Through the Ruby GC Deep Dive series we’ve examined different strategies Ruby uses for its garbage collection. In this post, we’ll take a quick detour from GC strategies and instead examine the implications of these strategies on object_ids.
[Markdown] An option to highlight a "Note" and "Warning" using blockquote (Beta) · community · Discussion #16925
Alerts are an extension of Markdown used to emphasize critical information. On GitHub, they are displayed with distinctive colors and icons to indicate the importance of the content. An example of ...
Insights from the OpenTelemetry Contributor Experience Survey
The OpenTelemetry Contributor Experience SIG recently surveyed the community to learn what it’s like to contribute to the project and what we can do to improve the contributor experience. The Contributor Experience Survey asked contributors for their thoughts about the project’s organization, SIG contributions, leadership committee interactions, and event attendance. We received 120 responses and heard from all 47 Special Interest Groups (SIGs). We’ll use this feedback to make contributing to OpenTelemetry easier and more rewarding. A big thank you to everyone who participated in the survey! Let’s review the results.
Remote Prompt Injection in GitLab Duo Leads to Source Code Theft
Yet another example of the classic [Markdown image exfiltration attack](https://simonwillison.net/tags/exfiltration-attacks/), this time affecting GitLab Duo - GitLab's chatbot. Omer Mayraz reports on how they found and disclosed the issue. The …
SFTP, the SSH File Transfer Protocol, is a misleading name. It gives you the impression that it might be something like a secure version of FTP, perhaps something like FTPS but modeled over SSH instead of SSL. But it isn't! I think a more suitable name would've been SNFS or FSSSH. That is: networked file … Continue reading Making SFTP transfers fast →
🔐 Identity and Access Management (IAM) in AWS, Azure, and GCP
IAM plays a critical role in securing cloud environments by defining who can access what, under which conditions, and at what scope. While AWS, Azure, and GCP all support strong IAM capabilities, each platform implements it in unique ways:
☁️ AWS IAM
Uses policies written in JSON to grant permissions.
Permissions are attached to users, groups, or roles.
Emphasizes role assumption and cross-account access via trust relationships.
☁️ Azure IAM (RBAC)
Based on Role-Based Access Control tied closely with Azure Active Directory.
Access is assigned at management group, subscription, resource group, or individual resource level.
Supports built-in and custom roles.
☁️ GCP IAM
Organizes resources in a hierarchical structure: organization → folder → project → resource.
Permissions are grouped into basic, predefined, or custom roles.
IAM policies are inherited down the resource hierarchy for simplified access control.
✨ Common Best Practices:
Follow the principle of least privilege.
Use role-based access instead of assigning permissions directly.
Enable audit logging and monitoring for IAM actions.
Regularly review and clean up unused roles and permissions.
IAM is the backbone of cloud security, ensuring the right people have the right access to the right resources—nothing more, nothing less.
#IAM #AWS #Azure #GCP #CloudSecurity #AccessManagement #RBAC #CloudComputing #DevOps #Cybersecurity
| 11 comments on LinkedIn
Greg Kroah-Hartman, a longtime Linux kernel maintainer, breaks down the inner workings of Linux development, from its unique trust model to the benefits of open-source contribution.
Simon Willison: Building software on top of Large Language Models
Here's the full workshop handout plus annotated slides from "Building software on top of Large Language Models", a three hour tutorial I presented yesterday at PyCon US #PyConUS https://simonwillison.net/2025/May/15/building-on-llms/
Trailing dots on host names in URLs is the gift that keeps on giving. Let me take you through a dwindling story of how the dot is handled differently in different places through the stack of an Internet client. The evil trailing dot. DNS When a given host name is to be resolved to an … Continue reading A tale of a trailing dot →
Julia Evans: Flowchart of how Bash decides which file to load bashrc or bash_profile
Attached: 1 image
i enjoy this flowchart explaining how bash decides whether to use .bashrc or .bash_profile https://blog.flowblok.id.au/2013-02/shell-startup-scripts.html, mostly because it makes me understand better why I could never understand how the 2 config files worked when I used bash
Terraform for_each examples (better than Hashicorp's own docs)
I work a lot with iterators in Terraform, they always gave me bad headaches. Therefore I identified five of the most common iterator patterns (code examples are given below), which helped me constr...
Symbolicating JavaScript Stack Traces with the OpenTelemetry Collector | Honeycomb
Symbolicate JavaScript stack traces with the OpenTelemetry Collector. Set up source maps, choose storage, and resolve minified stack traces for better debugging.