frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Time to get serious about nuclear space travel, new study urges

https://bgr.com/science/its-time-to-get-serious-about-nuclear-space-travel-new-study-urges/
1•Bluestein•30s ago•0 comments

Ask HN: What Pocket alternatives did you move in to?

1•ahmedfromtunis•1m ago•0 comments

Google Is Back at It

https://old.reddit.com/r/cursor/comments/1m2hv36/google_is_back_at_it/
1•cft•1m ago•0 comments

The Big Oops: Anatomy of a Thirty-Five Year Mistake

https://www.computerenhance.com/p/the-big-oops-anatomy-of-a-thirty
1•ibobev•3m ago•0 comments

Lizard: An Efficient Linearization Framework for Large Language Models

https://arxiv.org/abs/2507.09025
1•simonpure•9m ago•0 comments

How Go 1.24 Swiss Tables saved us hundreds of gigabytes

https://www.datadoghq.com/blog/engineering/go-swiss-tables/
1•gandem•11m ago•0 comments

How we tracked down a Go 1.24 memory regression

https://www.datadoghq.com/blog/engineering/go-memory-regression/
1•gandem•13m ago•0 comments

4me.tools Reached 22 Tool

https://4me.tools
1•jack5341•13m ago•0 comments

Top AI Companies Have 'Unacceptable' Risk Management, Studies Say

https://time.com/7302757/anthropic-xai-meta-openai-risk-management-2/
2•gbseventeen3331•13m ago•0 comments

Achieving SOTA LongMemEval scores (80%) with RAG alone

https://mastra.ai/blog/use-rag-for-agent-memory
2•tybaa•15m ago•1 comments

Ask HN: Local Speech Transcription SwiftUI?

1•YAndreaRusso•17m ago•0 comments

Ad Blockers for Real Life Are Now a Thing, Thanks to AR Glasses

https://gizmodo.com/ad-blockers-for-real-life-are-now-a-thing-thanks-to-ar-glasses-2000629343
2•bookofjoe•17m ago•0 comments

Is there an "I" in AI? [PDF]

https://berryvilleiml.com/wp-content/uploads/Is-there-an-%E2%80%9CI%E2%80%9D-in-AI-.pdf
2•Bluestein•22m ago•0 comments

Elon Musk's plan to rain SpaceX's rocket debris over Hawaii's pristine waters

https://www.theguardian.com/technology/2025/jul/17/hawaii-elon-musk-spacex-rocket-debris
2•Stratoscope•22m ago•0 comments

Baltimore's Extraordinary Year

https://popular.info/p/the-secret-to-baltimores-extraordinary
2•MaysonL•22m ago•0 comments

Zig's fieldParentPtr for dumbos like me

https://www.ryanliptak.com/blog/zig-fieldparentptr-for-dumbos/
2•todsacerdoti•24m ago•0 comments

The QWERTY Keyboard Sucks [video]

https://www.youtube.com/watch?v=mFkC3F0lmjA
1•megamike•25m ago•0 comments

Vibe scraping and vibe coding a schedule webapp for a conference on my phone

https://simonwillison.net/2025/Jul/17/vibe-scraping/
3•simonw•26m ago•0 comments

Spent the week at one of the top AI research conferences

https://www.aol.com/ve-spent-week-one-world-160705643.html
1•Bluestein•27m ago•0 comments

Rivian restarting work on its Georgia factory, emails show

https://techcrunch.com/2025/07/17/rivian-restarting-work-on-its-georgia-factory-emails-show/
1•rntn•28m ago•0 comments

Smarter, workspace-aware code completions for C++ in VS Code

https://devblogs.microsoft.com/cppblog/smarter-workspace-aware-code-completions-for-c-in-vs-code/
3•mariuz•29m ago•0 comments

UTCP: Open, direct alternative to MCP for tool calling

https://github.com/universal-tool-calling-protocol/python-utcp
1•aliraza1006•29m ago•1 comments

New Russian law criminalizes online searches for controversial content

https://www.washingtonpost.com/world/2025/07/17/russia-internet-censorship/
4•perihelions•30m ago•1 comments

PBS, NPR Set to Lose Federal Funding as Senate Passes Doge Cuts

https://www.bloomberg.com/news/articles/2025-07-17/pbs-npr-set-to-lose-federal-funding-as-senate-passes-doge-cuts
2•JumpCrisscross•30m ago•0 comments

Venture Capital firms just got easier to launch

https://venturecapital.createsend1.com/t/d-e-suthdz-l-t/
1•wTheRockb•31m ago•0 comments

Robotaxi Competition Between Tesla, Uber and Waymo Is Beginning

https://www.bloomberg.com/opinion/articles/2025-07-17/robotaxi-competition-between-tesla-uber-and-waymo-is-beginning
1•JumpCrisscross•31m ago•0 comments

Agent DB

https://agentdb.dev/
1•tosh•37m ago•0 comments

Registration Opens for 2025 NASA International Space Apps Challenge

https://www.nasa.gov/earth/registration-opens-for-2025-nasa-international-space-apps-challenge/
1•DocFeind•37m ago•0 comments

Tron: Ares – Official Trailer [video]

https://www.youtube.com/watch?v=YShVEXb7-ic
2•amichail•39m ago•0 comments

China hosts first autonomous AI robot football match

https://www.theguardian.com/technology/2025/jun/30/china-hosts-first-fully-autonomous-ai-robot-football-match
2•PaulHoule•41m ago•1 comments
Open in hackernews

Show HN: kiln – Git-native, decentralized secret management using age

https://kiln.sh/
12•pacmansyyu•4h ago
Hi HN, I've been building this tool for the past couple of weeks to solve a problem that seems universal across development teams: sharing environment variables securely.

You know the drill - someone needs the staging database URL, so it gets shared over chat. Production API keys end up in plaintext files. Or you set up some complex secret management system that becomes a single point of failure during critical deployments.

At Zerodha, we're a stock broker with strict regulatory requirements. Our infrastructure needs to be auditable, and our data must stay with us for instant recovery. But the deeper issue was that every solution we tried made deployments dependent on external services.

We tried GitLab CI's built-in secrets, but they're stored unencrypted and only repository maintainers can access them. HashiCorp Vault was too complex to manage with painful ACL setup, plus it's now crippled by their BSL license change. AWS Secrets Manager would create the vendor lock-in we wanted to avoid.

The breaking point came when we wanted to manage secrets through Terraform for idempotency and better infrastructure-as-code practices. But Terraform has no built-in way to encrypt secrets without relying on external providers. We could either store secrets in plaintext in our Terraform configs or add yet another external dependency to our deployment pipeline.

That's when I had the idea: what if we could inject encrypted environment variables directly into Terraform, so anyone with the right key could deploy without hunting down secrets from different systems? As I iterated through this idea, I realized the same pattern would work for any application - from personal projects to team deployments.

So I built kiln. It encrypts environment variables using age encryption into files that live alongside your code. No servers, no network calls, no external dependencies. Each team member gets their own key, and you control access per environment.

Here's how it works:

  # Generate a new age key, or use your existing SSH keys
  kiln init key
  
  # Initialize with your team's public keys
  kiln init config --recipients "alice=$(curl https://gitlab.company/alice.keys)" --recipients "me=$(cat ~/.ssh/id_ed25519.pub)"
  
  # Set secrets (prompts securely, never shows in terminal)
  kiln set DATABASE_URL
  kiln set API_KEY
  
  # Run your app with decrypted environment
  kiln run npm start
  

  # These encrypted files are safe to commit
  git add .kiln.env kiln.toml

Why not SOPS? SOPS is great for general file encryption, but kiln is built specifically for the environment variable workflow. It has commands like "run", "export", and built-in team management. Think "SOPS for .env files" with a focus on developer UX.

Why not raw age encryption? Age is perfect for the crypto layer, but terrible for day-to-day team workflows. Try managing 20 team members across 5 environments with raw age commands - you'll go insane. kiln handles the orchestration.

As for technical details, kiln:

- Uses age encryption (modern, audited, simple)

- Works with existing SSH keys or generates new age keys

- Role-based access via TOML configuration

- Single, cross-platform Go binary

- Zero network dependencies - everything works offline

- MIT licensed

The game-changer: secrets travel with code. No more "can someone send me the staging secrets?" in chat. No more broken deploys because the secret service is down. No more hoping your vendor doesn't change their pricing or licensing.

Try it out - I'm confident it'll help improve your team's deployment workflows. Feel free to ask me any questions!

GitHub: https://github.com/thunderbottom/kiln

Docs: https://kiln.sh

Or install now: go install github.com/thunderbottom/kiln@latest

Comments

goku12•4h ago
> Why not SOPS? SOPS is great for general file encryption, but kiln is built specifically for the environment variable workflow. It has commands like "run", "export", and built-in team management. Think "SOPS for .env files" with a focus on developer UX.

As far as I know, SOPS supports the same workflow with the 'exec-env' subcommand. What would be the difference here?

pacmansyyu•4h ago
Yes, SOPS does have `exec-env` which does the same thing, kind of. From one of the issues, it currently lacks support for the POSIX-semantic way to run commands: https://github.com/getsops/sops/issues/1469, where you cannot add a `--` to tell sops that everything after it is supposed to be a command, so you end up having to quote everything. Other things that I found lacking were that with SOPS, adding a new team member means manually updating .sops.yaml, re-encrypting all files, and managing PGP/age keys. With kiln, you just add their SSH key to kiln.toml and run `kiln rekey`.

kiln also lets you have different access controls per environment file (devs get staging, only ops get production) without separate .sops.yaml configs, automatically discovers keys from SSH agent/~/.kiln/, and has built-in template rendering and export formats for different tools. You could definitely build similar workflows with SOPS + scripts, or any other tool, but kiln packages these common patterns into a single tool with better UX for teams.

Think of kiln as "opinionated SOPS", focused specifically on environment variables rather than general file encryption.