惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
G
GRAHAM CLULEY
P
Privacy & Cybersecurity Law Blog
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
宝玉的分享
宝玉的分享
P
Proofpoint News Feed
H
Help Net Security
V
Visual Studio Blog
阮一峰的网络日志
阮一峰的网络日志
C
Cisco Blogs
人人都是产品经理
人人都是产品经理
Know Your Adversary
Know Your Adversary
freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
Recorded Future
Recorded Future
I
Intezer
罗磊的独立博客
T
The Exploit Database - CXSecurity.com
Blog — PlanetScale
Blog — PlanetScale
Malwarebytes
Malwarebytes
Spread Privacy
Spread Privacy
T
Tor Project blog
V
Vulnerabilities – Threatpost
云风的 BLOG
云风的 BLOG
腾讯CDC
B
Blog RSS Feed
Stack Overflow Blog
Stack Overflow Blog
F
Future of Privacy Forum
MyScale Blog
MyScale Blog
Latest news
Latest news
IT之家
IT之家
MongoDB | Blog
MongoDB | Blog
The Hacker News
The Hacker News
S
Securelist
博客园 - 【当耐特】
C
CXSECURITY Database RSS Feed - CXSecurity.com
T
Threat Research - Cisco Blogs
Jina AI
Jina AI
Cisco Talos Blog
Cisco Talos Blog
B
Blog
博客园 - 三生石上(FineUI控件)
Last Week in AI
Last Week in AI
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
M
MIT News - Artificial intelligence
V
V2EX
D
Darknet – Hacking Tools, Hacker News & Cyber Security
The Cloudflare Blog
The GitHub Blog
The GitHub Blog
博客园 - 聂微东
F
Full Disclosure
C
CERT Recently Published Vulnerability Notes

Hacker News: Show HN

Show HN: From one Claude agent to a fleet – in five small steps Show HN: Canonry tracks how AI cites you – agent-first, open source Show HN: Online Sound Test Show HN: My independent search engine focused on user control Show HN: Computer Police – block malicious NPM/pip installs locally Show HN: Agent.email – sign up via curl, claim with a human OTP ClarityHoop | Executive Communication Mastery Show HN: Write your BPF programs in Go, not C GitHub - Userfrom1995/benchd: BenchD is a browser-based CPU benchmark that runs fully on the client. GitHub - LeoStehlik/proof-loop: Repo-local verification protocol for AI coding agents: acceptance criteria, separate verifier roles, proof artifacts, and evidence-backed done claims. Show HN: Free One-shot cloud agents with OpenCode and Daytona and Cloudflare Show HN: npmfind – Alternative NPM package search Parseflow Segment Tree — Algorhythm GitHub - verdverm/pge-jax: Jax implementation of the PGE algorithm (Prioritized Grammar Enumeration) Show HN: GitVitae – Free hosted portfolio and resume for anyone GitHub - wavever/buildby: Detect whether desktop apps are built with Electron, Flutter, Tauri, Qt, .NET, JVM, CEF, or native code. boku — YAML task runner Show HN: Darc – grep-like memory search tool for coding agents Mixpanel Headless - Mixpanel Docs Show HN: A demo video of Effected Keyboard 2 Introducing Open Public awesome-skills/gtm-mavericks at main · conductor-oss/awesome-skills Show HN: ATM, a tiny terminal task manager for local coding agents Freenet Workspace Show HN: AI Manager Show HN: SubTrack – Find forgotten subscriptions via bank transaction scanning Show HN: We dropped Go for Rust in our real-time telephony AI media plane Show HN: I Dedicated 4 Years to Mastering Offline Password Cracking Home — Noada Show HN: I Made a Claude Skill for SDD Show HN: Twixt – transform one word into another in four moves Show HN: Daily word puzzle game based on polysemy GoKubeDownscaler: Reduce Kubernetes Costs Off-Hours GitHub - openclaw-easy/ViralMint: Open-source viral content pipeline — scout trends, analyze competitors, generate AI videos, auto-publish. AGPL-3.0. GitHub - baidu-baige/LoongForge: A modular, scalable, high-performance training framework for LLMs, VLMs, diffusion, and embodied models. Show HN: (Better) Chrome Tab Manager Show HN: SoMatic – Vision-based OS automation framework for AI agents Physics AI – Free Physics Solver Online (Step-by-Step) SUPPLYCHAIN.FAIL — Open Source Vulnerability Timeline PocketWebTools GitHub - mirshko/boatswain: A macOS menu bar app for Fathom Analytics. Keep an eye on your site stats without ever leaving your keyboard. What does your investment actually buy? — Post-Money SAFE Calculator GitHub - vipulawl/claude-tips: Customize Claude Code spinner tips with live jokes, quotes, facts, or your own content GitHub - changespec/spec: ChangeSpec: open specification for software change communication Show HN: I built a private, manual 0% balance transfer tracker 3.125-Bit LLM quantization bypassing tensor cores Medical curiosities | Thomas Morris FlutterTime ~ Timezone Planner Steam 上的 Junebug GitHub - Helvesec/rmux: Universal Rust multiplexer with a typed SDK — drive any CLI or TUI app from code. Native on Linux, macOS, and Windows. GitHub - manas15/try-on: LiveLook — Real-time virtual try-on with gesture control, powered by Decart's Lucy VTON model GitHub - vitalysim/the-knowledge-guy: Turn any PDF or EPUB into a structured Claude Code skill - then ask your whole bookshelf a single question. Gemini Omni Flash AI Video Generator | Free Online GitHub - elliotgao2/handsets: A high-performance Android control CLI, built for agents and humans GitHub - enzoferraripapa-arch/ai-vprocess-ops: Engineering memory for AI coding agents: requirements, decisions, evidence, traceability, and V-process/ALM handoff Show HN: Dokkaebi – Run your WASM backend directly on the client side Send messages beyond your lifetime SkinMax App | Your Personal Skin Care Coach GitHub - kmdupr33/fks2g: A CLI for generating LLM-backed metrics for deciding how closely to review code ISS QuietGPT - Make ChatGPT Reply Smaller GitHub - Quintisimo/macfigure: Mac configuration in pkl. Simple alternative to nix-darwin Show HN: SafeRun – Replay debugging and inline prevention for AI agents 3 GitHub - sathvikc/agent-chat-bridge: Turn any AI agent chat session into an async agent. Register a timer, shell command, or webhook — the bridge automatically resumes the session with your prompt when the trigger fires. SnapAPI - Website Screenshot & Data Extraction API Introducing @cipherstash/stack Show HN: E2E Encrypted Terminal Screen Share Windows 98½ Show HN: SafeRun – Replay debugging and inline prevention for AI agents 2 Show HN: My custom Statusline for Claude Code (Python wrapper around claudeline) GitHub - kageroumado/phosphene: A video wallpaper engine for macOS Tahoe Best Remote Jobs — Work From Home | RemoteJobs.place udoc Free AI Rewriter - Revise GitHub - arashThr/hugo-flow: Simple rich-text CMS for Hugo weblogs. Try at https://hugo.arashtaher.com GitHub - light-cloud-com/ice: Free, open-source, visual studio for cloud infrastructure for macOS, Windows & Linux. GitHub - kouhxp/yapsnap: Snap any video URL or audio file into plaintext. No GPU. No cloud. One command. What if we made SIMA2 from Temu iPhone 版“Today” - App Store Runo - Web Scraping API | Any URL to Typed JSON Show HN: AI Editor for Websites GitHub - AdamGonda/ward: Run [ npm i ] safely, audit installs inside a docker container. The Crucible — 8 voices, one verdict Screenshot 2026 05 20 at 4 03 10 PM — Postimages Show HN: Chess Puzzles, but for Developers Show HN: I built Istanbul live transit map Show HN: Agent.email – sign up via curl, claim with a human OTP GitHub - mfairley/expo-callkit-telecom: 📞 CallKit + Core-Telecom for React Native + Expo. A modern react-native-callkeep alternative. I tried 4 LLM speedup techniques on CPU. Three made it slower. Show HN: I made a tool for learning scales, chords, and how to combine them Learn how to build AI products through practice 1 BTC = 17.17 troy oz of gold · Bitcoin Weigh-In p-Hacker — top trending Client Challenge hty GitHub - Artain-AI/ignite-ms: Fast self-hosted embedding engine for search, RAG, and reindexing workloads on NVIDIA GPUs. Built in Rust + TensorRT for teams that care about scale, cost, and control. GitHub - mupt-ai/dari-docs: optimize your documentation through fleets of agents GitHub - dcostenco/prism-coder: The Mind Palace for AI Agents - HIPAA-hardened Cognitive Architecture with on-device LLM (prism-coder:7b), Hebbian learning, ACT-R spreading activation, adversarial evaluation, persistent memory, multi-agent Hivemind and visual dashboard. Zero API keys required.
GitHub - securient/ideviewer-oss: Security scanner for developer workstations — detects IDE extension risks, AI tool permissions, plaintext secrets, and vulnerable dependencies across VS Code, Cursor, JetBrains, and more.
securient · 2026-05-22 · via Hacker News: Show HN

A cross-platform security tool that scans developer workstations for supply chain threats — risky IDE extensions, vulnerable dependencies, plaintext secrets, insecure AI tool configurations, and MCP server permissions. Built as a single Go binary with an optional self-hosted portal for team-wide visibility.

Documentation | Releases | Portal Container

Why IDEViewer?

Developer workstations are one of the most privileged and least monitored attack surfaces. IDE extensions run with full process permissions, npm packages execute lifecycle hooks silently, AI coding assistants connect to external services, and secrets sit in plaintext across config files. EDR and SCA tools don't see any of this. IDEViewer does.

Key Features

Feature Description
IDE Extension Analysis Scans 7+ IDEs, analyzes extension permissions against a 4-tier risk model (Critical/High/Medium/Low)
AI Tool Detection Discovers Claude Code, Cursor, Kiro, OpenClaw — their skills, MCP servers, cloud integrations, and granted permissions
AI Risk Scoring Flags insecure configurations: wildcard bash access, plaintext API keys, autonomous execution, unencrypted transports
Extension Dependency Scanning Inventories packages bundled inside VS Code node_modules and JetBrains plugin JARs — invisible to standard SCA
Secrets Detection Finds plaintext credentials in .env files and git history. Never transmits actual values — only type and location
CVE Correlation All packages (project + extension-bundled) checked against OSV.dev for known vulnerabilities
Real-Time Monitoring Filesystem watchers detect extension changes within 30 seconds
Tamper Detection SHA-256 checksums on daemon binary, config, and service files with instant alerting
Git Hook Bypass Detection Detects --no-verify usage and reports to portal
SARIF Output Integrates with GitHub Code Scanning, CodeQL, and CI/CD pipelines

Screenshots

Dashboard Host Detail
Dashboard Host Status
Extension Analysis Secrets Detection
Extensions Secrets

Quick Start

Option A: Download a Pre-built Binary

Download from the Releases page:

Platform File
macOS (Apple Silicon) IDEViewer-*-arm64.pkg
Windows (64-bit) IDEViewer-Setup-*.exe
Linux (amd64) ideviewer_*_amd64.deb
Linux (arm64) ideviewer_*_arm64.deb

Option B: Build from Source

git clone https://github.com/securient/ideviewer-oss.git
cd ideviewer-oss
make build          # Single platform
make build-all      # All platforms

Standalone Scanning (No Portal)

ideviewer scan              # Scan IDEs and extensions
ideviewer secrets           # Detect plaintext secrets
ideviewer packages          # Inventory all packages
ideviewer dangerous         # List high-risk extensions
ideviewer scan --output-sarif > results.sarif  # SARIF for CI/CD

Portal Setup

The portal is a self-hosted web dashboard for monitoring multiple developer machines. It's optional — the CLI works standalone.

One-Command Start

./start.sh              # Local dev (SQLite, zero config)
./start.sh --docker     # Docker + PostgreSQL
./start.sh --aws        # Deploy to AWS (ECS + RDS + ALB)

Default login: admin / ideviewer (you'll be prompted to change the password).

Connect a Daemon

ideviewer register \
  --customer-key YOUR-KEY \
  --portal-url http://localhost:5000

The daemon starts automatically after registration and runs continuously in the background.

Portal Container

docker pull ghcr.io/securient/ideviewer-oss-portal:latest
docker run -p 8080:8080 \
  -e SECRET_KEY=$(openssl rand -base64 32) \
  -e DATABASE_URL=postgresql://user:pass@host:5432/ideviewer \
  ghcr.io/securient/ideviewer-oss-portal:latest

What Gets Detected

Supported IDEs

IDE Extensions Path
VS Code ~/.vscode/extensions
Cursor ~/.cursor/extensions
VSCodium ~/.vscode-oss/extensions
Kiro ~/.kiro/extensions
JetBrains (IntelliJ, PyCharm, WebStorm, GoLand, CLion, Rider, PhpStorm, RubyMine, DataGrip) ~/.config/JetBrains/*/plugins
Sublime Text ~/Library/Application Support/Sublime Text/Packages
Vim / Neovim ~/.vim, ~/.config/nvim
Xcode /Applications/Xcode.app

Supported Package Managers

Language Manager Detection
Python pip, pipenv, poetry Global + project-level
Node.js npm Global + project + extension-bundled
Go go ~/go/bin + go.mod
Rust cargo Global + Cargo.lock
Ruby gem Global + Gemfile.lock
PHP composer composer.lock
Java maven JetBrains plugin JARs
macOS Homebrew Formula + casks

AI Tools & MCP Detection

Tool What's Detected
Claude Code Enabled skills/plugins, cloud MCP servers (Gmail, Calendar, etc.), per-project permissions (Bash, Read, Write, MCP tools), API keys (redacted)
Cursor MCP server configs from mcp.json and VS Code settings, remote MCP servers, env vars, auto-approve permissions
Kiro MCP server configs from ~/.kiro/settings/mcp.json, remote MCP servers, env vars, auto-approve permissions
OpenClaw LLM providers, Slack/Telegram integrations, bot tokens (redacted), autonomous execution flags, insecure transport

Each component is classified by type (skill, mcp-server, cloud-mcp, integration, permission) and assigned a risk score:

Risk Examples
Critical Wildcard bash access (Bash(*)), plaintext API keys
High Autonomous execution enabled, external integrations, insecure HTTP transport, auto-approved MCP tools
Medium Cloud MCP with data access, shell command permissions
Low Skills with network access

Extension Risk Model

Level Criteria Examples
Critical Full system compromise potential Wildcard activation (*), filesystem + shell
High Elevated permissions Authentication, terminal access, URI handlers
Medium Potentially concerning Startup execution, debugger access
Low Standard permissions Commands, keybindings, themes

Portal Features

  • Dashboard — security posture overview across all registered machines
  • Host Detail — tabbed view: Extensions, Packages, Secrets, AI Tools
  • AI Tools Tab — unified table of all AI components with type/risk filters and risk scores
  • Extension Detail — marketplace data, permissions, risk assessment, cross-host installation
  • Package Detail — source tracking (project vs extension-bundled), lifecycle hooks, CVEs
  • Multi-Select Filters — combine filters (e.g., "vulnerable" + "extension deps")
  • Global Search — search across hosts, extensions, packages, AI tools, and MCP servers
  • Real-Time Updates — live update indicator when filesystem watcher detects changes
  • On-Demand Scans — trigger scans from the portal UI
  • Tamper Alerts — instant alerts on daemon file modification/deletion
  • CSV Export — export any data view
  • Google OAuth — optional SSO alongside username/password
  • Database Migrations — Alembic-managed schema for safe upgrades

Deployment

AWS (ECS Fargate + RDS)

./start.sh --aws    # Guided wizard with cost estimates

Creates: VPC, ALB (HTTPS optional), ECS Fargate (autoscaling 1-4), RDS PostgreSQL, Secrets Manager, CloudWatch, ECR. See deploy/README.md.

MDM (JAMF / Mosyle / Kandji)

For managed fleets, deploy the PPPC profile first (grants Full Disk Access silently), then the .pkg:

# 1. Deploy PPPC profile: deploy/mdm/ideviewer-tcc.mobileconfig
# 2. Deploy .pkg installer via MDM
# 3. Register silently via post-install script

See deploy/mdm/README.md for step-by-step JAMF instructions.

Linux (systemd)

sudo dpkg -i ideviewer_0.3.0_amd64.deb
ideviewer register --customer-key KEY --portal-url URL
sudo systemctl enable --now ideviewer

Privacy by Design

  • Secret values are never transmitted — only type, location, and redacted indicators
  • AI conversation content is never read — only config metadata and permission sets
  • All scanning happens locally on the developer's machine
  • The daemon reports only security-relevant metadata to the portal

Uninstalling

# macOS
sudo ideviewer-uninstall

# Linux
sudo dpkg -P ideviewer

# Windows
Settings > Apps > IDE Viewer > Uninstall

Contributing

We welcome contributions! See CONTRIBUTING.md for guidelines.

License

Apache License 2.0 — Copyright 2024-2026 Securient

See LICENSE for the full text.