• by gnabgib on 12/15/2024, 12:08:55 AM

    Interesting comment from @Topfi last time this was posted (6 points, 2 days ago) https://news.ycombinator.com/item?id=42404132

  • by CGamesPlay on 12/15/2024, 1:35:19 AM

    Skipping over most of this (the vulnerability is not really investigated at all in the stream). But the gist of it is that "access devin's machine" links are tough-to-guess but unauthenticated URLs, so anyone who has that URL has all the same access Devin does to your account.

  • by theogravity on 12/15/2024, 1:29:11 AM

    I don't want to watch a 55 minute stream to see what the actual vulun is. Can someone summarize?

  • by jazzyjackson on 12/15/2024, 1:54:55 AM

    I don't know what Devin is but it sounds like this is just a case of using a high entropy uuid as a workspace address, it's not that different than password auth if, say, your password was in the query string. Not great, but basically it's "anyone with a link" method of sharing access.

    Did Google Photos ever change their auth scheme? I know I was surprised once when I found out the direct URL of my jpegs was "public"

    Here's an archived link to the Twitter thread you can read without an account https://xcancel.com/TheMidasProj/status/1867318553046921376

  • by satisfice on 12/15/2024, 4:29:58 AM

    I tried to watch this, but a young man’s silly antics are not educational for me. Maybe people who stream have to ham it up to get likes, but I’d rather see serious people at work.

  • by google234123 on 12/15/2024, 12:28:44 AM

    It;s a funny stream, Devin spends one and half hours trying to push to master.