• 1 Post
  • 157 Comments
Joined 2 years ago
cake
Cake day: June 13th, 2023

help-circle
  • But I’m with you. I absolutely never understood why people ever feel like they are entitled to their parents money. Your parents earned that, not you.

    I think the biggest implication here is that they didn’t earn it entirely. That they at least inherited something from their parents. Which would have given them a leg up and they refuse to pay it forward.

    Obviously that’s not the case for everyone. For instance, my entire family was poor as far back as I am aware of. None of them had shit or got shit or were able to have a good retirement. So obviously I don’t expect anything from them.











  • Even if you’re poking at a black box and are reporting that “it acts funny when I poke it this way.” I’m my opinion, a reporter should send along a script or at least explicit instructions on how to repro.

    I take the report more serious since it demonstrates you have an understanding of the issue or exploit. It will also save my time and it’s likely a trivial effort for the reporter since they’ve the context and knowledge of the issue loaded up and ready to go.



  • Agree that people like to fluff the severity of bugs they report. It’s better for prestige and bounty payouts. But this is a little more nuanced.

    “While I didn’t really intend the module to be used for any security related checks, I’m very curious how an untrusted input could end up being passed into ip.isPrivate or ip.isPublic [functions] and then used for verifying where the network connection came from.”

    It’s interesting, that it would be hard to make a case that there was a “vulnerability” in the ip package. But it seems like this package’s entire purpose is input validation so it’s kind of weird the dev thinks otherwise.

    Recurring incidents like these raise the question, how does one strike a balance? Relentlessly reporting theoretical vulnerabilities can leave open-source developers, many of who are volunteers, exhausted from triaging noise.

    The researchers need to provide proofs of concept. Actual functional exploits.