frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Claude has a compiler, I have SlopScript

https://slopscript.netlify.app/
1•hiten_sharma•2m ago•0 comments

Context Is Part of the Game

https://joy.pm/context-is-part-of-the-code/
1•rafadc•3m ago•0 comments

Dave Farber has passed away

https://lists.nanog.org/archives/list/nanog@lists.nanog.org/thread/TSNPJVFH4DKLINIKSMRIIVNHDG5XKJCM/
1•vitplister•3m ago•0 comments

Researchers find brain mechanism behind 'flashes of intuition'

https://medicalxpress.com/news/2026-02-brain-mechanism-intuition.html
1•pseudolus•6m ago•0 comments

Extracting Xcode's Claude Code Prompt

https://www.jackpearce.co.uk/posts/extracting-xcodes-claude-code-prompt
1•jkpe•7m ago•0 comments

AI is not another abstraction because god plays dice

https://rakhim.exotext.com/ai_is_not_another_abstraction_because_god_plays_dice
1•freetonik•7m ago•0 comments

Show HN: Tandem – An open-source, local-first AI workspace (Rust and React)

1•frumu•10m ago•0 comments

Show HN: AI Perks – A curated list of free AI credits and deals for developers

https://www.getaiperks.com/en
1•artluko•10m ago•0 comments

Why E cores make Apple Silicon fast

https://eclecticlight.co/2026/02/08/last-week-on-my-mac-why-e-cores-make-apple-silicon-fast/
1•ingve•11m ago•0 comments

Show HN: Google Maps but for your repo (Open Source)

https://github.com/zacharykapank/repomap
1•zacharykapank•12m ago•0 comments

Djevops: Host Django on Bare Metal

https://github.com/mherrmann/djevops
1•mherrmann•13m ago•0 comments

How to Destroy a Space Station

https://www.thequantumcat.space/p/how-to-destroy-a-space-station
1•verzali•14m ago•0 comments

Show HN: I built a framework to benchmark LLMs on System Design and Architecture

https://github.com/Ruhal-Doshi/hld-bench
1•ruhal•14m ago•0 comments

What do you expect from a Turkey-based hosting provider?

1•dpnet•15m ago•0 comments

Why Files Are Not Enough as Memory for AI Agents

https://medium.com/versanova/why-files-are-not-enough-as-memory-for-ai-agents-5a4aeca81154
2•gauravsc•15m ago•0 comments

Nabaztag: Embodiment of "IoT" that was before its time

https://nabaztag.com/archive/violet
1•simonjgreen•19m ago•0 comments

Show HN: Friends don't let friends do math after a few drinks

https://divvyai.app/
1•pieterdy•22m ago•0 comments

Show HN: A free, minimal CV builder I made as a side project

https://cv-today.com
1•PokeWorldJG•23m ago•1 comments

Show HN: Competitor Finder API – find real competitors from one hostname

https://champsignal.com/competitor-finder-api
1•maximedupre•26m ago•0 comments

Show HN: Textream: Dynamic Island-style teleprompter for macOS with voice track

https://blog.fka.dev/textream/
1•fka•30m ago•0 comments

How do you use AI coding tools at scale without losing architectural control?

https://contextfirst.dev/
1•seekerXtruth•36m ago•2 comments

What to do with the KDE Oxygen and Air themes?

https://filipfila.wordpress.com/2026/02/08/beating-an-old-but-not-dead-horse-what-to-do-with-the-...
3•jandeboevrie•38m ago•0 comments

Show HN: One app to command CLI agents across projects - RexIDE

https://rex.mindmeld360.com
1•tomerbd•40m ago•0 comments

Windows is leaving old printers behind without solution

https://www.tomshardware.com/peripherals/printers/microsoft-stops-distrubitng-legacy-v3-and-v4-pr...
2•storm1er•41m ago•1 comments

Eight More Months of Agents

https://crawshaw.io/blog/eight-more-months-of-agents
1•arrowsmith•42m ago•0 comments

Uber held liable, ordered to pay $8.5M in driver rape suit

https://www.cnbc.com/2026/02/06/uber-liable-pay-8-5-million-driver-rape-suit.html
1•gslin•48m ago•0 comments

DayTradingCentral – Free Trading Journal (Next.js, NestJS, Postgres)

https://www.daytradingcentral.com
1•MuZzZ•48m ago•1 comments

Creative problem-solving of unsolved puzzles during REM sleep

https://academic.oup.com/nc/article/2026/1/niaf067/8456489
3•tchalla•55m ago•0 comments

Show HN: Language learning through AI example sentences (onigiri.kr)

https://jpen.onigiri.kr/
1•jaehakl•56m ago•0 comments

Wi-Fi 7 marketing is lying about its biggest feature [video]

https://www.youtube.com/watch?v=-5o_Qu3XToQ
2•wateralien•56m ago•0 comments
Open in hackernews

Show HN: RunSecret – An open source secrets management CLI for developers

https://github.com/runsecret/rsec
2•devenjarvis•8mo ago
Hey everyone!

I’m excited to share RunSecret (aka: rsec), an open source CLI I built to make working with secrets during local development easier and more secure.

If your experience is anything like mine, your team probably has secrets they need to use during local development (ex: API Keys, JWT Signing Secrets, DB credentials, etc) and you may have solved that problem with a git-ignored .env file, like many of my past teams have. If this sounds familiar then you may have also experienced my pain of securely bootstrapping secrets for every new team member, accidental commits when the .env file gets renamed to .env_tmp (yes, that actually happened), tripping over rotating secrets on every local machine, and explaining to your security team that everybody who offboards has all those secrets in plaintext on the laptop they just took with them. If you’ve felt any of this pain, then you know why I built RunSecret!

The core idea behind RunSecret is based on secret references: URL-like addresses that point to a secret in your team’s vault of choice. These references can be generated by RunSecret and used to replace instances of that secret currently stored in .env files or ENV VARS. When you run any command with RunSecret those references will be loaded and replaced with the real deal - but only during runtime, and only for that command! This means two, pretty-cool things:

1. .env files are safe to commit and share across your team again. This means access to secrets is controlled by your vault, and onboarding, rotation and offboarding access to these secrets is all automated now. (Big plus, your security team is also happier!) 2. If you are already using env vars to pass secrets into your application, you can use RunSecret without changing a single line of code.

RunSecret is built to be vault agnostic, and current supports AWS Secrets Manager, Azure Key Vault, and HashiCorp Vault (with more on the way). I’ve also built in some bells and whistles, like automatic redaction of any referenced secret in your application's stdout/stderr to reduce the chance of leaks. It’s still early days, and there’s a lot more I want to build out for RunSecret, but the core functionality is there and I’d love to start getting feedback from others and their use cases.

If you are interested you can check it out on GitHub here: https://github.com/runsecret/rsec

I’d be remiss if I didn’t credit the original inspiration for RunSecret. If you’ve ever used 1Password’s very well done CLI, `op` , this all probably looks familiar to you. RunSecret was an itch I had to scratch after working on a team that used 1Password as its team vault, and then dealing with withdrawals when I switched to an org that used AWS Secrets Manager instead. For anyone who has or currently uses `op` , and misses that functionality with other secret vaults you work with, RunSecret might be interesting to you!

I hope you enjoy RunSecret, and would love any and all feedback you have to make this better. Thanks for checking out my project!