Advertisement · 728 × 90

Posts by JustinG

Preview
NASA's Artemis II Live Views from Orion YouTube video by NASA

Was interesting to hear "The moon gets browner the longer I look at it" - makes me remember how some of the apollo astronauts talked about how interesting they found the purples and browns during moon walks www.youtube.com/live/6RwfNBt...

4 days ago 1 0 0 0

Nice selection to add to the NASA history office’s catalog www.nasa.gov/wp-content/u... or if you want a YouTube playlist instead of PDF www.youtube.com/playlist?lis...

6 days ago 14 2 0 0
Video

Iconic that NASA woke up the #Artemis II crew with Pink Pony Club

6 days ago 764 214 11 59
Post image
6 days ago 85 17 5 1
Post image

🧵 NASA was just showing some of their visualizations that they are using to help with situational awareness on the Orion Spacecraft. The first shows where "Integrity" is and how much is left to go on the flight path. Below, it shows Earth's DSN stations & if they are in the day or at night.

6 days ago 27 7 1 1
Screenshot showing map of Sculpture Falls on Barton Creek and the stream depth (1.69 ft) and Flow Rate (0 cubic feet per second) at the nearest downstream gauge.

Screenshot showing map of Sculpture Falls on Barton Creek and the stream depth (1.69 ft) and Flow Rate (0 cubic feet per second) at the nearest downstream gauge.

Sculpture Falls with Barton Creek full of water and people.

Sculpture Falls with Barton Creek full of water and people.

Speaking of Barton Creek, it's looking grim these days, like a lot of streams dependent on the Edwards Aquifer. Just looked to see if there was any water rn at Sculpture Falls, thinking it might be a good, not-too-hot day to go out there. But, "Flow rate: 0." 🤬 One of my faves when it's flowing.

6 days ago 12 3 3 1
Post image Post image Post image Post image

Initial set of charts tracking some of the massive cuts from NASA's FY 2027 budget proposal are now posted at www.planetary.org/charts?imgke...

6 days ago 29 16 2 1
Preview
Introducing the Agent Governance Toolkit: Open-source runtime security for AI agents | Microsoft Open Source Blog Discover how the Microsoft Agent Governance Toolkit brings policy, identity, and reliability to autonomous AI agent systems.

Microsoft just launched a new open security and governance framework for AI agents. When I first heard about this project, I immediately saw how impactful it could be. Looking forward to hearing the community’s feedback.
opensource.microsoft.com/blog/2026/04...

1 week ago 8 3 2 0
Deep space network comm lock

Deep space network comm lock

A thing of beauty—Voyager 1 is calling home right now and the Madrid station is also connected to Artemis 2. You can watch the deep space network live anytime you want. eyes.nasa.gov/apps/dsn-now...

1 week ago 339 110 7 10
Advertisement
Preview
Eyes on the Solar System - NASA/JPL Explore the 3D world of the Solar System. Learn about past and future missions.

The default visualization for #Artemis II is unity-based and kinda basic, prefer the NASA eyes visualization , includes flight path and size comparison to other objects eyes.nasa.gov/apps/solar-s...

1 week ago 0 1 0 0

There are now 10 toilets in Space

International Space Station: 4
Crew Dragon Docked at ISS: 1
Soyuz Docked at ISS: 1
Tiangong Space Station: 2
Shenzhou Docked at TSS: 1
Artemis II on way around Moon: 1

This will be the first time a toilet has left low earth orbit!

1 week ago 5692 1613 154 452

Artemis II launch was pretty. Clear day. Worth a watch if you missed it live.

1 week ago 3 0 1 0
Preview
NASA's Artemis II Crew Launches To The Moon (Official Broadcast) YouTube video by NASA

Hi there, I'm Barbara and I work on the Artemis II Lunar Science team. I'll be here for a couple hours while watching the preparations for launch and happy to take your questions!

www.youtube.com/live/Tf_UjBM...

1 week ago 635 164 42 13

Another item in that space, and that uses rego, is the Omega Assertion Framework github.com/ossf/alpha-o...

3 weeks ago 0 0 0 0
Video

The loud boom heard in Cleveland and the light seen across the Midwest and Mid-Atlantic... it was a meteor!

GOES-19's geostationary lightning mapper picked up the brief flash of light.

3 weeks ago 318 113 6 16

Updating my resume to more explicitly have “fixing software”.

1 month ago 4 0 0 0
Advertisement

No worries, understand the annoyance of getting things to work on all screen types, especially when brand new. Just flagging it.

1 month ago 0 0 0 0

Only shows map on iPhone safari if turned horizontal, took a bit to figure out

1 month ago 0 0 1 0
Preview
Lessons learned from oapi-codegen's time in the GitHub Secure Open Source Fund As noted in GitHub's post, `oapi-codegen` was one of the projects taking part in the third GitHub Secure Open Source Fund session. I'd like to take a moment to reflect on the program, and some learnings I've taken from it. One of the quotes I shared at the end of the program summed up my time: > Having time dedicated to following best practices has been invaluable☆(well, $10k) ## Why did we join the fund? `oapi-codegen` is a project that takes an OpenAPI specification and generates Go code for either interacting with that API via an autogenerated client, or generates scaffolding for a number of HTTP servers and web frameworks to reduce the implementation burden, as well as generating types for API request/responses. Given the project is in a fairly privileged position - interacting with every HTTP request/response on either client or server-side, and likely exposed to sensitive data and credentials - securing the project is very important. As a code generator, `oapi-codegen` can generate a fair bit of code for you to commit to your project. But does everyone review the generated code? _Hopefully yes_ 🫣 But given we can't guarantee it, we want to make sure that nothing dodgy could land in folks' codebases. ### Extending the maintainer pool On top of this, for the last ~2 years, I've been effectively maintaining `oapi-codegen` on my own. As I've written about a couple of times, maintaining a large project like this is fairly time consuming and difficult, _especially_ if it's only you. Additionally, `oapi-codegen` isn't a single project, and other child projects, such as middleware for request/response validation, or conversions between types at runtime, also need maintenance. The project is sufficiently complex, led by user examples, and has a lot of usage that can make it hard to maintain for $0/month. Over the last few years I've been very appreciative of a few companies sponsoring the work, but the project requires more hours of work, especially given the many large companies using it, but giving nothing back. While looking at options for increasing the number of folks who maintain the project, a key area I wanted to focus on was to make sure that the security of the project would not be compromised. This was, in fact, the key reason I submitted `oapi-codegen` to the program - I wanted support in making sure that I'd done my due diligence to make sure we were setting the project and its users up for success as we introduced new members to maintain the project. For instance, adding a new collaborator with Write access onto the repository would, by default, allow the pushing of a Git tag, which would then be a released Go version that automated tools like Renovate would happily start upgrading folks to. Alternatively, the new collaborator able to approve a PR and merge it onto the `main` branch would also be treated as a version that's ready to be used, as we recommend pinning to commits off `main` to get changes before a release. I love that Go provides a straightforward process for users to get updates, but making sure there was a level of control and protection for our users was important, as I've worked hard to build confidence with our users. Having dedicated time (and money) to fund the work to focus on security was a very big mentally, as it meant I didn't feel "guilty" for not looking at PRs or Issues raised by users, and instead focussing on security as a dedicated pool of time. With this in place, we are much more able to take on additional collaborators and maintainers. ## Understanding our gaps Over the years, I've worked in and around supply chain security, and on efforts to ensure the enterprise I worked for has had good security posture. I would say I have a fairly good understanding of good GitHub permissions models, areas to focus to make sure that bad actors can't leverage lax permissions, and experience with some of the tools to help audit usage. But the reality of only having one human maintaining the project was at odds with this - enforcing code review of all PRs worked for external contributor PRs, but when I needed to make changes, I didn't have a second reviewer. Since 2024, I've been working towards the OpenSSF Best Practices "passing" grade badge for `oapi-codegen`, and working towards following best practices there. As with many parts of the industry, there's often multitudes contained in a single area, and security is absolutely not the exception to the rule. Naturally there were gaps we had in other areas that we knew we were lacking in, and areas that we _didn't_ know we were lacking in. During the program, we got a chance to dig into different areas with a mix of talks, workshops and Q&A sessions, looking at areas like threat modelling, fuzzing and how to handle a security advisory (which may then become a CVE). Having the time to work on the program meant that we could address some of the security gaps, not limited to: * Setting up a security policy for the organisation * Including explicitly documenting which versions are supported, how to report a security issue, and how we treat **??**. * Tightening branch protection rules and/or migrating to Repository Rulesets * Setting up `govulncheck` with GitHub Code Scanning alerts * Setting up collection of OpenSSF Security Scorecard reports data * Enforcing GitHub Advanced Security checks As well as these concrete steps, we have also made less outwardly visible steps, like work towards a threat model for the project. ## Access to more of a community It's also been nice to have a place to chat, complain and brainstorm with other maintainers who are in a very similar position. Within the group, there was a good spread of projects' security levels, and everyone was at different points along the spectrum - more secure in some ways, but with gaps in other areas, leaving everyone feeling fairly equal overall. Although there is the GitHub maintainers community, which I've used in the past to field questions from other maintainers, it's quite a large group, and especially when talking about slightly more sensitive things like security, it's been nice to have a small trusted group. ## Can an inactive project be more secure? This is a slightly tongue-in-cheek comment, but I thought it'd be worth noting that given `oapi-codegen` has recently received slightly less maintenance it _could_ be argued that we're more secure for it 🤓 With reduced merging of community contributions (while still keeping an eye on security updates) it's meant that we're at least not merging potentially risky code changes. That's not where we want to be, however, as we want to be both secure _and_ well maintained! ## Great teachers The team at GitHub were great in taking us through the program in a mix of different formats - synchronous and asynchronous Q&A, workshops, presentations - and were all greatly knowledgeable and there was so much to learn. Working to upskill folks at a range of experience levels and security understanding is a tough job, but they made it seem like it was straightforward! Thanks again everyone 💜 ## Looking forward Now we're able to talk about our time in the program publicly, expect to see some more learnings shared! If you're interested in hearing about anything in particular, let me know!

Sharing some thoughts about the GitHub Secure Open Source Fund and how I spent the time with `oapi-codegen`.

1 month ago 4 1 0 0

It’s been a bit since I saw a good WASM magic trick, this stuffing of an LLM into a font is delightful.

1 month ago 4 2 0 0

Nice summary of how the economics / ergonomics of open source contributions is changing, partially due to generative AI.

1 month ago 4 0 0 0

I haven’t overlaid house damage datapoints on new map yet, but it seems to follow damage patterns less than I expected? Example: it has more floodplain along little white oak where no flooding historically. Curious if part of reason is that area has escaped worst rain concentrations in past events?

1 month ago 0 0 0 0

also, remember what 100-year flood vs 500-year flood means... it's a probability of occurrence. Consider the flood probability over the time living in the location, like during a 30-year mortgage.

1 month ago 2 1 0 0

Love these types of maps for social media as the algorithms tend to show you what you already follow or others follow - not weird new niches to explore far from home.

2 months ago 0 0 0 0

It is feeling similar to how there’s a point in time after atomic test impacts show up in…..everything.

What’s a good name for the llm version of Anthropocene?

2 months ago 0 0 0 0
Advertisement
Preview
Anthropic's newest AI model uncovered 500 zero-day software flaws in testing The AI company sees the model's advancements as a major win for cyber defenders in the race against adversarial AI.

I’ve built things that help to understand security posture & community health of open source leveraging number of data points, wonder if new one should be most commits before or after AI code assistants?

www.axios.com/2026/02/05/a...

2 months ago 0 0 1 0

Also some please do this side project so I don’t. It’s just getting easier and harder to resist.

2 months ago 0 0 0 0

A #geology / #code side project I’ve thought should be possible for years is global map of all rock outcrops near roads via street view images. Would be super useful for field trips and geotechnical things. This basically does it for New York City. Search for “rock outcrops”.

2 months ago 5 1 1 0

Here are charts highlighting the destruction of American science by Trump and the Republicans. The red lines are now.

2 months ago 0 1 0 0

With those safeguards in place though, usage of skills and such could explode as agents or an MCP app could go off search a package registry index & find best agent.md , instructions, skills, etc. for any given scenario and add that context thereby constraining outputs to improve performance.

2 months ago 0 0 0 0