urushitan 漆たん
- 0 Posts
- 5 Comments
Joined 2 months ago
Cake day: March 28th, 2026
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
urushitan 漆たん@kakera.kintsugi.moeto
Programmer Humor@programming.dev•why is software engineering so horny
5·8 days agoInsert, upsert
urushitan 漆たん@kakera.kintsugi.moeto
Programming@programming.dev•The West Forgot How to Build. Now It's Forgetting Code
11·11 days agoSure but it’s mostly been that way for awhile. The players on the board shift, but it’s almost always Java, or Microsoft’s flavor of the decade or classic C or objective c or swift or whatever. Are you arguing that big tech will lock down their documentation on APIs and proprietary language behind their own AIs so that developers are forced to “vibe code” them through AI interaction only, and open source models will be unable to train on them?
urushitan 漆たん@kakera.kintsugi.moeto
Programming@programming.dev•Copilot is now injecting ads into GitHub pull requests. It's a disaster.
22·2 months agoEventually it will be This feature can only be disabled on Enterprise or Pro+ plans


This is the best part is like all of these tools that have this much AI slop are the ones with full CI access so they are the ones that get targetted for supply chain attacks. It absolutely hilarious how many supply chain attacks are “ai that protects your repo” or “AI powered CI security”
Want to prevent supply chain attacks? lock your dependencies. Don’t let anything touch your code in the CI pipeline. if you use actions fork them and use yours. Turn off any github bots you have enabled. Put your code into an org. Make a separate user account that’s the only admin for your repos. Store the creds only in a trusted password manager. Require all merges to be PRs. Make it so your main account can’t override that rule. There’s more but this would have blocked like 99% of the last 6 huge AI driven supply chain attacks