Pains
2403 pains collected
GitHub global outage blocking push/pull operations
10GitHub suffered a significant global outage preventing developers from pushing or pulling code. Users encountered `fatal: Could not read from remote repository` errors over SSH and HTTP 500 internal server errors over HTTPS, effectively halting all workflow activities.
Security Vulnerabilities in Repository Configuration and MCP
10Three CVEs discovered: malicious code in documents can exfiltrate private data; Model Context Protocol (MCP) allows repository config to override user approval safeguards enabling remote code execution; repository-controlled settings redirect API traffic to attacker servers to steal API keys.
Non-deterministic and non-repeatable agent behavior
9AI agents behave differently for the same exact input, making repeatability nearly impossible. This non-deterministic behavior is a core reliability issue that prevents developers from confidently shipping features or trusting agents to run autonomously in production.
Abrupt Free Tier Removal and Quota Slashing Without Notice
9Google removed free tier access to Gemini 2.5-Pro entirely and slashed Gemini 2.5-Flash daily limits by 92% (250 to 20 requests) with no advance notice, email alerts, or grace period. Production applications broke overnight with 429 quota exceeded errors.
Client applications blindly trust external OAuth servers without verification
9In multi-tenant or SSO scenarios, client applications often fail to verify that authorization data (email, user profile) actually comes from the OAuth server configured for that user's account. A malicious OAuth server can return forged credentials, enabling account takeover.
95% Failure Rate in Corporate AI Agent Projects
995% of generative AI business projects fail in production. This systemic failure rate reflects fundamental challenges in building AI agents that remain relevant, adaptable, and trustworthy over time.
Hardcoded backend configuration leads to destructive state file mismatches
9When copying root modules without updating backend configuration (key/prefix), Terraform can reference the wrong state file, resulting in destructive plans that delete infrastructure belonging to another environment or project.
Cross-Site Scripting (XSS) Vulnerabilities in Next.js
9XSS attacks can occur in Next.js through improper use of dangerouslySetInnerHTML, unvalidated user input in dynamic content, third-party scripts, and server-side rendering of malicious content.
Unreliable and unpredictable framework behavior in production
9LangChain exhibits difficult-to-predict behavior with undocumented or poorly explained default settings and intricacies. Developers report erratic behavior such as ConversationRetrievalChain unexpectedly rephrasing input questions, leading to unstable production environments and costly downtime.
Security vulnerabilities and account hijacking risks
9Persistent security vulnerabilities exist in OpenAI's platform, with documented instances of account hijacking and authentication exposure. Developers lack clear security protocols and data privacy safeguards.
Incomplete or skipped token validation in APIs
9APIs frequently validate only that a token is present rather than performing full server-side validation of signature, issuer, audience, expiry, and required scopes, leaving the system vulnerable to forged or expired tokens.
Client secrets exposed in SPAs and mobile applications
9Developers ship OAuth client secrets inside single-page applications or mobile apps where they can be extracted from JavaScript bundles or binaries, compromising the confidentiality of the secret.
Corrupted or malicious npm package code breaking builds worldwide
9Popular npm libraries like Faker.js and Colors.js have had their source code corrupted by maintainers, causing widespread build failures across millions of dependent projects. When heavily-used small modules maintained by 1-2 people break, the impact cascades globally.
Minimal Verification and Trust Model for Package Publishing
9The npm ecosystem allows anyone to publish packages with minimal verification, instant updates without review periods, infinite dependency nesting, and single points of failure in maintainer accounts. This fundamentally incompatible trust model creates massive security vulnerabilities.
API Route Security Issues in Next.js
9Next.js API routes are vulnerable to injection attacks (SQL, NoSQL, command injection), rate limiting bypass, information disclosure through error messages, and missing input validation.
GitHub Actions lacks lockfile dependency management
9GitHub Actions has no lockfile system to pin exact versions of third-party actions. Every workflow run re-resolves dependencies from the manifest without recording what was actually chosen, creating non-deterministic builds and enabling supply chain attacks. This is a fundamental gap compared to mature package managers.
React/Next.js serialization vulnerabilities expose TypeScript runtime risks
9Critical security vulnerabilities like React2Shell (CVE-2025-55182, CVSS 10.0) in Next.js RSC serialization revealed that full-stack JavaScript and TypeScript lack secure serialization models. These runtime CVEs forced developers to reassess security assumptions in TypeScript/React stacks.
AWS IAM permission model is fundamentally broken for security requirements
9AWS IAM's core design prioritizes deterministic permission evaluation over security usability, resulting in a system where CRUD-style permissions cannot be implemented auditably. The architecture uses low-level API action lists with boolean logic complexity ('deny sandwich'), strict character limits forcing wildcard usage, and unpredictable new actions added without warning, making it impossible to implement basic security expectations.
Sensitive data exposure in state and plan artifacts
9Terraform stores real secret values (API tokens, database passwords) in plaintext state files and plan output despite showing (sensitive value) in the CLI. When plan files are uploaded as CI/CD artifacts, they become security liabilities if accessible to unauthorized parties.
Public bucket misconfigurations left behind after testing
9Developers frequently leave S3 buckets public 'for testing' and forget to secure them, creating ongoing security vulnerabilities. Misconfiguration remains the third most important operational challenge in cloud security.
Poor page rendering performance at scale
9Next.js exhibits slow page rendering performance in production: basic pages take 200-400ms, large dynamic pages exceed 700ms, and crawlers hitting multiple pages simultaneously cause site crashes. Caching is unpredictable across replicas.
Account suspension without warning or appeals process
9User accounts have been suspended without warning within minutes of deployment with vague 'fair use violation' emails. Appeals go unanswered for weeks, resulting in lost access to production sites with no recourse or clear explanation.
Insecure default configurations enabling privilege escalation
9Deploying containers with insecure settings (root user, 'latest' image tags, disabled security contexts, overly broad RBAC roles) persists because Kubernetes doesn't enforce strict security defaults. This exposes clusters to container escape, privilege escalation, and unauthorized production changes.
Remote state management and concurrent write conflicts at scale
9When multiple team members and CI/CD pipelines run Terraform in parallel, concurrent writes to shared state can cause conflicting updates and painful recovery work. The terraform.tfstate file serves as the source of truth, and unreliable storage or simultaneous modifications lead to state corruption.