Hacker Newsnew | past | comments | ask | show | jobs | submit | phmx's commentslogin

Looks similar to the halting problem to me (https://en.wikipedia.org/wiki/Halting_problem)

Whether an arbitrary piece of code can be exploited is obviously undecidable (i.e. it is equivalent to the halting problem). Let me give you an example that will sketch why this is the case: `if(sha(input1)==12345) { run_shell(input2);}`. The real question is how does this look like in practice, for the code that we as humans actually use in our networks.

> Polynomials are for people who think AGI is "decades away."

Je suis un polynôme



There is also a way to import a table from the STDIN (see also https://duckdb.org/docs/data/json/overview)

cat my.json | duckdb -c "CREATE TABLE mytbl AS SELECT * FROM read_json_auto('/dev/stdin'); SELECT ... FROM mytbl"


There's been a writeup on this topic by the Fly team -- https://fly.io/blog/docker-without-docker/


English translation starting from page 7.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: