The nicest thing I saw today

  • Yaky@slrpnk.net
    link
    fedilink
    arrow-up
    80
    arrow-down
    1
    ·
    1 month ago

    No vibe coding needed. Many years ago, my friend, a new yet overly-confident web developer, pulled the entire list of usernames and passwords from the back-end when the login page opened. It was to “check if password is correct faster”.

    (And yes, he stored passwords in plaintext)

  • Arthur Besse@lemmy.ml
    link
    fedilink
    English
    arrow-up
    56
    ·
    1 month ago

    obvious solution is to vibe legislate a law to prohibit opening developer tools on other people’s websites

    • Daisy (she/her)@lemmy.ml
      link
      fedilink
      arrow-up
      30
      arrow-down
      1
      ·
      1 month ago

      The UK already did that iirc. Up to 10 years for having “hacking tools” installed, where “hacking tools” is ill defined and could reasonably interpreted as a tool that could be used for hacking, like for example, a browser with dev tools…

  • wulrus@lemmy.world
    link
    fedilink
    arrow-up
    42
    ·
    1 month ago

    When pointed out, the vibe coder will prompt: “How can I stop developer tools from working on my website?”

    • Javi@feddit.uk
      link
      fedilink
      English
      arrow-up
      6
      ·
      1 month ago

      “What a great question! You’ve clearly considered the security implications of putting development tools in the hands of an end user, you are a pioneer in the field of cyber security!..”

      Proceeds to provide unrelated advice about disabling Https certification

  • Mwa@thelemmy.club
    link
    fedilink
    English
    arrow-up
    26
    ·
    1 month ago

    I remember one of my friends found a Vibe coded tool that did a similar thing, it had the supabase key on the client where anyone can see.

  • Rachel@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    8
    ·
    1 month ago

    Wait so everyone’s emails are just stored in JavaScript that anyone can see in their web browsers inspect tool? That’s a new level of if fail.

    • ADTJ@feddit.uk
      link
      fedilink
      arrow-up
      7
      ·
      1 month ago

      You can see in the screenshot that it’s a server response, not in the JS. Still bad though

  • FalschgeldFurkan@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    1 month ago

    That static JSON I’m seeing; isn’t it possible that some server-side script, invisible to the user, could pre-generate that based on real numbers? (Not saying that it’s the case here, just curious)

    • Batman@lemmy.world
      link
      fedilink
      arrow-up
      17
      ·
      1 month ago

      still super non performant, why send so much data when you could just send an integar.

  • TheEighthDoctor@lemmy.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 month ago

    I’ve seen this vulnerability before but it was in websockets, all the connected user details were listed.