March 17, 2026
CSI: Segfault, anyone?
Show HN: Fatal Core Dump – a debugging murder mystery played with GDB
CSI: Space Station — a sci‑fi whodunnit you solve in a browser, and folks are buzzing
TLDR: A new browser‑friendly sci‑fi mystery has players solving an airlock disaster by inspecting a real crashed app, and an early comment is hyped that the web VM even connects to Tailscale. Fans love the accessibility twist, while the hefty skill list raises the familiar challenge‑vs‑gatekeeping question.
Hacker News just got a new obsession: a sci‑fi murder mystery you solve by poking around a real crashed app. “Fatal Core Dump” drops you in the year 2216 to figure out why an asteroid station’s airlock failed—by sifting through a core dump (a frozen snapshot of a program when it crashed) and using GDB, a classic debugging tool. It’s equal parts detective story and coding class, with the dev boldly warning: no spoilers in the page source… unless you peek. Start the case here: Get Started.
The early vibe? Delight at the in‑browser lab. One standout reaction zeroed in on the linked WebVM—an online virtual machine—that, surprisingly, “can connect to Tailscale,” a private, secure network for your devices. Translation: you can do space‑noir forensics from a browser and still hook into your own network. That combo set off wide‑eyed curiosity and a little side‑eye (“cool magic, but how?”) in equal measure. Meanwhile, the skill list—C, assembly, reverse‑engineering—reads like a boss fight, which some will cheer as a proper challenge and others will see as a “fun, but yikes” barrier. Expect pun‑heavy riffs (“CSI: Segfault,” “Among Us, but for code”) and the eternal debate: is this a game, a class, or both? Either way, it’s the nerdiest space trial of the year.
Key Points
- •“Fatal Core Dump” is an interactive mystery where players debug a real compiled binary and core dump to determine the cause of a critical failure.
- •The story is set in 2216 at the asteroid mining station Apate, with background referencing the Year 2038 problem and software liability.
- •Required skills include GDB, C, binary reverse engineering, x86_64 assembly, Linux runtime/memory concepts, and core dump analysis.
- •Assistance and a browser-based WebVM are provided so players can learn and participate without installing local tools.
- •The binary is compiled with gcc 11.4.0 (Ubuntu build); spoilers exist in page source; artifact directory and a spoiler-filled making-of are available.