| name | no-use-effect |
|---|---|
| description | Enforce the no-useEffect rule when writing or reviewing React code. ACTIVATE when writing React components, refactoring existing useEffect calls, reviewing PRs with useEffect, or when an agent adds useEffect "just in case." Provides the five replacement patterns and the useMountEffect escape hatch. |
| // Types for the result object with discriminated union | |
| type Success<T> = { | |
| data: T; | |
| error: null; | |
| }; | |
| type Failure<E> = { | |
| data: null; | |
| error: E; | |
| }; |
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k
| #!/bin/sh | |
| print_usage() { | |
| echo "usage: compress_video <input_file>" | |
| echo "supported formats: mp4, webm, mkv, mov, avi, flv" | |
| } | |
| get_extension() { | |
| f="${1##*/}" | |
| case "$f" in |
| #!/usr/bin/env python3 | |
| import sys | |
| import csv | |
| import hashlib | |
| import json | |
| from urllib.parse import urlparse | |
| from datetime import datetime | |
| def main(argv): | |
| if len(argv) < 1: |
This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't yet know everything about what's going on.
Update: I've disabled comments as of 2025-01-26 to avoid everyone having notifications for something a year on if someone wants to suggest a correction. Folks are free to email to suggest corrections still, of course.
| """Hello world, with a genetic algorithm. | |
| https://twitter.com/matthen2/status/1769368467067621791 | |
| """ | |
| import random | |
| import time | |
| from dataclasses import dataclass | |
| from itertools import chain | |
| from typing import Iterable, List |
| Shader "Unlit/PolyRhythmVisualizer" { | |
| Properties { | |
| _TimeCode ("Input Time", Float) = 0 | |
| _OuterRingFreq ("Outer Ring Frequency", Float) = 1 | |
| _InnerRingFreq ("Inner Ring Frequency", Float) = 0.922 | |
| _RingCount ("Ring Count", Int) = 35 | |
| _VibrantFreq ("Vibrant Frequency", Float) = 2 | |
| _Vibrant ("Vibrant", Range(0, 1)) = 0.5 | |
| _Decay ("Decay", Range(0, 10)) = 2 | |
| [Header(Cosine Gradiant)] |
| #!/bin/bash | |
| # Colors | |
| RED='\033[0;31m' | |
| GREEN='\033[0;32m' | |
| NO_COLOR='\033[0m' | |
| BLUE='\033[0;34m' | |
| YELLOW='\033[0;33m' | |
| NO_COLOR='\033[0m' |