Pains

2403 pains collected

Category:
Tech:
Severity:

Security vulnerabilities and account hijacking risks

9

Persistent security vulnerabilities exist in OpenAI's platform, with documented instances of account hijacking and authentication exposure. Developers lack clear security protocols and data privacy safeguards.

securityOpenAI API

React/Next.js serialization vulnerabilities expose TypeScript runtime risks

9

Critical security vulnerabilities like React2Shell (CVE-2025-55182, CVSS 10.0) in Next.js RSC serialization revealed that full-stack JavaScript and TypeScript lack secure serialization models. These runtime CVEs forced developers to reassess security assumptions in TypeScript/React stacks.

securityTypeScriptReactNext.js

Hardcoded backend configuration leads to destructive state file mismatches

9

When copying root modules without updating backend configuration (key/prefix), Terraform can reference the wrong state file, resulting in destructive plans that delete infrastructure belonging to another environment or project.

configTerraformstate backends

Git server performance degradation under AI-generated code load

9

Traditional Git servers cannot handle the massive surge in traffic from AI-assisted tools, AI agents, and automated CI/CD processes. Git clones and fetches now take several minutes or timeout instead of completing in seconds, creating pipeline delays and blocking deployment workflows.

performanceGitAI agentsCI/CD

Backup and restore limitations at scale

9

DynamoDB does not support native backup and restore functionality, which becomes extremely problematic at scale. Unable to back up large datasets (e.g., 100TB) was a significant reason why companies like Timehop migrated away from DynamoDB.

storageDynamoDB

glibc 2.35 introduced critical bugs in dynamic linker

9

glibc 2.35 shipping with a broken dependency sorter causes valgrind errors, assert aborts, library loading failures, and segfaults in the lowest-level system component (ld.so), requiring developers to debug and implement workarounds.

compatibilityglibc

Corrupted or malicious npm package code breaking builds worldwide

9

Popular npm libraries like Faker.js and Colors.js have had their source code corrupted by maintainers, causing widespread build failures across millions of dependent projects. When heavily-used small modules maintained by 1-2 people break, the impact cascades globally.

dependencynpmFaker.jsColors.js

Remote state management and concurrent write conflicts at scale

9

When multiple team members and CI/CD pipelines run Terraform in parallel, concurrent writes to shared state can cause conflicting updates and painful recovery work. The terraform.tfstate file serves as the source of truth, and unreliable storage or simultaneous modifications lead to state corruption.

storageTerraformS3remote state backends

Public bucket misconfigurations left behind after testing

9

Developers frequently leave S3 buckets public 'for testing' and forget to secure them, creating ongoing security vulnerabilities. Misconfiguration remains the third most important operational challenge in cloud security.

securityAmazon S3

Unreliable and unpredictable framework behavior in production

9

LangChain exhibits difficult-to-predict behavior with undocumented or poorly explained default settings and intricacies. Developers report erratic behavior such as ConversationRetrievalChain unexpectedly rephrasing input questions, leading to unstable production environments and costly downtime.

compatibilityLangChain

API Route Security Issues in Next.js

9

Next.js API routes are vulnerable to injection attacks (SQL, NoSQL, command injection), rate limiting bypass, information disclosure through error messages, and missing input validation.

securityNext.js

Insecure default configurations enabling privilege escalation

9

Deploying containers with insecure settings (root user, 'latest' image tags, disabled security contexts, overly broad RBAC roles) persists because Kubernetes doesn't enforce strict security defaults. This exposes clusters to container escape, privilege escalation, and unauthorized production changes.

securityKubernetesRBAC

Claude Pro subscription OAuth tokens blocked in third-party tools

9

Anthropic restricted subscription OAuth tokens to work only with the official Claude Code CLI, blocking tools like OpenCode, Moltbot, and integrations in Cursor. Users who built workflows around third-party tools were locked out mid-project, forcing them to either downgrade subscriptions or abandon the platform entirely.

authClaudeOAuthClaude Code CLI

Incomplete or skipped token validation in APIs

9

APIs frequently validate only that a token is present rather than performing full server-side validation of signature, issuer, audience, expiry, and required scopes, leaving the system vulnerable to forged or expired tokens.

securityOAuth 2.0JWT

Poor page rendering performance at scale

9

Next.js exhibits slow page rendering performance in production: basic pages take 200-400ms, large dynamic pages exceed 700ms, and crawlers hitting multiple pages simultaneously cause site crashes. Caching is unpredictable across replicas.

performanceNext.js

Minimal Verification and Trust Model for Package Publishing

9

The npm ecosystem allows anyone to publish packages with minimal verification, instant updates without review periods, infinite dependency nesting, and single points of failure in maintainer accounts. This fundamentally incompatible trust model creates massive security vulnerabilities.

securitynpm

Non-deterministic and non-repeatable agent behavior

9

AI agents behave differently for the same exact input, making repeatability nearly impossible. This non-deterministic behavior is a core reliability issue that prevents developers from confidently shipping features or trusting agents to run autonomously in production.

testingAI agentsLLM

AI agent security and blast radius management

9

Production incidents show AI agents leaking internal data, shipping ransomware through plugins, and executing destructive actions (deleting repos). Security shifted from prompt injection to actual agent capabilities and operational risk.

securityAI agentsLLM

GitHub Actions lacks lockfile dependency management

9

GitHub Actions has no lockfile system to pin exact versions of third-party actions. Every workflow run re-resolves dependencies from the manifest without recording what was actually chosen, creating non-deterministic builds and enabling supply chain attacks. This is a fundamental gap compared to mature package managers.

dependencyGitHub Actions

AWS IAM permission model is fundamentally broken for security requirements

9

AWS IAM's core design prioritizes deterministic permission evaluation over security usability, resulting in a system where CRUD-style permissions cannot be implemented auditably. The architecture uses low-level API action lists with boolean logic complexity ('deny sandwich'), strict character limits forcing wildcard usage, and unpredictable new actions added without warning, making it impossible to implement basic security expectations.

securityAWS IAMAWS

Lua Blocking Operations Halt Entire Worker Process

9

Lua code embedded in NGINX must be strictly non-blocking to maintain event-driven performance. Using standard Lua libraries or C libraries that perform blocking I/O (e.g., standard `os.time()` or slow file I/O) halts the entire NGINX worker, causing massive performance degradation, high latency, and request timeouts for all concurrent requests.

performanceNGINXLuaOpenResty

Lua-Based Annotation Parsers Vulnerable to Injection Attacks

9

Lua-based annotation parsers in ingress-nginx (e.g., `auth-url`, `auth-tls-match-cn`, mirror UID parsers) fail to properly sanitize user inputs before incorporating them into NGINX/Lua configurations. Attackers can craft malicious Ingress annotations that inject arbitrary directives into the NGINX configuration template via the admission controller's validation logic.

securityNGINXLuaKubernetes+1

Security vulnerabilities from hardcoded credentials and missing protections

9

Developers hardcode API keys in Dart code (trivially extractable), omit certificate pinning (vulnerable to MITM), store user data unencrypted, and ignore GDPR/CCPA/HIPAA compliance requirements. Security is often an afterthought until it's too late.

securityFlutterDart

v0 Service Reliability and Data Loss

9

v0 experiences frequent service outages, request processing failures, and data loss issues including deleted conversations, disappearing messages, and erased deployments. Users report being unable to rely on the tool for production work despite paying subscription fees.

compatibilityv0Vercel