frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Tesla turbine-inspired structure generates electricity using compressed air

https://techxplore.com/news/2026-01-tesla-turbine-generates-electricity-compressed.html
1•PaulHoule•1m ago•0 comments

State Department deleting 17 years of tweets (2009-2025); preservation needed

https://www.npr.org/2026/02/07/nx-s1-5704785/state-department-trump-posts-x
1•sleazylice•1m ago•1 comments

Learning to code, or building side projects with AI help, this one's for you

https://codeslick.dev/learn
1•vitorlourenco•2m ago•0 comments

Effulgence RPG Engine [video]

https://www.youtube.com/watch?v=xFQOUe9S7dU
1•msuniverse2026•3m ago•0 comments

Five disciplines discovered the same math independently – none of them knew

https://freethemath.org
1•energyscholar•4m ago•1 comments

We Scanned an AI Assistant for Security Issues: 12,465 Vulnerabilities

https://codeslick.dev/blog/openclaw-security-audit
1•vitorlourenco•5m ago•0 comments

Amazon no longer defend cloud customers against video patent infringement claims

https://ipfray.com/amazon-no-longer-defends-cloud-customers-against-video-patent-infringement-cla...
1•ffworld•5m ago•0 comments

Show HN: Medinilla – an OCPP compliant .NET back end (partially done)

https://github.com/eliodecolli/Medinilla
2•rhcm•8m ago•0 comments

How Does AI Distribute the Pie? Large Language Models and the Ultimatum Game

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=6157066
1•dkga•9m ago•1 comments

Resistance Infrastructure

https://www.profgalloway.com/resistance-infrastructure/
2•samizdis•13m ago•0 comments

Fire-juggling unicyclist caught performing on crossing

https://news.sky.com/story/fire-juggling-unicyclist-caught-performing-on-crossing-13504459
1•austinallegro•14m ago•0 comments

Restoring a lost 1981 Unix roguelike (protoHack) and preserving Hack 1.0.3

https://github.com/Critlist/protoHack
2•Critlist•15m ago•0 comments

GPS and Time Dilation – Special and General Relativity

https://philosophersview.com/gps-and-time-dilation/
1•mistyvales•18m ago•0 comments

Show HN: Witnessd – Prove human authorship via hardware-bound jitter seals

https://github.com/writerslogic/witnessd
1•davidcondrey•19m ago•1 comments

Show HN: I built a clawdbot that texts like your crush

https://14.israelfirew.co
2•IsruAlpha•21m ago•2 comments

Scientists reverse Alzheimer's in mice and restore memory (2025)

https://www.sciencedaily.com/releases/2025/12/251224032354.htm
1•walterbell•24m ago•0 comments

Compiling Prolog to Forth [pdf]

https://vfxforth.com/flag/jfar/vol4/no4/article4.pdf
1•todsacerdoti•25m ago•0 comments

Show HN: Cymatica – an experimental, meditative audiovisual app

https://apps.apple.com/us/app/cymatica-sounds-visualizer/id6748863721
1•_august•26m ago•0 comments

GitBlack: Tracing America's Foundation

https://gitblack.vercel.app/
3•martialg•26m ago•0 comments

Horizon-LM: A RAM-Centric Architecture for LLM Training

https://arxiv.org/abs/2602.04816
1•chrsw•27m ago•0 comments

We just ordered shawarma and fries from Cursor [video]

https://www.youtube.com/shorts/WALQOiugbWc
1•jeffreyjin•28m ago•1 comments

Correctio

https://rhetoric.byu.edu/Figures/C/correctio.htm
1•grantpitt•28m ago•0 comments

Trying to make an Automated Ecologist: A first pass through the Biotime dataset

https://chillphysicsenjoyer.substack.com/p/trying-to-make-an-automated-ecologist
1•crescit_eundo•32m ago•0 comments

Watch Ukraine's Minigun-Firing, Drone-Hunting Turboprop in Action

https://www.twz.com/air/watch-ukraines-minigun-firing-drone-hunting-turboprop-in-action
1•breve•33m ago•0 comments

Free Trial: AI Interviewer

https://ai-interviewer.nuvoice.ai/
1•sijain2•33m ago•0 comments

FDA intends to take action against non-FDA-approved GLP-1 drugs

https://www.fda.gov/news-events/press-announcements/fda-intends-take-action-against-non-fda-appro...
23•randycupertino•34m ago•15 comments

Supernote e-ink devices for writing like paper

https://supernote.eu/choose-your-product/
3•janandonly•37m ago•0 comments

We are QA Engineers now

https://serce.me/posts/2026-02-05-we-are-qa-engineers-now
1•SerCe•37m ago•0 comments

Show HN: Measuring how AI agent teams improve issue resolution on SWE-Verified

https://arxiv.org/abs/2602.01465
2•NBenkovich•37m ago•0 comments

Adversarial Reasoning: Multiagent World Models for Closing the Simulation Gap

https://www.latent.space/p/adversarial-reasoning
1•swyx•38m ago•0 comments
Open in hackernews

Ask HN: What do you look for in compliance reporting tools?

2•lukejkwarren•8mo ago
I’m building a web security monitoring platform and recently added branded compliance reporting for things like SOC 2 and ISO 27001.

The reports include:

- Your logo/colors or full whitelabel

- Mapped vulnerabilities (OWASP/CWE/WASC)

- Executive summaries for non-technical stakeholders

If you're responsible for security or reporting (internally or for clients), I'd love to know:

- What do you need to see in a compliance report?

- Who are you generating these for — clients, auditors, execs?

- What do you currently use (manual process, automated, third-party tools)?

- What’s still frustrating or slow about your current setup?

Curious how others are approaching this and what you'd actually want to see improved.

Comments

lukejkwarren•8mo ago
Added context: I've been working on a security scanning tool called PenZen (https://penzen.app) ad interested in how others have solved it.
qzhaxn3fxocmjpu•8mo ago
I worked in this space as a "virtual" CISO for a friend's company for several years (2020–2023) before giving up in frustration, so take the following with that caution.

Automated report generators made for very pretty graphics for the C level executives but failed us on actionable items for the managers and staff who had to actually fix exposures.

There was no sanity checking on some of the layout tools used, e.g. a crazy long endpoint URL would either spill off the side of the page (and be truncated) or be truncated with an ellipsis. In neither case could we tell what the original URL was without tracking down the scan log and searching it line by line.

If you're going to allow me to add my branding to the report I've paid to generate, don't charge me an arm, a leg, and an unmentionable part of anatomy to do so. And prefer SVG graphics so you can scale up/down/sideways as necessary. Or document the dimensions of the PNG/JPG you need. Or both.

One tool we used had two report options: executive level, which was a 10–15 page high level summary that was barely useful to brief senior management, or core dump, which was a potentially hundreds of pages long detailed report on each and every end point hit by the scan. There needed to be something in between (e.g. filter by severity or compliance area or…something). Generate multiple content types (pdf, pptx, html, xml, md, JSON, etc).

As you ask…there’s multiple audiences. Reports need to be generated for each. And the act of generating the report itself can be a compliance event, so the options selected or ignored for generating the report themselves may need to be recorded somewhere for a future auditor or litigator.

We typically used the service's automated process to do a scan and generate the initial report, and then manually edit the report to make it more appropriate for the given audience we were presenting to.

One service we used repeatedly until they priced themselves out of viability for us had multiple API endpoints for different types of scans where each API had wildly different parameters for the request (e.g. ?domain=example.com in one request would be ?ddns=example.com in another) and the results would have variably different JSON responses that had to be manually inspected almost every time.

There was no concept of a “organizational” account on a number of the services we tried. If I requested a scan under my account, my partner could not access the results unless he logged in as me. It would not have mattered if we were vCISO consultants or a corporation attempting to use the service.

Scan results were not directly actionable. If you're going to tell me something may be exposed to a particular CVE, link the CVE, and if possible what tripped the CVE.

As I said, I don't do this any more, and have zero interest in returning to it.

It was frustrating to be pinched between customers who wanted to spend as little money as possible checking off the “we are so secure” boxes and the service providers viewing the market as a flood of cash to grab as quickly as possible. It made zero sense for us to build our own tools out, yet once we got out of the trial phase of many of the tools the increased cost was beyond what we could bill our own customers.

lukejkwarren•8mo ago
Thank you so very much for the detailed breakdown. The prohibitively high pricing of cybersecurity tooling is a big problem. PenZen comes in way on the low end, but this erodes trust in the brand. Tough one to navigate as I look to find my footing in the market. I wish I had a customer like you as I'd literally just build all of your feedback directly in.

Many of the points I've actually specifically catered for in my compliance report are reassuring. For example, linking CVEs, sensible layouts etc.

The application itself caters for helping actual devs triage, fix, etc., with the report catering to audit and compliance needs. I've tried to avoid baking this into the report as the tool itself allows devs to get AI remediation guidance. Dev's don't read these reports IMO but they would jump into the application and click a button to see what the fix is - I hope.

Thanks again. I appreciate the time taken to respond with such detail.

qzhaxn3fxocmjpu•8mo ago
No problem. It wasn't that we were averse to paying, but the proposed price schedules were extraordinary, like 1000x the estimate expense of the actual service. Like they were trying to recoup all capital investment and sales overhead immediately rather than over several years.
lukejkwarren•8mo ago
Sorry to squeeze you for even more feedback, but my application has a pricing structure of:

9 USD - Hobby 19 USD - Grow 49 USD - Pro 149 USD - Agency

Each plan unlocks more features and targets but pro includes branded compliance reports + active scanning and a few other features, including high limits.

Does this align with what you think is fair? What is the biggest factor/feature that made you willing to pay more and/or pay at all for such a tool?

https://penzen.app for reference