DevLog;
by Milan Medvec
Last week, we upgraded our project from Next.js v15.15 to v16.0, and ran into a frustrating issue: file uploads stopped working correctly. After some debugging in a clean project, I discovered that the new proxy handler seems to interfere with form data, causing uploads to appear empty. I’ll show how to reproduce the bug, what the output looks like, and the temporary workaround I found.

The Docker Group Is Basically Root: A Security Blind Spot Developers Ignore
Docker feels like a sandbox—but it isn’t. If a user belongs to the docker group, they effectively gain root-level access to the host. By simply mounting host directories into a container, an unprivileged user can read and modify files owned by root. This isn’t a vulnerability—it’s how Docker works. Treat Docker access with the same caution as granting sudo.

Next.js Server Actions: Beware the Hidden Form Reset
While experimenting with Next.js Server Actions and the new useActionState hook, I stumbled on an unexpected problem: every form submission triggered a browser-level reset event. This silent reset can cause confusing, inconsistent UI behavior—especially when using components like Radix UI.

Next.js Blog Starter App
Looking to start a blog with Next.js? The blog starter app makes it incredibly easy. Here’s a quick guide to creating the project, running it locally, and beginning your first posts.

Kicking Off My Portfolio Blog
A new space for sharing my projects, experiences, and thoughts. I’m starting this blog to document what I learn, reflect on challenges, and hopefully offer ideas that help others. Excited to begin this journey—more posts coming soon.

Using OverlayFS in Rootless Environments with User Namespaces
This guide demonstrates how to mount an overlay filesystem both with root privileges and inside a rootless environment using user namespaces. It covers creating the required directory structure, mounting and verifying an overlayfs setup, and then performing the same operations without host-level root access by mapping a regular user to root within a new user namespace. This enables running applications in rootless containers while still performing privileged operations like mounting overlayfs.

