frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

The AI Mirage

https://www.theatlantic.com/technology/archive/2025/07/why-are-computers-still-so-dumb/683524/
1•outrun86•5m ago•0 comments

I Once Thought Europeans Lived as Well as Americans. Not Anymore

https://www.thefp.com/p/i-once-thought-europeans-lived-as-well-americans
1•petermcneeley•9m ago•0 comments

No. The C++ mascot is not a diseased rat named Keith

https://lunduke.locals.com/post/5111104/no-the-c-mascot-is-not-a-diseased-rat-named-keith
1•ChadNauseam•12m ago•0 comments

Journalist Karen Hao on Sam Altman, OpenAI and the "Quasi-Religious" Push for AI [video]

https://www.youtube.com/watch?v=s4hZz9Vd0lY
2•mgh2•20m ago•0 comments

A curated directory for developers to discover and showcase tech products

https://devhub.best
1•allentown521•21m ago•1 comments

Python Maps

https://github.com/symmy596/PythonMaps
1•fzliu•22m ago•0 comments

Show HN: Rate Reddit – before you get your feelings hurt

https://ratereddit.com
1•rodgetech•22m ago•0 comments

The Inerter: A Retrospective

https://www.annualreviews.org/content/journals/10.1146/annurev-control-053018-023917
1•teleforce•24m ago•0 comments

China Moves Forward with $167bn, 70 Gigawatt Dam

https://www.bloomberg.com/news/articles/2025-07-21/china-moves-ahead-with-167-billion-tibet-mega-dam-despite-risks
2•master_crab•31m ago•1 comments

AI model converts hospital records into text for better emergency care decisions

https://medicalxpress.com/news/2025-07-ai-hospital-text-emergency-decisions.html
1•PaulHoule•36m ago•0 comments

The future of climate change may not be what you think

https://www.readtangle.com/future-of-climate-change/
1•debo_•38m ago•2 comments

Show HN: NetXDP – Kernel-Level DDoS Protection and Traffic Manager with eBPF/XDP

2•gaurav1086•46m ago•0 comments

HTTP/1.1 Must Die – The Desync Endgame Begins

https://http1mustdie.com/
2•pabs3•48m ago•0 comments

The Epic Battle for AI Talent–With Exploding Offers, Secret Deals and Tears

https://www.wsj.com/tech/ai/meta-ai-recruiting-mark-zuckerberg-sam-altman-140d5861
1•brandonb•53m ago•0 comments

Hi guys, any thought on this project?

https://founder-hub-waitlist.vercel.app/
3•PaulKHO•55m ago•6 comments

Geocities Backgrounds

https://pixelmoondust.neocities.org/archives/archivedtiles
1•marcodiego•57m ago•0 comments

How Higher education failed America's poor

https://www.washingtonpost.com/opinions/2025/07/20/college-degree-value-poor-inequality/
8•pseudolus•1h ago•4 comments

this let you deploy your LLM agents into production with one click

https://agentainer.io/
1•cyw•1h ago•1 comments

Stem cells prioritize wound healing over hair growth

https://www.cell.com/cell-metabolism/fulltext/S1550-4131(25)00266-9
1•bookofjoe•1h ago•0 comments

Using Virtual Machines on macOS/Linux with Tart

https://developer.mamezou-tech.com/en/blogs/2024/02/12/tart-vm/
2•srid•1h ago•0 comments

Ask HN: What is the biggest waste of money?

5•alganet•1h ago•12 comments

Transfer.it – effortless file sharing, powered by MEGA

https://blog.mega.io/introducing-transfer-it
2•dotcoma•1h ago•2 comments

Maybe(?) Composable Continuation in C

https://old.reddit.com/r/C_Programming/comments/1m55ojy/maybe_composable_continuation_in_c/
1•Trung0246•1h ago•0 comments

Log by time, not by count

https://johnscolaro.xyz/blog/log-by-time-not-by-count
11•JohnScolaro•1h ago•7 comments

Thingiverse is cracking down on gun-related models using a new automated system

https://www.tomshardware.com/3d-printing/ghost-gun-proliferation-spurs-crackdown-at-thingverse-the-worlds-largest-3d-printer-model-design-repository-lawmakers-also-ask-3d-printer-vendors-to-create-ai-based-systems-to-detect-and-block-gun-prints
2•MrMember•1h ago•0 comments

China breakthrough in indium selenide (InSe) wafers with perfect stoichiometry

https://news.cgtn.com/news/2025-07-19/China-develops-new-method-to-mass-produce-high-quality-semiconductors-1F8iTEyEwVi/p.html
5•david927•1h ago•1 comments

Optics Are Monoids (2021)

https://www.haskellforall.com/2021/09/optics-are-monoids.html
2•xaedes•1h ago•0 comments

Scaling Internationalization in Nuxt and Vue.js: A New Approach with Intlayer

https://intlayer.org/doc/environment/nuxt-and-vue
1•aypineau•1h ago•0 comments

Europe has more heat deaths per year than the United States loses to gun deaths

https://www.perplexity.ai/search/europe-has-more-heat-deaths-pe-BDS6xdorS4.4x2WrCC9mAQ
9•fortran77•1h ago•9 comments

We don't notice slow improvement

https://notes.npilk.com/slow-improvement
1•LorenDB•1h ago•1 comments
Open in hackernews

MCP security vulnerabilities and attack vectors

https://forgecode.dev/blog/prevent-attacks-on-mcp/
157•tested1•1d ago

Comments

Arindam1729•1d ago
Truly, S in MCP stands for Security!
dotancohen•1d ago
The S in SFTP?

The S in SSH?

The S in HTTPS?

The S in MCP?

All stand for the same thing!

I remember when this joke was first applied to IoT.

iotku•1d ago
I do love the joke, but it is worth remembering as well that all of those S were to a certain extent afterthoughts to fix otherwise insecure protocols.

Given how old FTP and HTTP are it's fairly understandable that they weren't initially designed with security in mind, but I think it's valid to question why we're still designing insecure systems in 2025.

amitksingh1490•1d ago
Totally agree, If we have made a mistakes in past we must have learnt from it and when designing a standard specially with AI where the outcome is non deterministic we got be more careful.
dotancohen•20h ago
That's quite the point of the joke. Even today, we still design things that will need an S tacked onto it at some point in the future.
postalrat•1d ago
And P in WFH stands for productive.
amitksingh1490•1d ago
MCP new spec has to an extent covered auth. But the MCPs are yet to adopt to that.
simonw•1d ago
Auth doesn't protect against confused deputy attacks, which is a common problem exposed by MCP and other LLM tool systems. https://en.m.wikipedia.org/wiki/Confused_deputy_problem
bitweis•1d ago
100% - especially when Auth stands for just Authentication. Simple RBAC authorization also won't take us far. But Fine-grained Permissions(e.g. OPA, Cedar, OpenFGA, Permit.io) with ReBAC giving ai-agents Zero standing permissions, and only deriving on the fly the least privilege they need / got consent for, can dramatically reduce the problem
aviralb20•1d ago
MCP adoption is picking up fast.
bigyabai•1d ago
This post is an obvious victim of upvote manipulation. HN should ban the forgecode domain if it's going to abuse submissions like this.
dayjah•1d ago
Can you provide some context for your position? I’m not particularly familiar with ForgeCode. I’m interested in why you think there’s manipulation, and what you mean by “submissions like these”.
tomhow•17h ago
It's true that there were many inorganic upvotes on this submission, made within the first 10-20 minutes by a bot. Maybe bigyabai could see that there was an unusually high vote count for a story that was submitted so recently.

But this just goes to show how futile – indeed counter-productive – this kind of activity is. These votes are easily detected and were ignored, and the submission had enough legit upvotes to make it onto the front page organically. We've penalized the users involved and the domain, as we can't let this kind of attempted abuse go without any consequence.

But also, public callouts like this are against the guidelines and we ask that people let us know via email at hn@ycombinator.com. This allows us to know about it sooner and investigate it thoroughly before making a public comment about it.

joshwarwick15•1d ago
Same root causes again - check out https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/
OldfieldFund•1d ago
This can be easily used to search for seeds/private keys when AI coding agents are in YOLO mode.
ethan_smith•1d ago
The "lethal trifecta" refers to default configurations, excessive permissions, and inadequate authentication - three factors that plague MCP implementations just as they did with earlier technologies.
rvz•1d ago
We have not learned anything from the hundreds of open MongoDB databases without passwords floating around the internet waiting to be breached.

We now have the same with MCP servers in the AI era as documented in [0].

[0] https://news.ycombinator.com/item?id=44604453

spiritplumber•1d ago
MCP clearly needs an independent monitoring program to safeguard it. Let's call it Tron.
chokominto•20h ago
What are the actual exploits that should be tested though?