TechSquidTV

joined 1 year ago
[–] TechSquidTV@lemmy.world -2 points 4 days ago

Aim bots? FPS gamers? Sorry I'm trying to converse with adults

[–] TechSquidTV@lemmy.world -1 points 4 days ago

I'm a better developer than you, who happens to use AI because it's nearly 2026

[–] TechSquidTV@lemmy.world 0 points 4 days ago

Suspiciously quiet after being proven wrong

[–] TechSquidTV@lemmy.world -2 points 4 days ago

I've been coding longer than you and I'm a better developer than you guaranteed.

[–] TechSquidTV@lemmy.world 0 points 4 days ago

I have been a developer likely longer than you have

[–] TechSquidTV@lemmy.world -1 points 4 days ago

I've been a developer likely longer than you have

[–] TechSquidTV@lemmy.world -1 points 4 days ago

Correct. I have been a developer for many many years and know what I am doing. Everyone making assumptions is an idiot

[–] TechSquidTV@lemmy.world 0 points 4 days ago

I never asked for anything

[–] TechSquidTV@lemmy.world -5 points 4 days ago

https://github.com/TechSquidTV/Hermes/blob/main/packages/hermes-api/app/core/security.py

Well I think you lied. Only password hashes are stored and verified using bcrypt. I want to see the issue you claim to have found. So, where did you see this security issue you claim I have a responsibility to fix?

Here's the test that proves user's are registered with a hash. https://github.com/TechSquidTV/Hermes/blob/ff1abe653a8af66073a566d4b2c6d1910f25dae1/packages/hermes-api/tests/conftest.py#L87

the user model in the database doesn't even have a password field: https://github.com/TechSquidTV/Hermes/blob/ff1abe653a8af66073a566d4b2c6d1910f25dae1/packages/hermes-api/app/db/models.py#L295

So please, what am I missing?

view more: next ›