Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

Vibe Code Guild

27 members • Free

15 contributions to Vibe Code Guild
0 likes • 1d
this may need a longer brainstorm -- in the vibe code future ideas will start becoming premium...
This may be my most childish project yet...
but I'm still happy with the output https://www.youtube.com/watch?v=mi_ccLy_JXw
0 likes • 3d
.... the pigeon has a bit of a cartoon bill gates look
1 like • 3d
The pigeon looks like he has strong ideas around monopoly creation, vax profiteering, and frankenmeats...
Anyone watching the stock market?
The world is finally waking up to the death of the complexity tax. SAAS companies are getting wrecked
Anyone watching the stock market?
0 likes • 3d
bruuuuuuuuhhhhhhhhhhhhhhh
if this is real, it's terrifying....
https://www.moltbook.com/ Skynet may have just happened because of that stupid shady claw app....
if this is real, it's terrifying....
3 likes • 9d
... ok moltbook.com is pretty cool ... but can it give anorexia to middleschoolers? ... no? sounds like facebook and instagram are gonna be safe
Dipping my toes into Claude Code
I ran two jobs so far tonight, the first was just going through and documenting my project, that seemed to go well. After that, I challenged claude to use that document and do a deep dive security analysis of the auth in my app. It identified all of these issues: Session Validation Bypass (CRITICAL) Missing Rate Limiting (HIGH) Weak CSRF Protection (HIGH) Client-Modifiable Attribution Data (MEDIUM-HIGH) Missing Email Verification (MEDIUM) Username Enumeration (MEDIUM) Weak Password Policy (LOW-MEDIUM) Missing Account Lockout Mechanism (HIGH) Missing Rate Limiting on Critical Endpoints (HIGH) Missing HSTS Header (MEDIUM-HIGH) Attribution Cookie Security Weaknesses (MEDIUM) So I went through and addressed these one by one with ChatGPT Codex, and left three outstanding that were just going to add more hassle to dev/testing with a mind to implement them before deployment. Here is the final writeup that claude gave the app: Summary of Final Security Analysis 🎉 Excellent News! Security Grade: A- (Strong) Your authentication system is now production-ready with only the deferred items remaining! ✅ What's Working Exceptionally Well 1. Triple-Layer Session Validation - Defense in depth with middleware, server actions, and route guards 2. Comprehensive Rate Limiting - All critical endpoints protected (auth, checkout, username checks) 3. Account Lockout System - Prevents distributed brute force attacks 4. Strong CSRF Protection - Exact origin matching for all state-changing requests 5. Attribution Cookie Security - HMAC-SHA256 with timing-safe comparison 6. HSTS Header in Production - 2-year HTTPS enforcement 7. Email Verification - Required before login 8. Webhook Security - Stripe signature verification with idempotency 🟢 Critical Vulnerabilities: NONE! All previous critical issues have been resolved. ⚠️ Remaining Items (All Deferred as Planned) HIGH Priority (before production): 1. Weak password policy (intentionally deferred) 2. No MFA yet (intentionally deferred) 3. Insecure cookies in dev (intentionally deferred)
Dipping my toes into Claude Code
0 likes • 28d
>> I’m going to challenge Claude with refactoring advice my inclination would be to verify every refactor. This is easier if you have good robust tests.
0 likes • 28d
@Shane McGrath everything after >>Claude generated this set of instructions for itself: Reads very solid and thorough
1-10 of 15
Oleg H
3
42points to level up
@oleg-skoolacct-1599
lets vibecode smthn

Active 3h ago
Joined Nov 30, 2025
Powered by