this post was submitted on 25 Nov 2025
350 points (99.4% liked)

Programmer Humor

31156 readers
537 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 

I'll give an example. At my previous company there was a program where you basically select a start date, select an end date, select the system and press a button and it reaches out to a database and pulls all the data following that matches those parameters. The horrors of this were 1. The queries were hard coded.

  1. They were stored in a configuration file, in xml format.

  2. The queries were not 1 entry. It was 4, a start, the part between start date and end date, the part between end date and system and then the end part. All of these were then concatenated in the program intermixed with variables.

  3. This was then sent to the server as pure sql, no orm.

  4. Here's my favorite part. You obviously don't want anyone modifying the configuration file so they encrypted it. Now I know what you're thinking at some point you probably will need to modify or add to the configuration so you store an unencrypted version in a secure location. Nope! The program had the ability to encrypt and decrypt but there were no visible buttons to access those functions. The program was written in winforms. You had to open the program in visual studio, manually expand the size of the window(locked size in regular use) and that shows the buttons. Now run the program in debug. Press the decrypt button. DO NOT EXIT THE PROGRAM! Edit the file in a text editor. Save file. Press the encrypt button. Copy the encrypted file to any other location on your computer. Close the program. Manually email the encrypted file to anybody using the file.

(page 4) 50 comments
sorted by: hot top controversial new old
[–] wer2@lemmy.zip 5 points 5 months ago (2 children)

The C++ code went something like this:

  1. Conver pointer to int
  2. Serialize the int over IPC to self using Linux Message Queues
  3. Delete/free the pointer
  4. Read the int from the queue
  5. Convert to pointer
  6. "Use" the pointer
load more comments (2 replies)
[–] Psythik@lemmy.world 4 points 5 months ago* (last edited 5 months ago) (1 children)

The script I vibe coded to automate part of my job. It's sloppy and unrefined, but it works, and saves me a ton of effort.

[–] chunkystyles@sopuli.xyz 4 points 5 months ago (1 children)

I hate vibe coding. However, this is the best use of it. I've done it several times for scripts and basic HTML dashboards.

[–] Psythik@lemmy.world 4 points 5 months ago* (last edited 5 months ago)

Agreed. I wouldn't write an entire app with an LLM, but for basic scripting and backend UIs, it's perfect for when you just need something quick and inelegant that works.

I have nothing against AI when it's used as a tool instead of a crutch.

[–] kryptonianCodeMonkey@lemmy.world 4 points 5 months ago (4 children)

Joined a new team and one of my first tasks was a refactor on a shared code file (Java) that was littered with data validations like if ("".equals(id) || id == null) { throw new IllegalArgumentException() }

The dev who wrote it clearly was trying to make sure the string values were populated but they apparently A) didn't think to just put the null check first so they didnt have to write their string comparison so terribly or else didnt understand short circuiting and B) didn't know any other null-safe way to check for an empty string, like, say StringUtils.isEmpty()

load more comments (4 replies)
[–] phpinjected@lemmy.sdf.org 3 points 5 months ago (1 children)

Doom original source code, codebase is very messy and looks like my grandpa scrimbles on paper.

[–] vrek@programming.dev 4 points 5 months ago

Speaking as an old person, back then they didn't have the same concerns. Security? Ehh just don't let bad guys access your computer.

Yeah a lot of old programs are either great programming or terrible.

[–] markz@suppo.fi 3 points 5 months ago (1 children)
load more comments (1 replies)
[–] verdi@feddit.org 3 points 5 months ago

Whatever is happening in Monster Hunter Wilds.

[–] netizen@programming.dev 3 points 5 months ago (1 children)
[–] chunkystyles@sopuli.xyz 2 points 5 months ago

Unless I'm missing something, this is a pretty bog standard SQL injection, yeah?

[–] ummagumma61@lemmy.world 3 points 5 months ago (2 children)

Weather forecasting software that maintains a linked list. When it eventually freed the memory used by the list, it would walk to the end of the list and free the last item. Then it would go back to the beginning of the list and do it again - rinse and repeat. Wonder why it was having performance issues 🙄

load more comments (2 replies)
load more comments
view more: ‹ prev next ›