntarr instance can rewrite your entire configuration and the response comes back with every setting for every integrated application in cleartext. Not just Huntarr's own proxy credentials - the response includes API keys and instance URLs for Sonarr, Radarr, Prowlarr, Lidarr, Readarr, Whisparr, and every other connected app. One curl command and an attacker has direct API access to your entire media stack:

curl -X POST http://your-huntarr:9705/api/settings/general \
  -H "Content-Type: application/json" \
  -d '{"proxy_enabled": true}'

Full config dump with passwords and API keys for every connected application. If your instance is internet-facing - and it often is, Huntarr incorporates features like Requestarr designed for external access - anyone on the internet can pull your credentials without logging in.

Other findings (21 total across critical/high/medium):

  • Unauthenticated 2FA enrollment on the owner account (Critical, proven in CI): POST /api/user/2fa/setup with no session returned the actual TOTP secret and QR code for the owner account. An attacker generates a code, calls /api/user/2fa/verify, enrolls their own authenticator. Full account takeover, no password needed.

  • Unauthenticated setup clear enables full account takeover (Critical, proven in CI): POST /api/setup/clear requires no auth. Returns 200 "Setup progress cleared." An attacker re-arms the setup flow, creates a new owner account, replaces the legitimate owner entirely.curl -X POST http://your-huntarr:9705/api/settings/general
    -H "Content-Type: application/json"
    -d '{"proxy_enabled": true}'

  • Unauthenticated recovery key generation (Critical, proven in CI): POST /auth/recovery-key/generate with {"setup_mode": true} reaches business logic with no auth check (returns 400, not 401/403). The endpoint is unauthenticated.

  • Full cross-app credential exposure (Critical, proven in CI): Writing a single setting returns configuration for 10+ integrated apps. One call, your entire stack's API keys.

  • Unauthenticated Plex account unlink - anyone can disconnect your Plex from Huntarr

  • Auth bypass on Plex account linking via client-controlled setup_mode flag - the server skips session checks if you send {"setup_mode": true}

  • Zip Slip arbitrary file write (High): zipfile.extractall() on user-uploaded ZIPs without filename sanitization. The container runs as root.

  • Path traversal in backup restore/delete (High): backup_id from user input goes straight into filesystem paths. shutil.rmtree() makes it a directory deletion primitive.

  • local_access_bypass trusts X-Forwarded-For headers, which are trivially spoofable - combine with the unauth settings write and you get full access to protected endpoints

How I found this: Basic code review and standard automated tools (bandit, pip-audit). The kind of stuff any maintainer should be running. The auth bypass isn't a subtle bug - auth.py has an explicit whitelist that skips auth for /api/settings/general. It's just not there.

About the maintainer and the codebase:

The maintainer says they have "a series of steering documents I generated that does cybersecurity checks and provides additional hardening" and "Note I also work in cybersecurity." They say they've put in "120+ hours in the last 4 weeks" using "steering documents to advise along the way from cybersecurity, to hardening, and standards". If that's true, it's not showing in the code.

If you work in cybersecurity, you should know not to whitelist your most sensitive endpoint as unauthenticated. You should know that returning TOTP secrets to unauthenticated callers is account takeover. You should know zipfile.extractall() on untrusted input is textbook Zip Slip. This is introductory stuff. The "cybersecurity steering documents" aren't catching what a basic security scan flags in seconds.

Look at the commit history: dozens of commits with messages like "Update", "update", "Patch", "change", "Bug Patch" - hundreds of changed files in commits separated by a few minutes. No PR process, no code review, no second pair of eyes - just raw trunk-based development where 50 features get pushed in a day with zero review. Normal OSS projects are slower for a reason: multiple people look at changes before they go in. Huntarr has none of that.

When called out on this, the maintainer said budget constraints: "With a limited budget, you can only go so far unless you want to spend $1000+. I allot $40 a month in the heaviest of tasks." That's just not true - you can use AI-assisted development 8 hours a day for $20/month. The real problem isn't the budget. It's that the maintainer doesn't understand the security architecture they're building and doesn't understand the tools they're using to build it. You can't guide an AI to implement auth if you don't recognize what's wrong when it doesn't.

They also censor security reports and ban people who raise concerns. A user posted security concerns on r/huntarr and it was removed by the moderator - the maintainer controls the subreddit. I was banned from r/huntarr after pointing out these issues in this thread where the maintainer was claiming to work in cybersecurity (which they now deleted).

One more thing - the project's README has a "Support - Building My Daughter's Future" section soliciting donations. That's a red flag for me. You're asking people to fund your development while shipping code with 21 unpatched security vulnerabilities, no code review process, and banning people who point out the problems, while doing an appeal to emotion about your daughter. If you need money, that's fine - but you should be transparent about what you're spending it on and you should be shipping code that doesn't put your users at risk.

Proof repo with automated CI: https://github.com/rfsbraz/huntarr-security-review

Docker Compose setup that pulls the published Huntarr image and runs a Python script proving each vulnerability. GitHub Actions runs it on every push - check the workflow results yourself or run it locally with docker compose up -d && python3 scripts/prove_vulns.py.

For what it's worth, and to prove I'm not an AI hater, the prove_vulns script itself was vibe coded - I identified the vulnerabilities through code review, wrote up the repro steps, and had AI generate the proof script.

Full security review (21 findings): https://github.com/rfsbraz/huntarr-security-review/blob/main/Huntarr.io_SECURITY_REVIEW.md

What happens next: The maintainer will most likely prompt these problems away - feed the findings to an AI and ship a patch. But fixing 21 specific findings doesn't fix the process that created them. No code review, no PR process, no automated testing, no one who understands security reviewing what ships. The next batch of features will have the next batch of vulnerabilities. This is only the start. If the community doesn't push for better coding standards, controlled development, and a sensible roadmap, people will keep running code that nobody has reviewed.

If you're running Huntarr, keep it off any network you don't fully trust until this is sorted. The *arr apps it wraps have their own API key auth - Huntarr bypasses that entirely.

Please let others know about this. If you have a Huntarr instance, share this with your community. If you know someone who runs one, share it with them. The more people know about the risks, the more pressure there will be on the maintainer to fix them and improve their development process.

Edit: Looks like r/huntarr went private and the repo got deleted or privated https://github.com/plexguide/Huntarr.io . I'm sorry for everyone that donated to this guy's "Daughter College Fund".

Edit 2: Thanks for all the love on the comments, I'll do my best to reach out to everyone I can. People asking me for help on security reviews, believe me when I say I did little more than the basics - the project was terrible.

5354
 
 

In this video, we’ll take a look at how the UK's political polls have changed recently, and try to explain why young Brits are apparently so left-wing.

Invidious link: https://invidious.nerdvpn.de/watch?v=BTMb_5BwsPc

5355
 
 

Baby Gronk and Livvy be damned but I'm going to show these femcels what it means to be tradcath and blackpilled.

5356
5357
 
 

So, it just snowed, but it is above freezing today. I went through the car wash once earlier this year with snow on the car, and the workers did a lot more work than usual, spraying and moving the snow off the top of the car before I went through. Which was nice because I didn't have to do it.

Is it rude to go through the car wash with snow on your car or is that part of the service provided by the car wash?

EDIT: For more context, the car wash is right down the street from where I live, so by going through, I'm removing the snow so I'm NOT driving around with snow on the car.

I'm also removing a lot of snow before leaving the driveway, but not getting 100% off.

Seems like the consensus is that driving with dangerous amounts of snow on a car is not ok, but few people have addressed the carwash portion of the question.

EDIT 2: I think I'm gonna go in and ask the workers today what they think.

EDIT 3: Didn't have time to go to the carwash today, will have to ask later.

5358
 
 

Schools close and flights suspended after military raid kills Jalisco New Generation Cartel leader Nemesio Rubén Oseguera Cervantes

Whole areas of western Mexico have been all but shut down after a surge in cartel violence sparked by a military raid that killed one of the world’s most wanted drug traffickers, known as “El Mencho”.

Schools were closed in several Mexican states, and foreign governments warned their citizens to stay inside after the drug lord, whose real name is Nemesio Rubén Oseguera Cervantes, was declared dead on Sunday.

The 59-year-old cartel leader was killed during a shootout after the Mexican military attempted to capture him in a raid supported by intelligence from Washington. The US has been pushing its southern neighbour to take more aggressive action against groups trafficking fentanyl, methamphetamine and cocaine.

5359
 
 

The least likely scenario: Washington could attack in the more distant future.

...

As time has drawn on, Israeli leaders have made more noise about joining an American-led strike on the regime. This has also increased the probability that Tehran will attack Israel, either in response or in anticipation of expected IDF involvement.

sitting way in the back of the bus as a US citizen "hey, omm do I get a say in this at all or??"

5360
5361
 
 

They are testing a 26Ah battery pouch and were able to charge it at a 11C rate for 3 min and it retained 98.4% charge!!

5362
5363
 
 

Israeli companies have developed and are selling advanced cyber tools that can hack into the tech of your car and use it to collect intelligence on you.

These tools can also assist in a cross-referencing of data to identify an intelligence target among tens of thousands of cars on the road. This technology can track the vehicle's movements in real time and potentially eavesdrop on the people inside.

archive: https://archive.is/tDOFi

5364
 
 

Footage shows Trump looking extremely drowsy at his inaugural “Board of Peace” meeting on Thursday at the U.S. Institute of Peace in Washington, D.C. His eyelids grew heavy during Major General Jasper Jeffers III’s presentation, and if he didn’t fall asleep completely, he at least looked incredibly disinterested in his own creation.

5365
5366
 
 

He is also under investigation for alleged misappropriation of public funds and corruption.

5367
5368
 
 

Western allies and US commanders express concern over Trump plan to hire Israeli-armed militias

archive: https://archive.is/Vxm2F

5369
 
 

One final thought: if ISIS is allowed to ‘flourish’ in order to attack Iraq and/or Iran, what happens after that? Do you think ISIS will settle, or is the very real risk that it will expand beyond the borders of West Asia and Persia? Western regimes have created a Frankenstein monster that will eventually turn on their handlers and the populations of the countries whose regimes sustain the terror group if they are not contained and defeated by what remains of the regional resistance against the Axis of Terror.

5370
 
 

Ghana's President John Mahama has received the African Union's backing in pushing the United Nations to recognize transatlantic slavery as the 'gravest crime against humanity.'

There is broad historical consensus that the transatlantic slave trade between the 15th and 19th centuries, which involved the kidnapping, enslavement and transport of millions of Africans to the Americas and the Caribbean, was one of the biggest tragedies in human history.

5371
 
 

cross-posted from: https://scribe.disroot.org/post/7389904

Archived link

The percentage of Canadians with a favorable view of the U.S. is now very similar to the percentage with a favorable view of China [both are very low].

...

Canadians’ shifting opinion maps onto rhetoric from key government figures. Industry Minister Melanie Joly’s comment that trade discussions with China are “more predictable and stable” than with the U.S. is a good example of missing the forest for the trees.

Prime Minister Mark Carney’s Davos speech, a thinly veiled criticism of President Trump, came days after a new trade deal and smiling photo-op with Xi Jinping. It was another historic miscalculation. Both Joly’s comment and Carney’s speech betray a naive equivocation between China and the U.S.

...

Yes, perhaps American democracy is strained, but the resilience of the American political system and people is also very much on display.

...

Elections, term limits and push-back from legislatures on the executive are openly despised concepts in the People’s Republic of China. When Xi exercises hostage diplomacy or coercive tariffs against trading partners, which he does routinely, there is no open debate, no democratic backlash, no Chinese media outcry.

...

Late this summer, a U.S. appeals court ruled most of Trump’s tariffs illegal. The Supreme Court followed up Friday, ruling that Trump exceeded his authority when imposing tariffs through the International Emergency Economic Powers Act, a law intended to be reserved for national emergencies.

...

For Canadians, perhaps the most disturbing part of Trump’s presidency thus far has been its immigration enforcement, including shootings and deaths in custody. The seemingly needless deaths on the streets of Minneapolis, and the subsequent characterization of the victims as “domestic terrorists” by the Trump administration, is inexcusable.

Yet compare the American outcry and mass protests over these crackdowns to the Chinese response to the Uyghur genocide.

...

5372
 
 

India and the US have deferred trade talks which were set to take place this week as they "study the implications" of the US Supreme Court striking down the Donald Trump administration's global tariffs, an Indian commerce ministry official told the BBC.

An Indian delegation was due to travel to Washington this week to finalise the terms of an interim trade deal which was announced earlier this month.

The agreement reduced US tariffs on Indian goods from 50% to 18%, even though several aspects of it remained unclear.

5373
5374
5375
 
 

0=0

20-20=25-25

4(5-5)=5(5-5)

4=5

2+2=5

Additional engineering math proof

2.4+2.4=4.8

2.4≈2

4.8≈5

2+2=5

view more: ‹ prev next ›