Top HN Weekly Digest · W14, Mar 30-05, 2026

A weekly Hacker News digest for readers who want the strongest stories and discussions from the entire week in one place.


0. Claude Code's source code has been leaked via a map file in their NPM registry (twitter.com)

2086 points · 1020 comments · by treexs

The source code for Claude Code was reportedly leaked after a source map file was inadvertently included in its NPM registry package. [src]

The leak, likely caused by a Bun build bug [9], revealed a codebase that many users found surprisingly messy, highlighted by a single 3,167-line function with extreme cyclomatic complexity [5][7]. Key discoveries include a regex-based sentiment analysis tool for logging negative user prompts [0][2] and an "undercover mode" designed to mimic human behavior [1][3]. Additionally, the code contains an "anti-distillation" defense that poisons API traffic with fake tool definitions to prevent competitors from training on Claude’s outputs [4][6].

1. Axios compromised on NPM – Malicious versions drop remote access trojan (stepsecurity.io)

1930 points · 808 comments · by mtud

A compromised maintainer account was used to publish malicious versions of the popular **axios** library (1.14.1 and 0.30.4) to npm, injecting a hidden dependency that deploys a cross-platform remote access trojan (RAT) on Windows, macOS, and Linux systems. [src]

The compromise of Axios has reignited debates over the security of the JavaScript ecosystem, with users highlighting that the attack relied on a malicious `postinstall` script in a fake dependency [4]. To mitigate such risks, many recommend configuring package managers to ignore scripts and enforce a "minimum release age" for updates, though critics note this may simply delay the activation of dormant malware [0][9]. There is a strong consensus favoring "batteries included" standard libraries or single-file C libraries to reduce the massive attack surface created by transitive dependencies [1][3][8].

2. LinkedIn is searching your browser extensions (browsergate.eu)

1882 points · 758 comments · by digitalWestie

Legal proceedings have been filed against LinkedIn for allegedly using hidden code to illegally scan users' browser extensions to collect personal data and trade secrets for corporate espionage. [src]

LinkedIn's practice of scanning for thousands of browser extension IDs has sparked a debate over whether the behavior is a standard fingerprinting technique for bot detection or a "sinister" privacy violation [0][5]. While some argue the headline is hyperbolic because the scan remains within the browser sandbox, others contend that identifying sensitive tools—such as Islamic content filters or neurodivergent aids—constitutes a massive violation of trust [2][5][6]. The discussion highlights a broader frustration with the lack of browser permissions for such probes and the necessity of ad blockers, which even the FBI now recommends for basic protection [1][8].

3. Google releases Gemma 4 open models (deepmind.google)

1794 points · 469 comments · by jeffmcjunkin

Google DeepMind has released Gemma 4, a new generation of open AI models featuring multimodal reasoning, agentic workflows, and support for 140 languages. The lineup includes efficient E2B and E4B models for mobile devices alongside high-performance 26B and 31B versions optimized for consumer GPUs. [src]

Google’s release of Gemma 4 introduces open models featuring reasoning traces, multimodality, and tool calling, with the 26B-A4B version specifically praised for its performance on consumer hardware [1][3][5]. While some users celebrate Google's hardware and data advantages [9], others find the release disappointing, noting that the models struggle with tool execution and trail behind competitors like Qwen 3.5 in dense model benchmarks [5][6][7]. Technical issues were also reported, including broken outputs in the 31B model and "unrecognizable" results from smaller versions in certain local environments [3].

4. Copilot edited an ad into my PR (notes.zachmanson.com)

1601 points · 641 comments · by pavo-etc

GitHub Copilot reportedly inserted advertisements for itself and Raycast into a developer's pull request description after being summoned to correct a simple typo. [src]

Microsoft has disabled "product tips" in Copilot-generated pull requests following backlash that these messages were intrusive advertisements [0][1]. While some users compare these messages to "Sent from my iPhone" signatures [9], others argue they serve as a useful signal to identify "lazy" submissions where the author failed to review the AI's output [2][5]. There is a significant debate regarding accountability: some developers believe AI should be credited as a co-author for transparency [5][6], while others argue the human submitter must take full responsibility for the code regardless of its origin [8].

5. Artemis II Launch Day Updates (nasa.gov)

1095 points · 951 comments · by apitman

NASA is providing live coverage and real-time updates for the Artemis II mission launch, which will send a crew of four astronauts on a journey around the Moon. [src]

The Artemis II mission has sparked a debate between those who view it as a noble, psychologically vital showcase of human potential [3][6] and critics who argue the resources would be better spent on Earth's immediate problems [2]. While some see the mission as a testament to government capability [4], others dismiss the SLS rocket as a "travesty" of outdated, overpriced technology [7]. Significant anxiety persists regarding the safety of the crew, particularly due to unresolved heat shield issues observed during the previous mission [0][9].

6. F-15E jet shot down over Iran (theguardian.com)

605 points · 1384 comments · by tjwds

The Pentagon has confirmed that a U.S. F-15E Strike Eagle fighter jet was shot down over Iranian territory, with debris from the aircraft appearing in verified footage. [src]

The loss of an F-15E and an A-10 over Iran has sparked debate over the effectiveness of U.S. air superiority, with some arguing that these losses are alarming given Iran's degraded defenses compared to historical precedents like the Gulf War [0][1]. While some commenters view the low number of losses after weeks of bombing as a sign of success [8], others point to the lack of "backdoor" access to Iranian systems and the destruction of billion-dollar radar assets as evidence of a much more capable and resilient adversary [3][5][7]. There is also significant concern regarding the vulnerability of search-and-rescue operations and the potential for American hostages to complicate the conflict further [1][2].

7. The Claude Code Source Leak: fake tools, frustration regexes, undercover mode (alex000kim.com)

1369 points · 572 comments · by alex000kim

The source code for Claude Code was leaked via a map file in its NPM registry, revealing internal details such as "undercover mode," regexes for handling user frustration, and placeholder tools. [src]

The leak of Claude Code's internal prompts has sparked a debate over "undercover mode," which instructs the AI to omit mentions of its identity and write commit messages "as a human developer would" [0][6]. While some users view this as a deceptive attempt to bypass anti-AI sentiment or legal concerns regarding copyright and accountability, others argue it is a practical measure to keep git histories clean of "Bill of Tools" noise [1][5][7][8]. Additionally, the leak revealed that Anthropic developers are using detailed code comments to store operational data and business context, a practice described as both a "hack" for guiding AI agents and a "YOLO" approach that inadvertently exposes trade secrets [2][3].

8. Decisions that eroded trust in Azure – by a former Azure Core engineer (isolveproblems.substack.com)

1267 points · 641 comments · by axelriet

A former Azure engineer claims Microsoft jeopardized its market value and government trust through technical mismanagement, specifically by attempting to port over 100 inefficient Windows management agents onto underpowered hardware accelerators, leading to a "death march" that threatened the stability of critical infrastructure and major clients like OpenAI. [src]

The discussion is divided between users who find the author’s claims of systemic instability and security risks credible and critics who view the post as a dramatized grievance from a mid-level engineer [0][2][3]. While some argue that Azure’s "rough edges" are expected for its scale, many users report firsthand experiences with a "janky" UI, unreliable documentation, and unpredictable performance issues in services like AKS and Blob Tables [0][1][4][7]. Despite disagreements over the author's decision to escalate concerns to the Board, some participants point to broader criticisms of Microsoft’s leadership and national security posture as validation for the whistleblower's alarm [2][5][8].

9. Why the US Navy won't blast the Iranians and 'open' Strait of Hormuz (responsiblestatecraft.org)

465 points · 1443 comments · by KoftaBob

The U.S. Navy is avoiding a direct confrontation to reopen the Strait of Hormuz because Iran’s inexpensive anti-ship missiles and drones pose an asymmetric, high-risk threat to costly American aircraft carriers, signaling a shift away from traditional Western naval dominance near well-defended shorelines. [src]

The discussion centers on whether the U.S. Navy remains capable of securing the Strait of Hormuz, with some arguing that aircraft carriers have become expensive liabilities vulnerable to low-cost drones and missiles [0][5][6]. While some commenters believe the U.S. has lost the industrial scale to compete with adversaries like China [1], others contend that carriers remain powerful assets for air superiority and that current operations demonstrate their continued relevance [5][8]. A significant portion of the debate focuses on the grim reality of a potential conflict, comparing it to the "no man's land" of trench warfare or historical mass-destruction strategies used to collapse economies [2][9].