Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is a pretty good use case for serverless endpoints, assuming the volume is pretty low.


Serverless + making sure the serverless function doesn't have any privileges. More often than not I see people use serverless in the name of security, and then give the function write access to prod resources.


Ideal use case for a cheeky OpenBSD machine...

Not that OpenBSD is actually unhackable or anything, but I doubt many attackers would guess you're running imagemagick on OpenBSD in your image pipeline.

I rather like it for such use cases; it has the added benefit that it never, ever seems to die. I found a 6.0 machine I setup doing some kind of risky Kafka processing that had an uptime of 6 years the other week (since migrated).


I had to reboot one of our servers last year, also just over 6 years. Reboot because physical move to another server hotel, not because it wasn't working :-)

It is running imagemagic to optimize images, create different resolutions and reencode them. It's only open for us to upload manually from our customers though, they can't upload themselves. Input anything, output jpg, very easy to use.


I've ran into a security issue where a serverless function had pretty large range of AWS access and a pentester was able to utilise that.


That's a bad use case for serverless :)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: