frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The VAT refund is one of the greatest legal scams ever perpetrated

https://community.ricksteves.com/travel-forum/packing/vat-refunds-28591d59-d73c-4635-b13e-333ad97...
1•wslh•28s ago•0 comments

Show HN: Microsoft Agent Viewer

https://acs-viewer.pages.dev/
1•ellg•3m ago•0 comments

Show HN: AIs debating the same question – they disagree on everything

https://www.usecouncil.app/
1•jonnyhere•5m ago•1 comments

FreshRSS and BPC – Fetch full content from paywalled sites in FreshRSS with BPC

https://github.com/yuyangchee98/freshrss-bpc
1•yongyongyong•8m ago•0 comments

Ask HN: Good uses cases for Fabrice's microquickjs

1•fud101•17m ago•0 comments

A Big Fight over a Small Language in the Swiss Alps: a Plan to Tidy Up Romansh

https://www.newyorker.com/magazine/2025/12/08/a-very-big-fight-over-a-very-small-language
1•bookofjoe•19m ago•1 comments

New image sensor breaks optical limits [pdf]

https://phys.org/news/2025-12-image-sensor-optical-limits.pdf
1•sans_souse•25m ago•0 comments

Linus - kernel copyright licence covers software, does not extend to hardware

https://social.kernel.org/notice/B1aR6QFuzksLVSyBZQ
1•transpute•34m ago•0 comments

Motor powers prototype in-wheel electric powertrain system

https://www.electrichybridvehicletechnology.com/news/record-breaking-motor-powers-prototype-in-wh...
1•geox•35m ago•0 comments

Bridge Anonymization

https://github.com/elanlanguages/bridge-anonymization
1•handfuloflight•35m ago•0 comments

Why Taylor Swift's Frequent Flights Probably Won't Give Her Cancer

https://duncansnotes.substack.com/p/cosmic-radiation-at-10000-feet-why
2•laserduck•36m ago•1 comments

Production-Ready Speculative Decoding Models and Framework

https://lmsys.org/blog/2025-12-23-spec-bundle-phase-1/
1•gmays•37m ago•0 comments

Authenticating SSH Sessions with Secure Enclave

https://ewpratten.com/blog/ssh-secure-enclave
1•ewpratten•38m ago•1 comments

Selling Cool Domain

https://imtalking.com
1•nachoag7•43m ago•0 comments

Show HN: Kling Motion Control – Precise Motion Transfer from Video to Character

https://www.klingmotion.com/?i=d1d5k
2•lu794377•46m ago•0 comments

Advent of Code 2025: Haskell Solution Reflections for All 12 Days

https://blog.jle.im/entry/advent-of-code-2025.html
2•todsacerdoti•48m ago•0 comments

Love Actually is around Heathrow

https://www.heathrow.com/latest-news/love-actually-is-all-around-at-heathrow-airport
3•susam•55m ago•0 comments

Stock Success Predictor – FinSight AI

https://buy.stripe.com/6oUfZi6Xd51XeL3bxP9EI00
2•HyperScaler•59m ago•0 comments

I Built Cursor for Marketing Emails

https://www.sequenzy.com
2•nikpolale•1h ago•1 comments

A movie-like Music Video built using AI

https://www.youtube.com/watch?v=SvfCvAdxKew
1•fagnerbrack•1h ago•1 comments

China manga convention bars Japanese content amid political tensions

https://english.kyodonews.net/articles/-/67449
3•anigbrowl•1h ago•3 comments

Show HN: Calclock, Countdown/Lifeclock, Configurable

https://thysys.com/happy-new-year.html
1•HocusLocus•1h ago•0 comments

The Next-Gen Mainboard Designed with AmigaOS4 and MorphOS in Mind

https://mirari.vitasys.nl/our-story/
1•todsacerdoti•1h ago•0 comments

The Illusion of Political Independence

https://www.mdpi.com/3042-8084/1/1/3
2•PaulHoule•1h ago•0 comments

Claude-How To

https://github.com/luongnv89/claude-howto
2•handfuloflight•1h ago•0 comments

VidScore AI: Analyze your videos before you post

https://apps.apple.com/us/app/vidscore-ai-viral-analytics/id6756249746
2•gavfaro•1h ago•1 comments

Ask HN: How many HN'ers Celebrate Christmas vs. ?

7•gist•1h ago•8 comments

Coding Snake in Functional JavaScript (2018) [video]

https://www.youtube.com/watch?v=poVMBGe1THE
1•howToTestFE•1h ago•0 comments

Ask HN: How can anyone be confident in investor meetings?

2•junkaccount•1h ago•1 comments

Librarians Tired of Being Accused of Hiding Secret Books That Were Made Up by AI

https://gizmodo.com/librarians-arent-hiding-secret-books-from-you-that-only-ai-knows-about-200069...
6•vitalnodo•1h ago•3 comments
Open in hackernews

A Critical Look at "A Critical Look at MCP."

https://docs.mcp.run/blog/2025/05/16/mcp-implenda-est/
33•palmfacehn•7mo ago

Comments

nip•7mo ago
> Further, one of the issues with remote servers is tenancy

Excellent write-up and understanding of the current state of MCP

I’ve been waiting for someone to point it out. This is in my opinion the biggest limitation of the current spec.

What is needed is a tool invocation context that is provided at tool invocation time.

Such tool invocation context allows passing information that would allow authorizing, authentication but also tracing the original “requester”: think of it as “tool invoked on behalf of user identity”

This of course implies an upstream authnz that feeds these details and more.

If you’re interested in this topic, my email is in my bio: I’m of the architect of our multi-tenant tool calling implementation that we’ve been running in production for the past year with enterprise customers where authnz and auditability are key requirements.

jensneuse•7mo ago
The way we've solved this in our MCP gateway (OSS) is that the user first needs to authenticate against our gateway, e.g. by creating a valid JWT with their identity provider, which will be validated using JWKS. Now when they use a tool, they must send their JWT, so the LLM always acts in their behalf. This supports multiple tenants out of the box. (https://wundergraph.com/mcp-gateway)
Yoric•7mo ago
Is this really hard to code?

I mean, converting a tool-less LLM into a tool-using LLM is a few hundred lines of code, and then you can plug all your tools, with whichever context you want.

nip•7mo ago
Indeed very easy to code!

My point is about the need for a spec of this mechanism: without a spec, every company / org will roll out their own and result in 500 flavors of the same concept.

That’s where MCP shines: tool calling and tool discovery is already 1.5 years old (an eternity in ai land).

The MCP spec ensures that we can all focus on solving problems with tool calling rather than wasting time in cobbling together services that re not interoperable (because developed without a common spec / standard)

__loam•7mo ago
This is an advertisement
tomrod•7mo ago
I wish this were critical, but it is an ad for MCP.run.
nip•7mo ago
It’s both in my opinion and discussions can stem from the linked article

Many come to HN also for the comments

palmfacehn•7mo ago
Personally, I'm not a fan. I thought the proponent's view might stimulate a discussion.
FunnyLookinHat•7mo ago
> Server authors working on large systems likely already have an OAuth 2.0 API.

I think this biases towards sufficiently large engineering organizations where OAuth 2.0 was identified as necessary for some part of their requirements. In most organizations, they're still using `x-<orgname>-token` headers and the like to do auth.

I'm not sure that there's a better / easier way to do Auth with this use case, but it does present a signficant hurdle to adoption for those who have an API (even one ready for JSON-RPC!) that is practically ready to be exposed via MCP.

motorest•7mo ago
> I think this biases towards sufficiently large engineering organizations where OAuth 2.0 was identified as necessary for some part of their requirements. In most organizations, they're still using `x-<orgname>-token` headers and the like to do auth.

I don't think that's it. Auth is a critical system in any organization, and larger organizations actually present more resistance to change, particularly in business critical areas. If anything, smaller orgs gave an easier time migrating critical systems such as authentication.

hirsin•7mo ago
Touching on tenancy and the "real" gaps in the spec does help push the discussion in a useful direction.

https://vulnerablemcp.info/ is a good collection of the immediately obvious issues with the MCP protocol that need to be addressed. A couple low blows in there, that feel a bit motivated to make MCP look worse, but generally a good starting point overall.

owebmaster•7mo ago
This post has too many "shameless plugs" to be taken seriously.
smitty1e•7mo ago
Serious question:

If doing an extended, service-level session (like a GPT interaction) with a server known beforehand, would it make sense to set up a keypair and manage the interaction over SSH?

Restated: are we throwing away a lot of bandwidth establishing TLS trust for the more general HTTP?