Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The repl.it jobs page is literally just a shell, and you have to figure out how to apply:

https://repl.it/site/jobs



I just did a fork bomb:

jobs@repl.it:~$ :(){ :|: & };: [1] 26 jobs@repl.it:~$ bash: fork: retry: Resource temporarily unavailable


this is why we can't have nice things


I don't think it will have any effect, probably some container/vm will go down and that's it.


That's pretty cool, but they should really lock down outbound requests. You can send arbitrary curl requests to the public internet from their IP addresses (which are located in GCP). I'm not sure about mapping out the internal network, but that at least gives you a reliable proxy through Google Cloud.


SSH too. I found both Python (v2.7.13 and v3.5.3) and Perl v5.24.1 on the thing. After running ‘cat /etc/GLOBrelease’ (where glob is that pesky asterisk), I learn that it’s Debian 9, but according to ‘uname -a’ it’s Ubuntu. Fun!


Is brilliant, but there is a problem with this page. It seems that the files can be edited by any visitor. They should restrict the permits to avoid this.


I don't think It's shared.


probably running in a container or sandboxed in another way


So does anyone know the root password?


Cool but a bit too easy.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: