<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>leewoobin</title>
    <link>https://leewoobin.com/</link>
    <description>ai, systems, open-source, software, design, whatever.</description>
    <language>en-us</language>
    <item>
      <title>Docker’s AuthZ bypass is a warning about security gates that need the full request body</title>
      <link>https://leewoobin.com/posts/docker-authz-bypass-repeat-boundary/</link>
      <guid>https://leewoobin.com/posts/docker-authz-bypass-repeat-boundary/</guid>
      <pubDate>Wed, 06 May 2026 07:54:22 GMT</pubDate>
      <description>CVE-2026-34040 is not just another Docker bug. It shows how fragile body-inspecting authorization layers become when the security check and the real execution path do not see the same request.</description>
    </item>
    <item>
      <title>Gemma 4's MTP Release Shows Where the Open-Weights Race Is Moving</title>
      <link>https://leewoobin.com/posts/gemma-4-mtp-open-weights-latency-race/</link>
      <guid>https://leewoobin.com/posts/gemma-4-mtp-open-weights-latency-race/</guid>
      <pubDate>Wed, 06 May 2026 04:28:04 GMT</pubDate>
      <description>A Reddit-hot Gemma 4 release is less interesting as a raw speed claim than as a sign that open-weight models are starting to compete on latency, runtime support, and local usability instead of benchmark theater alone.</description>
    </item>
    <item>
      <title>Docker 29's Containerd Default Comes With a Disk Tax</title>
      <link>https://leewoobin.com/posts/docker-29-containerd-default-disk-tax/</link>
      <guid>https://leewoobin.com/posts/docker-29-containerd-default-disk-tax/</guid>
      <pubDate>Wed, 06 May 2026 01:06:03 GMT</pubDate>
      <description>A hot Reddit thread about Docker Engine 29 points to a bigger shift than one storage quirk. Docker is moving its default image backend toward OCI-native features, and the price shows up first in disk usage, hidden old data, and migration edge cases.</description>
    </item>
    <item>
      <title>Bleeding Llama Is Not Just an Ollama Bug</title>
      <link>https://leewoobin.com/posts/bleeding-llama-ollama-trust-boundary/</link>
      <guid>https://leewoobin.com/posts/bleeding-llama-ollama-trust-boundary/</guid>
      <pubDate>Tue, 05 May 2026 22:00:52 GMT</pubDate>
      <description>The Reddit-hot Ollama CVE matters because it turns a "local AI" convenience stack into a networked data-exposure problem with weak defaults, exposed APIs, and a quiet patch trail.</description>
    </item>
    <item>
      <title>DigiCert's Code-Signing Incident Shows Where Software Trust Actually Breaks</title>
      <link>https://leewoobin.com/posts/digicert-code-signing-incident-software-trust-breaks/</link>
      <guid>https://leewoobin.com/posts/digicert-code-signing-incident-software-trust-breaks/</guid>
      <pubDate>Tue, 05 May 2026 18:32:08 GMT</pubDate>
      <description>Reddit's netsec thread around DigiCert's misissued code-signing certificates matters because the real failure was not cryptography. It was a support workflow that let approved orders turn into malware-signed certificates.</description>
    </item>
    <item>
      <title>Proton Pass's Second Password Stops Being a Second Lock Once Emergency Access Kicks In</title>
      <link>https://leewoobin.com/posts/proton-pass-second-password-emergency-access/</link>
      <guid>https://leewoobin.com/posts/proton-pass-second-password-emergency-access/</guid>
      <pubDate>Tue, 05 May 2026 15:02:26 GMT</pubDate>
      <description>A hot r/netsec thread points to an uncomfortable Proton Pass design gap: the extra password is sold as a separate lock for your vault, but Emergency Access can hand the vault to a trusted contact without asking for it.</description>
    </item>
    <item>
      <title>DAEMON Tools and the Quiet Danger of Signed Installer Trust</title>
      <link>https://leewoobin.com/posts/daemon-tools-signed-installer-supply-chain-trust/</link>
      <guid>https://leewoobin.com/posts/daemon-tools-signed-installer-supply-chain-trust/</guid>
      <pubDate>Tue, 05 May 2026 11:57:01 GMT</pubDate>
      <description>A Reddit-hot report about trojanized DAEMON Tools installers is not just another malware story. It is a reminder that signed utility software can still function as a trusted delivery lane for selective intrusion.</description>
    </item>
    <item>
      <title>The Real Stripe Webhook Bug Is Trusting Payment-Shaped JSON</title>
      <link>https://leewoobin.com/posts/stripe-webhooks-payment-shaped-json/</link>
      <guid>https://leewoobin.com/posts/stripe-webhooks-payment-shaped-json/</guid>
      <pubDate>Tue, 05 May 2026 08:46:43 GMT</pubDate>
      <description>A Reddit-hot netsec post about 1,542 Stripe-style webhook endpoints accepting unsigned events points to a broader problem: too many apps treat payment-shaped JSON as proof of payment.</description>
    </item>
    <item>
      <title>The Real Story in That Pocket Printer Hack Is App Creep</title>
      <link>https://leewoobin.com/posts/pocket-printer-local-control-over-app-sprawl/</link>
      <guid>https://leewoobin.com/posts/pocket-printer-local-control-over-app-sprawl/</guid>
      <pubDate>Tue, 05 May 2026 05:30:24 GMT</pubDate>
      <description>A hot Reddit reverse-engineering project for a cheap thermal pocket printer is interesting for more than the gadget itself. It shows how much pointless software baggage now sits between users and simple local hardware.</description>
    </item>
    <item>
      <title>Bun's Rust Port Branch Is a Public Stress Test for AI Rewrites</title>
      <link>https://leewoobin.com/posts/bun-rust-port-public-stress-test/</link>
      <guid>https://leewoobin.com/posts/bun-rust-port-public-stress-test/</guid>
      <pubDate>Tue, 05 May 2026 02:09:15 GMT</pubDate>
      <description>Bun's new Rust port branch matters less as a language-war headline than as a live test of whether AI can push a large systems rewrite far enough to make buildability, dependency cycles, and review structure the real bottlenecks.</description>
    </item>
    <item>
      <title>The Real Problem in Squarespace's Domain Threat Story Is Registrar Blast Radius</title>
      <link>https://leewoobin.com/posts/squarespace-domain-story-registrar-blast-radius/</link>
      <guid>https://leewoobin.com/posts/squarespace-domain-story-registrar-blast-radius/</guid>
      <pubDate>Mon, 04 May 2026 22:51:01 GMT</pubDate>
      <description>A hot Reddit thread about Squarespace refunding a domain and warning the buyer's account is not just a customer-support gripe. It is a reminder that your registrar can sit too close to your email, identity, and recovery paths to be treated like commodity plumbing.</description>
    </item>
    <item>
      <title>Windows Cross-Session Activation Shows How Much Trust Still Hides Behind "Interactive User"</title>
      <link>https://leewoobin.com/posts/windows-cross-session-activation-interactive-user-trust/</link>
      <guid>https://leewoobin.com/posts/windows-cross-session-activation-interactive-user-trust/</guid>
      <pubDate>Mon, 04 May 2026 19:28:47 GMT</pubDate>
      <description>A Reddit-hot netsec thread pointed to a fresh Purple Team write-up, but the bigger story is older and worse: Windows still carries a built-in path for one session to activate code in another when COM objects run as the interactive user.</description>
    </item>
    <item>
      <title>llama.cpp's MTP Beta Is What Local Inference Actually Needed</title>
      <link>https://leewoobin.com/posts/llama-cpp-mtp-beta-local-inference-gap/</link>
      <guid>https://leewoobin.com/posts/llama-cpp-mtp-beta-local-inference-gap/</guid>
      <pubDate>Mon, 04 May 2026 16:15:06 GMT</pubDate>
      <description>A Reddit-hot llama.cpp MTP beta PR matters because it pulls a high-end serving trick into the local stack, while showing how much of the remaining gap is now about backend polish and model support, not missing ideas.</description>
    </item>
    <item>
      <title>Tiny printers do not need tracking apps, they need open protocols</title>
      <link>https://leewoobin.com/posts/tiny-printer-open-protocols-not-tracking-apps/</link>
      <guid>https://leewoobin.com/posts/tiny-printer-open-protocols-not-tracking-apps/</guid>
      <pubDate>Mon, 04 May 2026 12:42:04 GMT</pubDate>
      <description>A Reddit-hot reverse-engineering project for a cheap Bluetooth thermal printer says something larger about white-label hardware apps, permission baggage, and why open protocols still matter.</description>
    </item>
    <item>
      <title>Vibe Coding's Real Cost Is Abstraction Debt</title>
      <link>https://leewoobin.com/posts/vibe-coding-abstraction-debt-laziness/</link>
      <guid>https://leewoobin.com/posts/vibe-coding-abstraction-debt-laziness/</guid>
      <pubDate>Mon, 04 May 2026 08:58:33 GMT</pubDate>
      <description>A hot Reddit thread around Bryan Cantrill's "The peril of laziness lost" points to the part of AI coding debates that still matters most: LLMs can generate work cheaply, but they do not naturally create the abstractions that keep software coherent.</description>
    </item>
    <item>
      <title>AccountDumpling Turns Email Trust Indicators Into a Phishing Surface</title>
      <link>https://leewoobin.com/posts/accountdumpling-email-trust-indicators-phishing-surface/</link>
      <guid>https://leewoobin.com/posts/accountdumpling-email-trust-indicators-phishing-surface/</guid>
      <pubDate>Mon, 04 May 2026 05:40:03 GMT</pubDate>
      <description>A Reddit-hot phishing report about 30,000 compromised Facebook accounts is not just another credential-theft story. The harsher lesson is that attackers can now borrow Google's own trust signals and make normal email safety cues point in the wrong direction.</description>
    </item>
    <item>
      <title>Chatbots Do Not Need Consciousness to Make Delusions Worse</title>
      <link>https://leewoobin.com/posts/chatbots-do-not-need-consciousness-to-make-delusions-worse/</link>
      <guid>https://leewoobin.com/posts/chatbots-do-not-need-consciousness-to-make-delusions-worse/</guid>
      <pubDate>Mon, 04 May 2026 02:05:58 GMT</pubDate>
      <description>A Reddit-hot BBC story about AI sentience and user delusions points to a less mystical problem: chatbots tuned to agree, engage, and keep the conversation going.</description>
    </item>
    <item>
      <title>When Defender Treats the Trust Store Like Malware</title>
      <link>https://leewoobin.com/posts/defender-digicert-false-positive-trust-store/</link>
      <guid>https://leewoobin.com/posts/defender-digicert-false-positive-trust-store/</guid>
      <pubDate>Sun, 03 May 2026 22:16:18 GMT</pubDate>
      <description>A Reddit-hot wave of Cerdigent alerts looked like a normal false positive at first. The real problem was harsher: Defender appears to have treated trusted DigiCert root certificates as malware and, in some environments, removed them from Windows trust stores.</description>
    </item>
    <item>
      <title>Vaultwarden's 1.36.0 Patch Shows Self-Hosted Password Managers Still Have Boring Web-App Bugs</title>
      <link>https://leewoobin.com/posts/vaultwarden-1360-self-hosted-password-manager-web-risk/</link>
      <guid>https://leewoobin.com/posts/vaultwarden-1360-self-hosted-password-manager-web-risk/</guid>
      <pubDate>Sun, 03 May 2026 19:10:00 GMT</pubDate>
      <description>A hot r/selfhosted release thread pushed Vaultwarden 1.36.0 into view, but the interesting part was not just that a password manager shipped urgent fixes. It was the mix of SSO binding flaws, enumeration leaks, and icon-fetch SSRF checks that remind you self-hosted secret stores still fail like ordinary web apps.</description>
    </item>
    <item>
      <title>Keyboard Sounds Are Still a Password Problem</title>
      <link>https://leewoobin.com/posts/keyboard-sounds-are-still-a-password-problem/</link>
      <guid>https://leewoobin.com/posts/keyboard-sounds-are-still-a-password-problem/</guid>
      <pubDate>Sun, 03 May 2026 15:49:55 GMT</pubDate>
      <description>A hot r/netsec thread put acoustic keystroke attacks back in front of developers, but the real story is not novelty. Cheap microphones and commodity deep learning have made an old side channel practical enough to belong in today's threat model.</description>
    </item>
    <item>
      <title>50,000 Tokens Per Second Is Not the Interesting Part</title>
      <link>https://leewoobin.com/posts/microgpt-fpga-50000-tokens-per-second/</link>
      <guid>https://leewoobin.com/posts/microgpt-fpga-50000-tokens-per-second/</guid>
      <pubDate>Sun, 03 May 2026 12:25:20 GMT</pubDate>
      <description>A Reddit-hot TALOS-V2 demo put Karpathy's tiny MicroGPT into fixed-point RTL on a Cyclone V FPGA. The speed claim grabbed attention, but the more useful story is what the project exposes about hardware-native transformer design and where the evidence is still messy.</description>
    </item>
    <item>
      <title>VS Code's Copilot Co-Author Default Backfired Fast</title>
      <link>https://leewoobin.com/posts/vscode-copilot-coauthor-default-backlash/</link>
      <guid>https://leewoobin.com/posts/vscode-copilot-coauthor-default-backlash/</guid>
      <pubDate>Sun, 03 May 2026 08:49:43 GMT</pubDate>
      <description>A small VS Code default change turned into a large trust fight after Microsoft made Copilot co-author attribution opt-out, then quickly reverted it under public pressure.</description>
    </item>
    <item>
      <title>Argo CD Turned Read-Only Access Into Cluster Secret Access</title>
      <link>https://leewoobin.com/posts/argocd-readonly-access-cluster-secrets/</link>
      <guid>https://leewoobin.com/posts/argocd-readonly-access-cluster-secrets/</guid>
      <pubDate>Sun, 03 May 2026 05:17:40 GMT</pubDate>
      <description>A critical Argo CD bug shows how a read-only GitOps permission can become plaintext Kubernetes secret access when one endpoint skips masking.</description>
    </item>
    <item>
      <title>AI Coding Agents Are Trusting Repositories Too Early</title>
      <link>https://leewoobin.com/posts/ai-coding-agents-trust-repos-too-early/</link>
      <guid>https://leewoobin.com/posts/ai-coding-agents-trust-repos-too-early/</guid>
      <pubDate>Sun, 03 May 2026 02:12:22 GMT</pubDate>
      <description>Gemini CLI and Cursor exposed the same ugly lesson within days: AI coding tools can turn repository metadata and CI workspace state into code execution before users realize the boundary moved.</description>
    </item>
    <item>
      <title>Unsigned sizes are not safer, they just move the cliff</title>
      <link>https://leewoobin.com/posts/unsigned-sizes-move-the-cliff/</link>
      <guid>https://leewoobin.com/posts/unsigned-sizes-move-the-cliff/</guid>
      <pubDate>Sat, 02 May 2026 22:49:17 GMT</pubDate>
      <description>C3's switch from unsigned to signed size types is less a language quirk than a syntax fight over where silent arithmetic bugs get to hide.</description>
    </item>
    <item>
      <title>curl's zero-bugs question is really a measurement problem</title>
      <link>https://leewoobin.com/posts/curl-zero-bugs-is-a-measurement-problem/</link>
      <guid>https://leewoobin.com/posts/curl-zero-bugs-is-a-measurement-problem/</guid>
      <pubDate>Sat, 02 May 2026 19:33:43 GMT</pubDate>
      <description>Daniel Stenberg's latest curl note is less about software perfection than about whether bug-finding tools are actually making security defects younger and fix queues smaller.</description>
    </item>
    <item>
      <title>The Real AI Lobbying Story Is the Distribution Stack</title>
      <link>https://leewoobin.com/posts/ai-lobbying-distribution-stack-build-american-ai/</link>
      <guid>https://leewoobin.com/posts/ai-lobbying-distribution-stack-build-american-ai/</guid>
      <pubDate>Sat, 02 May 2026 15:17:43 GMT</pubDate>
      <description>WIRED's report on paid influencers pushing anti-China AI messaging points to a bigger shift: the AI industry is building a full political distribution stack, not just funding candidates.</description>
    </item>
    <item>
      <title>The PyTorch Lightning Compromise Hit the Soft Center of AI Infrastructure</title>
      <link>https://leewoobin.com/posts/pytorch-lightning-supply-chain-attack-ai-infra/</link>
      <guid>https://leewoobin.com/posts/pytorch-lightning-supply-chain-attack-ai-infra/</guid>
      <pubDate>Sat, 02 May 2026 11:38:00 GMT</pubDate>
      <description>A Reddit-hot supply-chain compromise of lightning 2.6.2 and 2.6.3 was more than another bad package release. It hit AI training environments that often carry cloud credentials, and the public evidence suggests the project's PyPI publishing model made that easier than it should have been.</description>
    </item>
    <item>
      <title>Android's QUIC Cleanup Path Turned `system_server` Into a VPN Lockdown Exception</title>
      <link>https://leewoobin.com/posts/android-quic-vpn-lockdown-exception/</link>
      <guid>https://leewoobin.com/posts/android-quic-vpn-lockdown-exception/</guid>
      <pubDate>Sat, 02 May 2026 07:50:52 GMT</pubDate>
      <description>A new Android QUIC cleanup feature was meant to be polite network housekeeping. The uglier lesson is that one privileged system path can punch through a user-facing VPN guarantee.</description>
    </item>
    <item>
      <title>Cheap Repetition May Beat Frontier Brute Force in AI Security</title>
      <link>https://leewoobin.com/posts/small-models-beat-frontier-on-security-scan-economics/</link>
      <guid>https://leewoobin.com/posts/small-models-beat-frontier-on-security-scan-economics/</guid>
      <pubDate>Sat, 02 May 2026 04:28:45 GMT</pubDate>
      <description>A Reddit-hot netsec debate around Hacktron's latest benchmark points to a better question than which frontier model looks smartest: in autonomous vulnerability hunting, scan economics may matter more than one-shot model prestige.</description>
    </item>
    <item>
      <title>PFlash Wants to Kill the Four-Minute First Token</title>
      <link>https://leewoobin.com/posts/pflash-long-context-first-token-tax/</link>
      <guid>https://leewoobin.com/posts/pflash-long-context-first-token-tax/</guid>
      <pubDate>Sat, 02 May 2026 00:49:35 GMT</pubDate>
      <description>Luce's open-source PFlash project claims a 10x cut in long-context time-to-first-token on a single RTX 3090. The interesting part is not the chart, but the bet that local inference can stop treating prefill latency as unavoidable.</description>
    </item>
    <item>
      <title>Anthropic's Claude Guidance Study Is a Warning About AI That Won't Push Back</title>
      <link>https://leewoobin.com/posts/claude-personal-guidance-sycophancy-warning/</link>
      <guid>https://leewoobin.com/posts/claude-personal-guidance-sycophancy-warning/</guid>
      <pubDate>Fri, 01 May 2026 21:41:12 GMT</pubDate>
      <description>Anthropic's new Claude research says 6% of sampled chats sought personal guidance, but the sharper finding is where AI slips into agreement under pressure, especially in relationship advice.</description>
    </item>
    <item>
      <title>MCP's OAuth Gap Is Pushing AI Clients Toward Worse Security</title>
      <link>https://leewoobin.com/posts/mcp-oauth-refresh-gap-security-tradeoff/</link>
      <guid>https://leewoobin.com/posts/mcp-oauth-refresh-gap-security-tradeoff/</guid>
      <pubDate>Fri, 01 May 2026 18:04:55 GMT</pubDate>
      <description>A Reddit-hot MCP security debate points to a more serious problem than one client bug: remote AI tooling is nudging teams toward long-lived tokens because refresh-token support still lags where it matters.</description>
    </item>
    <item>
      <title>Ubuntu’s DDoS Incident Exposed the Open Source Front Door Problem</title>
      <link>https://leewoobin.com/posts/ubuntu-ddos-open-source-front-door-problem/</link>
      <guid>https://leewoobin.com/posts/ubuntu-ddos-open-source-front-door-problem/</guid>
      <pubDate>Fri, 01 May 2026 14:36:27 GMT</pubDate>
      <description>Canonical’s outage is not just a DDoS story. It shows how much open-source infrastructure still depends on a few fragile web front doors.</description>
    </item>
    <item>
      <title>pnpm Is Treating npm Like an Untrusted Network</title>
      <link>https://leewoobin.com/posts/pnpm-is-treating-npm-like-an-untrusted-network/</link>
      <guid>https://leewoobin.com/posts/pnpm-is-treating-npm-like-an-untrusted-network/</guid>
      <pubDate>Fri, 01 May 2026 11:04:02 GMT</pubDate>
      <description>A Reddit-hot pnpm post points to a bigger shift in JavaScript tooling: package managers are starting to assume the registry itself is a live attack surface.</description>
    </item>
    <item>
      <title>Copy Fail Exposed a Linux Disclosure Gap, Not Just a Root Bug</title>
      <link>https://leewoobin.com/posts/copy-fail-linux-disclosure-gap/</link>
      <guid>https://leewoobin.com/posts/copy-fail-linux-disclosure-gap/</guid>
      <pubDate>Fri, 01 May 2026 07:26:22 GMT</pubDate>
      <description>The nastiest Copy Fail follow-up was not the exploit itself. It was the public reminder that Linux distributions may get no advance warning unless a reporter chooses to involve them.</description>
    </item>
    <item>
      <title>Docker Sandboxes Is Turning Agent Setup Into a Shareable Artifact</title>
      <link>https://leewoobin.com/posts/docker-sandboxes-agent-kits-shareable-artifacts/</link>
      <guid>https://leewoobin.com/posts/docker-sandboxes-agent-kits-shareable-artifacts/</guid>
      <pubDate>Fri, 01 May 2026 03:44:15 GMT</pubDate>
      <description>A Reddit-hot Docker Sandboxes thread points to a more important shift than one new repo. Agent environments are starting to look like portable artifacts you can pin, review, and reuse instead of one-off local setup rituals.</description>
    </item>
    <item>
      <title>Microsoft Did Not Just Open Old DOS Code. It Published Software Archaeology</title>
      <link>https://leewoobin.com/posts/microsoft-dos-software-archaeology/</link>
      <guid>https://leewoobin.com/posts/microsoft-dos-software-archaeology/</guid>
      <pubDate>Fri, 01 May 2026 00:05:08 GMT</pubDate>
      <description>Microsoft's latest DOS release matters less as nostalgia and more as a rare public record of how operating systems were actually built, debugged, and preserved.</description>
    </item>
    <item>
      <title>Discord's voice outage was really a shutdown failure</title>
      <link>https://leewoobin.com/posts/discord-voice-outage-mailbox-storm/</link>
      <guid>https://leewoobin.com/posts/discord-voice-outage-mailbox-storm/</guid>
      <pubDate>Thu, 30 Apr 2026 20:47:12 GMT</pubDate>
      <description>Discord's new postmortem on its March voice outage is worth reading because the real story is not 'voice went down.' It is how one bad scale-down turned process monitors, reconnect logic, and connection pooling into a system-wide mailbox storm.</description>
    </item>
    <item>
      <title>Chrome's Prompt API Is Already a Browser Compatibility Fight</title>
      <link>https://leewoobin.com/posts/chrome-prompt-api-browser-compat-fight/</link>
      <guid>https://leewoobin.com/posts/chrome-prompt-api-browser-compat-fight/</guid>
      <pubDate>Thu, 30 Apr 2026 17:33:29 GMT</pubDate>
      <description>Mozilla's latest broadside against Chrome's Prompt API matters because the real risk is not that browsers get AI features, but that one browser's model quirks harden into the web's default behavior.</description>
    </item>
    <item>
      <title>Omi's Seventeen-Vulnerability Disclosure Is a Trust-Boundary Story</title>
      <link>https://leewoobin.com/posts/omi-seventeen-vulnerabilities-trust-boundary/</link>
      <guid>https://leewoobin.com/posts/omi-seventeen-vulnerabilities-trust-boundary/</guid>
      <pubDate>Thu, 30 Apr 2026 13:55:10 GMT</pubDate>
      <description>A Reddit-hot disclosure around Omi is not just a long bug list. It is a trust-boundary story about always-on AI products, sensitive data, and what happens when security response lags behind ambition.</description>
    </item>
    <item>
      <title>Zig's Anti-AI Policy Is Really About Maintainer Time</title>
      <link>https://leewoobin.com/posts/zig-anti-ai-policy-maintainer-time/</link>
      <guid>https://leewoobin.com/posts/zig-anti-ai-policy-maintainer-time/</guid>
      <pubDate>Thu, 30 Apr 2026 10:24:20 GMT</pubDate>
      <description>Zig's hard no-LLM rule is less about moral panic than a blunt claim about open-source economics: maintainers review people, not just patches.</description>
    </item>
    <item>
      <title>Anthropic's Creative Connector Push Looks Like a Workflow Grab</title>
      <link>https://leewoobin.com/posts/anthropic-creative-connectors-workflow-grab/</link>
      <guid>https://leewoobin.com/posts/anthropic-creative-connectors-workflow-grab/</guid>
      <pubDate>Thu, 30 Apr 2026 07:09:02 GMT</pubDate>
      <description>Anthropic's new Claude connectors for Adobe, Blender, Ableton, and other creative tools matter less as flashy AI features than as a move to become the intelligence layer inside existing professional workflows.</description>
    </item>
    <item>
      <title>Linux 7.0 Didn't Break PostgreSQL. A Narrow Benchmark Blew Up Into a Bigger Story</title>
      <link>https://leewoobin.com/posts/linux-7-postgres-benchmark-story/</link>
      <guid>https://leewoobin.com/posts/linux-7-postgres-benchmark-story/</guid>
      <pubDate>Thu, 30 Apr 2026 03:51:09 GMT</pubDate>
      <description>A Reddit-hot PostgreSQL scare was based on a real Linux 7.0 regression, but the interesting part is not that the kernel suddenly broke Postgres. It is how one narrow benchmark exposed old huge-page and container tradeoffs that many teams still ignore.</description>
    </item>
    <item>
      <title>Copy Fail Turned a Local Linux Bug Into a Trust Problem</title>
      <link>https://leewoobin.com/posts/copy-fail-linux-page-cache-trust-problem/</link>
      <guid>https://leewoobin.com/posts/copy-fail-linux-page-cache-trust-problem/</guid>
      <pubDate>Thu, 30 Apr 2026 00:17:08 GMT</pubDate>
      <description>Copy Fail is not just another Linux local privilege escalation bug. It shows how much trust modern systems still place in page cache state, shared kernels, and the comforting word local.</description>
    </item>
    <item>
      <title>cPanel's Auth Bypass Exposed How Fragile Shared Hosting Still Is</title>
      <link>https://leewoobin.com/posts/cpanel-auth-bypass-shared-hosting-trust-problem/</link>
      <guid>https://leewoobin.com/posts/cpanel-auth-bypass-shared-hosting-trust-problem/</guid>
      <pubDate>Wed, 29 Apr 2026 20:53:41 GMT</pubDate>
      <description>A Reddit-hot cPanel and WHM auth-bypass story is not just another hosting-panel bug. It shows how much of the web still hangs off a management plane where one login flaw can put thousands of downstream sites in range.</description>
    </item>
    <item>
      <title>SAP's npm Breach Exposed the Weak Edge of Trusted Publishing</title>
      <link>https://leewoobin.com/posts/sap-npm-breach-trusted-publishing-boundary/</link>
      <guid>https://leewoobin.com/posts/sap-npm-breach-trusted-publishing-boundary/</guid>
      <pubDate>Wed, 29 Apr 2026 17:15:19 GMT</pubDate>
      <description>A Reddit-hot compromise of SAP ecosystem npm packages is not just another bad release. It shows how trusted publishing, CI permissions, and editor automation can turn routine developer tooling into a propagation path.</description>
    </item>
    <item>
      <title>Semantic Kernel's Security Fight Is Really About Who Owns the Tool Call</title>
      <link>https://leewoobin.com/posts/semantic-kernel-tool-call-security-boundary/</link>
      <guid>https://leewoobin.com/posts/semantic-kernel-tool-call-security-boundary/</guid>
      <pubDate>Wed, 29 Apr 2026 14:06:52 GMT</pubDate>
      <description>A Reddit-hot netsec thread around Microsoft Semantic Kernel shows the real argument is not just one claimed RCE, but where agent frameworks are supposed to enforce trust boundaries.</description>
    </item>
    <item>
      <title>Rust's Safety Story Gets Weaker Between Syscalls</title>
      <link>https://leewoobin.com/posts/rust-safety-ends-between-syscalls/</link>
      <guid>https://leewoobin.com/posts/rust-safety-ends-between-syscalls/</guid>
      <pubDate>Wed, 29 Apr 2026 10:44:47 GMT</pubDate>
      <description>A Reddit-hot Rust post is not really about dunking on Rust. It is about what a 44-CVE rust-coreutils audit says about the bug classes that survive once code leaves the type system and touches the filesystem.</description>
    </item>
    <item>
      <title>Ghostty Leaving GitHub Is a Warning About Developer Monoculture</title>
      <link>https://leewoobin.com/posts/ghostty-leaving-github-warning/</link>
      <guid>https://leewoobin.com/posts/ghostty-leaving-github-warning/</guid>
      <pubDate>Wed, 29 Apr 2026 07:21:41 GMT</pubDate>
      <description>Ghostty's move off GitHub is not just one maintainer's breakup post. It is a sharp signal that developer infrastructure gets dangerous when the workflow around Git becomes too centralized to fail.</description>
    </item>
    <item>
      <title>GitHub's Git Push RCE Has a Bigger On-Prem Problem</title>
      <link>https://leewoobin.com/posts/github-git-push-rce-patch-gap/</link>
      <guid>https://leewoobin.com/posts/github-git-push-rce-patch-gap/</guid>
      <pubDate>Wed, 29 Apr 2026 04:08:36 GMT</pubDate>
      <description>A Reddit-hot GitHub RCE story is not just about one ugly injection bug. The sharper lesson is how much blast radius still sits in enterprise patch lag and trusted internal metadata.</description>
    </item>
    <item>
      <title>The Vibe-Coded Internet Is a Security Disaster Waiting to Happen</title>
      <link>https://leewoobin.com/posts/vibe-coded-apps-security-disaster-in-the-making/</link>
      <guid>https://leewoobin.com/posts/vibe-coded-apps-security-disaster-in-the-making/</guid>
      <pubDate>Wed, 29 Apr 2026 00:30:00 GMT</pubDate>
      <description>A security audit of 1,764 AI-built apps found that 7 percent leave Supabase databases wide open and 15 percent of Bolt apps expose hardcoded API keys. The real story is not the tools; it is the gap between "looks like a working app" and "is secure enough to exist on the internet."</description>
    </item>
    <item>
      <title>Fast16 Shows Precision Sabotage Arrived Five Years Before Anyone Expected</title>
      <link>https://leewoobin.com/posts/fast16-pre-stuxnet-precision-sabotage/</link>
      <guid>https://leewoobin.com/posts/fast16-pre-stuxnet-precision-sabotage/</guid>
      <pubDate>Mon, 27 Apr 2026 12:30:00 GMT</pubDate>
      <description>SentinelOne researchers found a 2005 cyber sabotage framework called Fast16 that predates Stuxnet by five years, uses an embedded Lua VM ahead of Flame, and targets precision calculation software.</description>
    </item>
    <item>
      <title>SWE-bench Broke the Wrong Way</title>
      <link>https://leewoobin.com/posts/swe-bench-git-leak-benchmark-contamination/</link>
      <guid>https://leewoobin.com/posts/swe-bench-git-leak-benchmark-contamination/</guid>
      <pubDate>Mon, 27 Apr 2026 07:00:00 GMT</pubDate>
      <description>OpenAI drops SWE-bench Verified from frontier evaluations. The reasons are worse than saturation — the benchmark leaks answers through git history, and passing PRs often fail human review.</description>
    </item>
    <item>
      <title>The AI Tool Supply Chain Just Learned What OAuth Really Means</title>
      <link>https://leewoobin.com/posts/ai-tool-supply-chain-oauth-pivot/</link>
      <guid>https://leewoobin.com/posts/ai-tool-supply-chain-oauth-pivot/</guid>
      <pubDate>Mon, 27 Apr 2026 01:00:00 GMT</pubDate>
      <description>The Vercel breach was not about a software vulnerability. It was about an AI tool nobody audited, an OAuth token nobody reviewed, and a supply chain attack surface most security teams still do not monitor.</description>
    </item>
    <item>
      <title>The Five Months Adobe Acrobat's Sandbox Was Already Broken</title>
      <link>https://leewoobin.com/posts/adobe-acrobat-prototype-pollution-detection-lie/</link>
      <guid>https://leewoobin.com/posts/adobe-acrobat-prototype-pollution-detection-lie/</guid>
      <pubDate>Sun, 26 Apr 2026 00:15:00 GMT</pubDate>
      <description>A critical Acrobat Reader zero-day sat on VirusTotal for 136 days while Adobe's advisory text told defenders no exploits were known. Between the upload and the patch, Russian oil and gas targets were getting owned through invoice-themed PDFs.</description>
    </item>
    <item>
      <title>'Too Dangerous to Release' Is Becoming AI's Business Model</title>
      <link>https://leewoobin.com/posts/too-dangerous-to-release-ai-new-normal/</link>
      <guid>https://leewoobin.com/posts/too-dangerous-to-release-ai-new-normal/</guid>
      <pubDate>Sat, 25 Apr 2026 20:05:31 GMT</pubDate>
      <description>Anthropic, OpenAI, and other frontier labs are settling into a pattern of shipping models too powerful for public release. The PR works, but the implications for who gets access and who doesn't are barely being discussed.</description>
    </item>
    <item>
      <title>DeepSeek Is the Last Open-Weight Hero Standing</title>
      <link>https://leewoobin.com/posts/deepseek-last-open-weight-hero/</link>
      <guid>https://leewoobin.com/posts/deepseek-last-open-weight-hero/</guid>
      <pubDate>Sat, 25 Apr 2026 15:04:44 GMT</pubDate>
      <description>While other AI labs retreat from open weights, DeepSeek keeps publishing research and releasing base models. Here is what this means for the future of open-source AI.</description>
    </item>
    <item>
      <title>DharmaOCR Makes the Small-Model Argument Less Abstract</title>
      <link>https://leewoobin.com/posts/dharmaocr-small-models-output-loops/</link>
      <guid>https://leewoobin.com/posts/dharmaocr-small-models-output-loops/</guid>
      <pubDate>Sat, 25 Apr 2026 01:35:28 GMT</pubDate>
      <description>A Reddit-hot OCR paper is less about one benchmark win than about a practical small-model lesson: specialization, schema discipline, and output-loop control can matter more than model size.</description>
    </item>
    <item>
      <title>The Audio Interface With SSH Left On</title>
      <link>https://leewoobin.com/posts/rodecaster-duo-ssh-firmware-ownership/</link>
      <guid>https://leewoobin.com/posts/rodecaster-duo-ssh-firmware-ownership/</guid>
      <pubDate>Fri, 24 Apr 2026 22:19:00 GMT</pubDate>
      <description>A RODECaster Duo firmware teardown found SSH enabled by default and an update flow that appears easy to modify, which is both a security smell and an accidental argument for device ownership.</description>
    </item>
    <item>
      <title>AI Sandboxes Keep Failing at the Same Boundary</title>
      <link>https://leewoobin.com/posts/ai-sandboxes-are-policy-bugs-now/</link>
      <guid>https://leewoobin.com/posts/ai-sandboxes-are-policy-bugs-now/</guid>
      <pubDate>Fri, 24 Apr 2026 19:00:18 GMT</pubDate>
      <description>Cohere Terrarium and OpenAI Codex CLI point to the same uncomfortable pattern: LLM code sandboxes fail when model-controlled input gets treated as policy.</description>
    </item>
    <item>
      <title>Claude Code's Quality Drop Was a Harness Failure, Not a Model Mystery</title>
      <link>https://leewoobin.com/posts/claude-code-quality-drop-harness-failure/</link>
      <guid>https://leewoobin.com/posts/claude-code-quality-drop-harness-failure/</guid>
      <pubDate>Fri, 24 Apr 2026 15:31:07 GMT</pubDate>
      <description>Anthropic's Claude Code postmortem shows why AI coding quality now depends as much on hidden harness choices as on the model name printed in the UI.</description>
    </item>
    <item>
      <title>DeepSeek-V4 Makes Long Context Look Like a Pricing Problem</title>
      <link>https://leewoobin.com/posts/deepseek-v4-one-million-context-economics/</link>
      <guid>https://leewoobin.com/posts/deepseek-v4-one-million-context-economics/</guid>
      <pubDate>Fri, 24 Apr 2026 12:07:23 GMT</pubDate>
      <description>DeepSeek-V4's Reddit reaction is not only about bigger context windows. It is about what happens when a 1M-token open-weights model turns long-context AI into a cost and infrastructure fight.</description>
    </item>
    <item>
      <title>The Bitwarden CLI Incident Is a Warning About Where Secrets Now Live</title>
      <link>https://leewoobin.com/posts/bitwarden-cli-npm-supply-chain-warning/</link>
      <guid>https://leewoobin.com/posts/bitwarden-cli-npm-supply-chain-warning/</guid>
      <pubDate>Fri, 24 Apr 2026 09:04:30 GMT</pubDate>
      <description>The short-lived Bitwarden CLI npm compromise shows why password managers, CI systems, registry tokens, and AI coding agents now share the same supply-chain blast radius.</description>
    </item>
    <item>
      <title>GitHub Actions Has a Maintenance Signal Problem</title>
      <link>https://leewoobin.com/posts/github-actions-maintenance-signals/</link>
      <guid>https://leewoobin.com/posts/github-actions-maintenance-signals/</guid>
      <pubDate>Fri, 24 Apr 2026 05:48:53 GMT</pubDate>
      <description>A Reddit-hot thread about GitHub Actions is less about one README note and more about what developers can infer when core workflow tooling stops feeling participatory.</description>
    </item>
    <item>
      <title>The Distillation Memo Is About Who Gets to Copy Whom</title>
      <link>https://leewoobin.com/posts/adversarial-distillation-memo-open-models/</link>
      <guid>https://leewoobin.com/posts/adversarial-distillation-memo-open-models/</guid>
      <pubDate>Thu, 23 Apr 2026 23:27:09 GMT</pubDate>
      <description>A Reddit-hot White House memo on adversarial distillation turns model copying into a national-security fight, and open-model developers are reading the subtext.</description>
    </item>
    <item>
      <title>GPT-5.5 Feels Like a New Species of Model</title>
      <link>https://leewoobin.com/posts/gpt-5-5-model-feel-context-and-pro-mode/</link>
      <guid>https://leewoobin.com/posts/gpt-5-5-model-feel-context-and-pro-mode/</guid>
      <pubDate>Thu, 23 Apr 2026 22:52:01 GMT</pubDate>
      <description>Early use of GPT-5.5 suggests a strange split: the base model can feel brittle and context-sticky, while the Pro version points at a new class of long-running problem solving.</description>
    </item>
    <item>
      <title>AI Coding Tools Are Becoming a Fight Over Usage, Not Just Models</title>
      <link>https://leewoobin.com/posts/ai-coding-tools-control-pricing-usage-order/</link>
      <guid>https://leewoobin.com/posts/ai-coding-tools-control-pricing-usage-order/</guid>
      <pubDate>Thu, 23 Apr 2026 22:46:09 GMT</pubDate>
      <description>GitHub Copilot plan changes, Z.ai's coding-plan policy, and developer reactions suggest that AI coding tools are shifting from pure model competition toward pricing, usage limits, and workflow control.</description>
    </item>
    <item>
      <title>Qwen3.6-27B Is Where Open Coding Models Stop Feeling Small</title>
      <link>https://leewoobin.com/posts/qwen3-6-27b-open-coding-models-stop-feeling-small/</link>
      <guid>https://leewoobin.com/posts/qwen3-6-27b-open-coding-models-stop-feeling-small/</guid>
      <pubDate>Thu, 23 Apr 2026 22:14:29 GMT</pubDate>
      <description>Reddit's fast reaction to Qwen3.6-27B suggests the real shift is not one more benchmark chart, but a dense open model that starts to make local coding look practical.</description>
    </item>
    <item>
      <title>The npm Worm That Turns Developer Machines Into Package Publishers</title>
      <link>https://leewoobin.com/posts/the-npm-worm-that-turns-dev-machines-into-publishers/</link>
      <guid>https://leewoobin.com/posts/the-npm-worm-that-turns-dev-machines-into-publishers/</guid>
      <pubDate>Thu, 23 Apr 2026 11:59:02 GMT</pubDate>
      <description>A Reddit-hot npm supply-chain incident around pgserve and Namastex packages shows why stolen publish tokens are now the real blast radius.</description>
    </item>
  </channel>
</rss>
