Published on March 31, 2026 at 06:01 CET (UTC+1)
Axios Compromised on NPM – Malicious Versions Drop Remote Access Trojan (100 points by mtud)
The article details a significant software supply chain attack where the popular axios JavaScript library was compromised on the npm registry. A maintainer's account was hijacked to publish malicious versions (1.14.1 and 0.30.4) that included a hidden dependency (plain-crypto-js). This dependency acted as a cross-platform Remote Access Trojan (RAT) dropper, fetching platform-specific payloads from a command-and-control server upon installation.
Universal Claude.md – cut Claude output tokens by 63% (158 points by killme2008)
This GitHub project introduces CLAUDE.md, a single configuration file designed to reduce the verbosity and "sycophancy" of Anthropic's Claude AI model outputs. By providing structured instructions in context, it claims to cut output token usage by approximately 63% without requiring code changes. The tool is a drop-in solution aimed at making AI interactions more concise and less formatted, primarily targeting output token costs.
Artemis II is not safe to fly (53 points by idlewords)
The article presents a critical safety analysis of NASA's upcoming Artemis II manned lunar mission, focusing on the Orion capsule's heat shield. It reports that during the uncrewed Artemis I test flight, the heat shield experienced unexpected and severe material loss ("chunks" blowing out) and bolt erosion during re-entry. The author criticizes NASA for initial attempts to downplay the issue and argues that the unresolved problem makes the crewed Artemis II mission unsafe to fly.
Fedware: Government apps that spy harder than the apps they ban (476 points by speckx)
This investigative report, dubbed "Fedware," exposes U.S. government mobile applications that collect extensive user data, often exceeding the intrusiveness of the consumer apps they criticize or ban. It lists specifics for apps like the White House, FBI, FEMA, and ICE apps, detailing excessive permissions, embedded trackers, facial recognition databases, and deals with data brokers. The core argument is a critique of government hypocrisy regarding privacy and surveillance.
Do your own writing (415 points by karimf)
The author argues strongly against using AI for writing, framing it as a loss of a fundamental human skill and intellectual process. They contend that writing is essential for refining thought, deepening understanding, and developing unique style and judgment—capabilities that are eroded by over-reliance on AI text generation. The post is a philosophical stance on preserving authentic human expression and critical thinking.
Android Developer Verification (173 points by ingve)
Google announced the rollout of mandatory identity verification for all developers publishing on the Google Play Store or using the Android Developer Console. This policy is framed as a security measure to combat malicious actors who hide behind anonymity, citing data that shows sideloaded apps carry 90 times more malware. The verification process is intended to add an extra layer of safety while maintaining Android's open ecosystem.
Incident March 30th, 2026 – Accidental CDN Caching (32 points by cebert)
Railway, a deployment platform, published an incident report detailing a 52-minute window where a configuration error accidentally enabled CDN caching for a small subset (0.05%) of user domains that had it disabled. This caused HTTP GET responses, potentially containing authenticated user data, to be incorrectly served to other unauthenticated users. The report outlines the timeline, impact, and corrective actions taken.
Turning a MacBook into a touchscreen with $1 of hardware (2018) (232 points by HughParry)
This 2018 project demonstrates a clever, low-cost hack to add touchscreen functionality to a MacBook using computer vision. The team placed a small mirror in front of the built-in webcam to angle its view onto the screen, allowing it to detect fingers touching the screen by observing the interaction between a finger and its reflection. The proof-of-concept, built with about $1 of hardware, shows how simple optics and software can create novel input methods.
How to turn anything into a router (622 points by yabones)
Written in response to proposed U.S. import restrictions on consumer routers, this guide explains that any device capable of running Linux with two network interfaces can function as a router. It demystifies commercial routers, arguing they are just specialized computers, and provides a high-level overview of the software and configuration (like iptables/nftables and DHCP) needed to create a robust, customizable DIY router from mini-PCs, old laptops, or single-board computers.
Learn Claude Code by doing, not reading (195 points by taubek)
This is an interactive, browser-based tutorial platform designed to teach users how to effectively use Claude Code (Anthropic's AI coding tool). It emphasizes learning by doing through simulated terminals, interactive config builders, and quizzes across 11 modules, requiring no software installation. The site aims to build practical proficiency with Claude's features like slash commands, hooks, and skills through hands-on practice.
Trend: Mounting Focus on AI Efficiency and Cost Optimization.
CLAUDE.md (Article 2) highlight a community-driven push to refine prompt engineering and system instructions to reduce token waste, directly impacting bottom lines.Trend: The Rise of Interactive, "Learn-by-Doing" AI Education.
Trend: Critical Scrutiny of AI-Generated Content and Preservation of Human Craft.
Trend: Software Supply Chain Security as an AI/ML Frontier.
axios compromise (Article 1) is a stark reminder that the modern AI/ML stack is built on a fragile foundation of open-source dependencies. Poisoned packages can infiltrate AI pipelines, training environments, and deployed models, leading to data exfiltration, model corruption, or backdoored systems.Trend: Hardware Flexibility and Democratization for Edge AI and Infrastructure.
Trend: Platform Accountability and Security as a Prerequisite for AI Adoption.
Analysis generated by deepseek-reasoner