DrawAFish.com Postmortem
Role of “vibe coding” and LLMs in the failure
- Several commenters note that some bugs (e.g., leftover “test admin” access, incomplete token checks) are extremely common even in non-AI, “properly designed” systems.
- Others argue this is exactly the risk of vibe coding: fast prototypes get mistaken for production systems, and issues like the JWT bug are less likely with an experienced security-conscious dev.
- One view: the core problem is human incompleteness, not LLMs; an LLM could even have been prompted to do a security review.
- Counterview: unlike a compiler, LLMs can silently introduce subtle vulnerabilities; users tend to treat them as hands-off despite warnings, similar to self-driving cars.
- Some expect LLMs to produce merely “mid” quality code (average developer level), so such flaws are predictable; others say that’s not how AI is being marketed.
- Firebase is called out as a repeated source of “footguns” in vibecoded apps, muddying how much blame belongs to AI vs. platform defaults.
- Multiple people generalize this to “broken/missing authentication/access control” being the most common real-world vuln, with or without AI.
Nature of the vandalism and community reaction
- Eyewitnesses describe a screen full of offensive fish: slurs, swastikas, national flags with caricatured features—likened to a 4chan wall but with fish.
- Some readers wanted screenshots out of curiosity or dark humor; others felt that seeking more detail was just rubbernecking at a car crash.
- A few continue to find and post links to borderline/filtered fish (e.g., swastika shapes embedded in fish, mild profanity).
Fun, harm, and user psychology
- Many found the site delightfully silly and the postmortem unusually thoughtful for a side project.
- One camp argues low-stakes, playful apps like this net more joy than harm and that the web needs more “silly apps from silly people.”
- Another camp counters that once it becomes a conduit for hate speech, that calculus is no longer obvious.
- Several commenters admit an instinct to probe or bypass filters (e.g., drawing “penis-looking” fish that evade detection).
Security responses and doxxing
- Commenters highlight that someone used the same exploit to undo vandalism, tying it to a long history of “worm that patches” behavior and law-enforcement countermeasures.
- Doxxing is said not to be typical for HN itself, but plausible when a site gets cross-posted to harassment-focused communities that enjoy breaking moderation, finding admin panels, and posting personal info.
Design, UX, and implementation details
- Suggestions include adding a flip/mirror option for fish drawings and reconsidering the anonymous, rate-limited voting model (fun but abusable, and unfair under CGNAT).
- Some ask clarifying questions on the JWT flaw; the key issue is that the server trusted any valid admin token for admin actions without ensuring it belonged to the authenticated user.