▲ | imiric 4 days ago | |||||||||||||
I do think that there's appeal in a single-binary tool that implements the core features of something like Proxmox. Proxmox is a complex project that requires dedicating an entire machine to it. I'm not familiar with Kimchi or Cockpit, but OP's claims sound reasonable. There are/were other even simpler tools like the similarly named flintlock, Incus, Lima, plain virsh, and many others. But most of them don't have a web UI, which matters to some users. However, besides this being vibecoded, what is fishy to me is that this project is coming from an account that 2.5 months ago was promoting their own cloud hosting project[1], with some fantastic claims, and suspiciously LLM-like replies. And yet today the web site of the project fails to load because of a TLS error. If you look even deeper into it, a second new account "supitsj" shows up in the comments, seemingly representing the same service, which seems to be the same account that created a tutorial[2] for them. The "jlucus" GitHub account claims to be a "Jesse D. Lucus" from Oakland, CA, whose links and website are full of crypto/web3/betting scams, and AI-generated slop. The account is also part of a non-existent "hypr-technologies" org, which seems to be a company registered in Singapore[3], which does have its own AS[4]. On its website it says that Infuze is "retired", and now they're focused on a new project called "Raiin". I'm not sure if these people are legit, scammers, or AI bots, but this whole thing stinks to high heaven. They're now flooding HN as well, as this isn't the first time I've seen Show HN posts with similar projects. AI-blocking AI tools are becoming increasingly necessary. What a time to be alive. [1]: https://news.ycombinator.com/item?id=44382949 [2]: https://github.com/jlucus/infuze-tutorial [3]: https://www.scam.sg/companies/53503711B/hypr-technologies | ||||||||||||||
▲ | nodesocket 4 days ago | parent | next [-] | |||||||||||||
Besides your spamming concern (which isn’t really that big of a deal) are you concerned this could be malicious? That’s my concern. How would they inject their malicious code besides the obvious of in the installer (main/install.sh) script? | ||||||||||||||
| ||||||||||||||
▲ | indigodaddy 4 days ago | parent | prev | next [-] | |||||||||||||
Maybe this was a homegrown tool for managing VMs in their infuze platform and they decided to open source it? Speculation of course, as is your guesswork here too. Would be nice to hear a response from the OP. | ||||||||||||||
| ||||||||||||||
▲ | supitsj 2 days ago | parent | prev | next [-] | |||||||||||||
I am laughing at this because of the shit storm it actually started but funny since well hmmm. None of this "scamming" or whatever you say about my industry could be further from the truth. Perhaps you are just not educated well enough to also pick up the phone and verify since my info is not even hard to find. Still laughing tho. *edit* Actually this was a well orchestrated post by my past partner named Teguh Probowo - who lied and ran off with $100,000 of mine. Nice try. | ||||||||||||||
▲ | moshib 4 days ago | parent | prev [-] | |||||||||||||
I'm running Proxmox in my homelab. Although it's based on Debian, it doesn't lend itself to running tasks other than Proxmox itself. I, for one, would appreciate a KVM manager with web UI (Portainer for KVM, if you may) - but I'm reluctant to run something so vibe-coded. | ||||||||||||||
|