This past Wednesday I had the chance to use our own product to fix the React2Shell vulnerability on SubImage’s infrastructure (P.S. If you’re concerned about this vuln, this guidance from Vercel is a good resource).

I love learning from incidents like this because they quickly expose whether what we’re building is useful or Yet Another Single Pane of Glass™️ that helps no one. Within minutes we knew we had the vulnerable package, which workloads were affected, whether it was exploitable, and we shipped a fix anyway.

This post is me bragging a little about our product and our deployment stack :), but it’s also a walkthrough of what worked, what we want to improve…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help