Devframe: Framework-Neutral Foundation for DevTools

Devframe은 Vite나 특정 UI 프레임워크에 독립적인, 다양한 배포 환경(CLI, SPA, Vite 플러그인 등)을 지원하는 프레임워크 중립적 개발 도구 기반입니다. 타입 안전 RPC, 양방향 스키마 검증 호출, 재접속을 견디는 공유 상태 관리, 스트리밍 채널, 그리고 사용자 정의 UX 훅을 제공하여 개발자가 UI와 로깅을 자유롭게 제어할 수 있습니다. 실험적 기능으로 에이전트 네이티브 RPC 지원도 포함되어 AI 에이전트와의 통합 가능성을 엿볼 수 있습니다.

https://devfra.me/

#devtools #rpc #sharedstate #streaming #agentnative

Devframe

Framework-neutral foundation for building generic DevTools — RPC layer, hosts, and adapters.

We have just released a new C++Online 2026 Conference Video!

RPC with RAII and C++ Coroutines - Edward Boggis-Rolfe - C++Online 2026

https://youtu.be/JjEcSONwhHE

#rpc #cpp #cplusplus #coroutines

RPC with RAII and C++ Coroutines - Edward Boggis-Rolfe - C++Online 2026

YouTube
🪧 ConnectRPC: Where is it now?: Reflecting on two years of ConnectRPC: How it evolved from a gRPC alternative to a complete API ecosystem.
https://kmcd.dev/posts/connectrpc-where-is-it-now/
#Connectrpc #Grpc #Protobuf #Api #Rpc #Go #Golang #Http3 #Openapi
ConnectRPC: Where is it now?

Reflecting on two years of ConnectRPC: How it evolved from a gRPC alternative to a complete API ecosystem.

kmcd.dev
🪧 ConnectRPC: Where is it now?: Reflecting on two years of ConnectRPC: How it evolved from a gRPC alternative to a complete API ecosystem.
https://kmcd.dev/posts/connectrpc-where-is-it-now/
#Connectrpc #Grpc #Protobuf #Api #Rpc #Go #Golang #Http3 #Openapi
ConnectRPC: Where is it now?

Reflecting on two years of ConnectRPC: How it evolved from a gRPC alternative to a complete API ecosystem.

kmcd.dev
"Zombie Orchestra" (Grindhouse Dieselpunk, Tbilisi, Georgia) - "R.P.C." (Crossover Punk, Bristol, UK) - "Cult Ov Void" (Black Death Metal, Potsdam)

#grindcore #hardcorepunk #deathmetal #blackdeath #berlin #diy #noise #knoise #crossover #zombieorchestra #rpc #cultovvoid #berlinpunk #punk #tbilisipunx

En Chine, un adolescent sur quatre s’automutile

En Chine, plusieurs dizaines de millions d’enfants et d’adolescents sont touchés par des pathologies mentales. Depuis quelques années, diverses études alertent sur l’état de santé psychique des mineurs chinois. Si le ministère de l’Éducation appelle à réduire la pression scolaire, l’utilisation excessive du téléphone portable par les mineurs est aussi pointée du doigt.

https://www.courrierinternational.com/article/sante...)

#Chine #RPC #jeunesse #SantéMentale #SantéPublique

Pratiques d’auto-édition en Chine
Mercredi 13 mai – 19h30
Bibliothèque associative de Malakoff

« En dépit d’une censure écrasante et d’un contexte politique répressif, des pratiques de résistance par l’auto-édition subsistent aujourd’hui en Chine. Fanzines, brochures, livres d’art, etc. : nous présenterons certains de ces objets littéraires et politiques, venus de Pékin, Canton et Wuhan, ainsi que le contexte dans lequel ils ont été créés. »

La soirée sera suivi d’un buffet participatif (tout le monde apporte quelque chose à partager).

https://www.b-a-m.org/11070/autoedition-chine/

Bibliothèque Associative de Malakoff
14, impasse Carnot – interphone BAM.

#Chine #RPC #censure #PresseAlternative #livres #zines #AutoEdition #DiYculture #anarchisme @bam

PhantomRPC : une escalade de privilèges cachée dans le mécanisme RPC — un de ces endroits où le système fait confiance à tout le monde par design, jusqu'au jour où quelqu'un tire le bon fil. La disclosure complète est disponible, les détails sont fascinants. Bonne lecture (et bonne session de patching ☕). #infosec #PrivEsc #RPC
https://infosec.pub/post/45515363
Disclosing PhantomRPC – a privilege escalation vulnerability in RPC - Infosec.Pub

Lemmy

Windows RPC Exposes New Local Privilege Escalation Technique

A newly discovered technique allows hackers to easily escalate their privileges to SYSTEM level on Windows systems, using a vulnerability in the Remote Procedure Call stack. This alarming exploit relies on clever manipulation of Security Quality of Service parameters and impersonation levels.

https://osintsights.com/windows-rpc-exposes-new-local-privilege-escalation-technique?utm_source=mastodon&utm_medium=social

#LocalPrivilegeEscalation #Windows #Rpc #Alpc #Msrpc

Windows RPC Exposes New Local Privilege Escalation Technique

Learn the new Windows RPC local privilege escalation technique and protect your system now with expert insights and security measures against RPC vulnerabilities.

OSINTSights

Crypto Drainers as a Converging Threat: Insights into Emerging Hybrid Attack Ecosystems

Cybercriminals are merging traditional malware operations with cryptocurrency-focused attacks, creating hybrid threat ecosystems. Modern crypto drainers have evolved into automated systems capable of extracting assets across multiple blockchains with minimal user interaction, supported by well-developed underground marketplaces offering drainer-as-a-service kits. Two case studies exemplify this convergence: StepDrainer operates as a multichain drainer-as-a-service platform that abuses Web3Modal and smart contract methods across over 20 blockchain networks, using AI-themed lures and polished interfaces to deceive victims into connecting wallets. EtherRAT represents a hybrid Windows implant delivered through trojanized TFTP installers, combining traditional RAT capabilities with blockchain-aware functionality including Ethereum RPC endpoints and embedded wallet addresses. Both threats demonstrate how cryptocurrency theft infrastructure now intersects with mainstream attack surfaces affecting enterprise envir...

Pulse ID: 69ea724596582ed94bc23acf
Pulse Link: https://otx.alienvault.com/pulse/69ea724596582ed94bc23acf
Pulse Author: AlienVault
Created: 2026-04-23 19:25:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BlockChain #CyberSecurity #Endpoint #InfoSec #Malware #Nim #OTX #OpenThreatExchange #RAT #RPC #Trojan #Web3 #Windows #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange