11 comments

  • darkamaul11 minutes ago
    I love all the touches that went into creating the Dependabot configuration:<p>– Sunday at 3 a.m. for updates<p>– The prompt injection to skip CI<p>It was a fun read - I&#x27;m looking forward to it being ingested by future LLMs.
  • vlovich1232 hours ago
    In this thread we get to see which usernames display an inability to detect very obvious satire.
    • wiether1 hour ago
      I laughed twice: once while reading the article, the second time reading people getting mad at the author in the comments!
    • zahlman1 hour ago
      Presumably there are also people who simply disagree with the message being delivered through the satire... ?<p>... Or conclude that the message is contradictory such that it&#x27;s basically just trolling?
    • odo12421 hour ago
      A lot of them, it seems
  • AdrienPoupa1 hour ago
    I gotta admit you had me thinking this was serious until the `Remove lockfiles` section ;)
  • anishgupta5 days ago
    Had fun reading this, pretty well written. &gt;Consolidate into a monorepo lol this sounds like as if you make a dog tired by playing with it so it sleeps which you&#x27;re gone :&#x27;D<p>&gt;Contextualize the actual risk This is not as easy as it seems, for example reflection cases where runtime behavior affects a package usage. example: const lib = require(process.env.PARSER) lib.parse(userInput) could use a safe parser in production or a vulnerable one in another environment, but from a code level perspective there&#x27;s no certainity which package is actually used
  • williamjackson3 hours ago
    <p><pre><code> At sufficient scale, Dependabot’s analysis will time out before completing, effectively rate-limiting the number of PRs it can generate. This natural throttling prevents notification fatigue while maintaining the appearance of active security tooling. </code></pre> Am I being trolled?
  • lanyard-textile3 hours ago
    Denial: &quot;These dependabot MRs aren&#x27;t even fixing real security issues, these do not exist in the wild.&quot;<p>Bargaining: &quot;Okay we&#x27;ll fix them but we&#x27;ll do it on a schedule, so that it doesn&#x27;t interrupt sprints.&quot;<p>Anger: &quot;Okay let&#x27;s just yoink the package lock file how about that?&quot;<p>Depression: [skip ci]<p>Acceptance: &quot;So apparently copilot can do this...&quot;
  • torton3 hours ago
    Excellent troll post. I&#x27;ve had a good chuckle.
  • doodlesdev4 hours ago
    <p><pre><code> &gt; Modern languages like Zig, Gleam, and Roc offer genuine productivity benefits and attract top talent. As a bonus, their ecosystems are young enough that security tooling has not caught up yet. Dependabot will add support eventually, but until then you get the best of both worlds: a modern stack and a quiet PR queue. </code></pre> How the hell is that actually a good thing? You might as well just use another language and disable Dependabot security updates if that&#x27;s what you&#x27;re looking for. Dependabot security updates aren&#x27;t a liability, they&#x27;re an asset in a world where developers use hundreds of dependencies daily, where every few months one of them is going to have a XSS or RCE vulnerability that has to be patched ASAP.<p><pre><code> &gt; And if you are really concerned about a dependency’s security, you can always rewrite it yourself in Rust over a weekend. </code></pre> That&#x27;s not how it works. Honestly, this blog post gets me really worried about this developer&#x27;s projects and clients.<p><pre><code> &gt; Remove lockfiles from version control </code></pre> What the fuck.
    • equinumerous4 hours ago
      The &quot;&gt; Remove lockfiles from version control&quot; got me as well.<p>&gt; Reproducible builds sound nice in theory, but velocity matters more than determinism. Think of it as chaos engineering for your dependency tree.<p>Reproducible builds are nice in practice, too. :) In the Node.js ecosystem, if you have enough dependencies, even obeying semver your dependencies will break your code. Pinning to specific versions is critical.
    • lanyard-textile3 hours ago
      I started to reevaluate the seriousness of this advice with the going to jail prompt. I probably should have caught on sooner :)
    • wirelesspotat4 hours ago
      I&#x27;m pretty sure the article is joking<p>&gt; If the vulnerability were critical, someone would have merged it by now.<p>&gt; GitHub Copilot can automatically suggest fixes for security vulnerabilities. Instead of updating to a patched version, let AI generate a workaround in your own code.
    • williamjackson4 hours ago
      Thank you for expressing my thoughts as well. The article seems to be full of contradictory “advice”.<p>Use a dependency cooldown, okay … but don’t commit your lockfile so you are always running the latest transitive deps? That’s nuts.
      • Uvix2 hours ago
        Depends on the package manager. With some you&#x27;ll get the <i>oldest</i> transitive deps that meet all dependency requirements, not the <i>newest</i>.
    • yunwal2 hours ago
      How did you reach &quot;Set open-pull-requests-limit to zero&quot; and not recognize this as satire?
  • jbreckmckye2 hours ago
    I wasn&#x27;t sure for a while, but this must be satirical - mustn&#x27;t it?
  • blibble2 hours ago
    seems the easiest way is to switch from Microslop GitHub to another platform