jade's Avatar

jade

@jade.fyi

mostly on mastodon https://hachyderm.io/@leftpaddotpy webbed site: https://jade.fyi

74
Followers
88
Following
127
Posts
08.12.2024
Joined
Posts Following

Latest posts by jade @jade.fyi

Preview
TLA+ as a Design Accelerator: Lessons from the Industry After 15+ years of using TLA+, I now think of it is a design accelerator. One of the purest intellectual pleasures is finding a way to simpl...

[new blog post]

TLA+ as a Design Accelerator: Lessons from the Industry

muratbuffalo.blogspot.com/2026/03/tla-...

10.03.2026 21:33 πŸ‘ 13 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

i like the solution of explicitly stating the security model because it makes the expectations clear. and i think overall open source security response (having done it myself) is much less stressful if non critical stuff is just bugs rather than "oh no a cve, hair on fire".

10.03.2026 16:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

yeah, to be clear, i want this protocol to succeed: not having indices is nice and i generally feel like avro is quite nice overall (and certainly has a better Haskell impl than protobuf), but i just accidentally found these impl issues that any of us could have written.

10.03.2026 16:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

enormously hot take: the reason a bunch of midwit software dev people are in their feels about agentic tooling is that it proves that good requirements specification and technical project management were the hard problem it's important for a human to be able to solve all along, not Codingβ„’

09.03.2026 19:21 πŸ‘ 322 πŸ” 39 πŸ’¬ 15 πŸ“Œ 12
Pauly Walnuts very seriously telling someone that β€œit’s called Broad daylight because women light up the world”

Pauly Walnuts very seriously telling someone that β€œit’s called Broad daylight because women light up the world”

international women’s day

08.03.2026 15:07 πŸ‘ 14328 πŸ” 4296 πŸ’¬ 31 πŸ“Œ 42
Post image
08.03.2026 20:10 πŸ‘ 852 πŸ” 62 πŸ’¬ 10 πŸ“Œ 0

*looks inside* claudeslop readme
*closes tab*

08.03.2026 18:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

we just live in hell where vendors want to build moats, but MCP itself has done progress on this interop that nobody has done before, just in a very dumb way

08.03.2026 18:39 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

incredible. that's so much fail

08.03.2026 17:57 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

you *can* just do this actually :) we yolo'd "prs should ideally be 300 lines or less" into there hehehe

08.03.2026 17:35 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

concept: put safety ii propaganda in AGENTS.md

08.03.2026 17:34 πŸ‘ 1 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0

lesbians are soooo cool goddamn

08.03.2026 06:33 πŸ‘ 438 πŸ” 90 πŸ’¬ 8 πŸ“Œ 1

curious about siso here actually: does it do the same thing? does it just not have observability? what's up with this

08.03.2026 17:25 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Glean | Glean System for collecting, deriving and querying facts about source code

i did this to glean.software, gave it the spec and the schema and a repl and it wrote the query i wanted. i had it expand from a single example to a more generic query.

08.03.2026 04:25 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

makes me think about the work with m1n1 on the asahi project. if you can sandbox the gremlins in your computer and have a target that isn't especially breakable, it's very believable.

07.03.2026 22:29 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
an artwork by Spindle of the character Ottilie, a human with brown hair tied up a bun, wearing a black turtleneck, green cardigan, and yellow socks. Sitting in the "Bad Girlfriend Box." Because she ate all the cookies

an artwork by Spindle of the character Ottilie, a human with brown hair tied up a bun, wearing a black turtleneck, green cardigan, and yellow socks. Sitting in the "Bad Girlfriend Box." Because she ate all the cookies

the girlfriend punishment box

06.03.2026 21:22 πŸ‘ 6245 πŸ” 1031 πŸ’¬ 58 πŸ“Œ 16

yeah i was gonna say, you could totally fuck this up without ai. it's a pretty classic infra mishap, alas.

i have had the lesson burned into me that if tfc plans imply divergence you need to lock the workspace and call up someone who knows why.

06.03.2026 17:42 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

thinking about the word "manel" but what about "marchitecture review board", "mboard of directors"?

06.03.2026 17:37 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

is this anything

06.03.2026 09:36 πŸ‘ 747 πŸ” 175 πŸ’¬ 12 πŸ“Œ 4

you might enjoy looking at mkosi, which i think is basically a test runner and a systemd tech demo in a box :)

06.03.2026 16:55 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Google pledges roughly three hours of its annual profit to fight climate change Google and others are committing $100 million to combat climate change.

The perfect headline doesn’t exi…

05.03.2026 20:24 πŸ‘ 7544 πŸ” 2189 πŸ’¬ 31 πŸ“Œ 65

OH: we know the worst its gonna do is waste memory, and as any haskeller knows, allocating memory is not a side effect!

06.03.2026 09:05 πŸ‘ 5 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

holy fuckin shit lmao

a supply chain attack perpetrated by a prompt injection in a github ISSUE TITLE

eh. coding agents? what could go wrong

06.03.2026 05:11 πŸ‘ 380 πŸ” 97 πŸ’¬ 12 πŸ“Œ 2

TL;DR: apache avro RPC: looks actually pretty cool! just don't attach any of the official implementations to the public internet, they are not designed for possibly-malicious input.

06.03.2026 06:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

CAPEC-141: Cache Poisoning, CWE-345: Insufficient Verification of Data Authenticity, CWE-602: Client-Side Enforcement of Server-Side Security

Bonus bug: clients can allocate 4gb if they want, for fun!
github.com/apache/avro/...

06.03.2026 06:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
[AVRO-62] Canonicalize protocol string before computing MD5 - ASF Jira

code which naively accepts whatever the client gives you:
github.com/apache/avro/...

2009 bug report: "WONTFIX, implementing canonical json cross language is hard" issues.apache.org/jira/browse/...

note this is fixable by the server simply hashing the client input and discarding the given hash.

06.03.2026 06:12 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

full disclosure of an @apache.org avro rpc DoS vulnerability:

handshake with clientHash = victim-protocol's-hash, serverHash = whatever, clientProtocol = wrong-protocol

server now has a poisoned cache for the victim proto hash if they have not yet connected to the server, cannot deserialize it

06.03.2026 06:12 πŸ‘ 3 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

omg. i need safety ii propaganda.

06.03.2026 01:47 πŸ‘ 4 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

glean is not a sourcegraph alternative but merely a part of one. you need a symbol naming format and so you really need to run a glass service as well. and then you have to write an entire web ui, but you still need zoekt for text search. it's a whole project. i want to. just. lots of stuff to do.

05.03.2026 21:34 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

remote build execution via the bazel protocol is real and fun. there's some hacks for supporting it with nix by making kinda evil docker images. currently everything is local but it will change.

05.03.2026 21:32 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0