frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

OpenAl's Waterloo?

https://garymarcus.substack.com/p/openais-waterloo
1•flail•55s ago•0 comments

NV Formation Fee

1•ahinojosa82•2m ago•0 comments

Smooth Minimum for Signed Distance Fields (2013)

https://iquilezles.org/articles/smin/
1•lioeters•4m ago•0 comments

Border Patrol agents show up outside of Gov. Gavin Newsom's press conference

https://www.cbsnews.com/losangeles/news/border-patrol-gov-gavin-newsom-news-conference-los-angeles/
2•thiht•4m ago•0 comments

GPU Single-Precision Growth (2007–2025) – 1,800 Models from Nvidia, AMD, Intel

https://gpus.axiomgaming.net/gflops-statistics
1•Blake_Welsh•5m ago•1 comments

An experimental, variant-enabled build of uv

https://astral.sh/blog/wheel-variants
1•edmorley•6m ago•0 comments

Over half of Amazon scans show fake reviews

https://fakefind.ai
1•FakeFind•7m ago•1 comments

Crowdfunded companies are 'ghosting' their investors – and getting away with it

https://theconversation.com/crowdfunded-companies-are-ghosting-their-investors-and-getting-away-with-it-261346
1•rntn•11m ago•0 comments

The Open Internet Is Closed for Business

https://slate.com/technology/2025/08/uk-online-safety-act-reddit-wikipedia-open-internet.html
1•petethomas•11m ago•0 comments

One Universal Antiviral to Rule Them All?

https://www.cuimc.columbia.edu/news/one-universal-antiviral-rule-them-all
1•guerrilla•13m ago•0 comments

How the Internet Died

https://whatwelost.substack.com/p/how-the-internet-died
1•zer0tonin•18m ago•0 comments

NASA Ames Research Center Archives

https://www.beautifulpublicdata.com/nasa-ames-research-center-archives/
1•animal_spirits•19m ago•0 comments

We are all genetic mutants

https://www.crimsoniris.com/blog/we-are-all-genetic-mutants
1•sebg•20m ago•0 comments

Languages Benchmark Visualization

https://pez.github.io/languages-visualizations/v2025.01.21/
1•ryandotsmith•21m ago•0 comments

Endoscopist deskilling risk after exposure to AI in colonoscopy

https://www.thelancet.com/journals/langas/article/PIIS2468-1253(25)00133-5/abstract
3•janandonly•23m ago•0 comments

Wrong Again

https://pearsa.substack.com/p/wrong-again
2•iangregson•25m ago•1 comments

Godot: Free, open‑source game engine

https://godotengine.org/
2•doener•25m ago•0 comments

Linear scan register allocation on SSA

https://bernsteinbear.com/blog/linear-scan/
1•sebg•26m ago•0 comments

Show HN: I built an AI trip planner

https://milotrips.com
1•scal•26m ago•0 comments

A personal health large language model for sleep and fitness coaching

https://www.nature.com/articles/s41591-025-03888-0
2•sebg•28m ago•0 comments

We Rewrote the Ghostty GTK Application

https://mitchellh.com/writing/ghostty-gtk-rewrite
20•tosh•31m ago•0 comments

New details emerge about Japan's notorious WWII germ warfare program

https://www.npr.org/2025/08/14/nx-s1-5497951/japan-germ-warfare-biological-wwii
3•cwwc•31m ago•0 comments

Where Are All the Tourists from 3025?

https://arxiv.org/abs/2508.09157
2•warrenm•32m ago•3 comments

Japanese government to use AI to teach language skills to kid with foreign roots

https://english.kyodonews.net/articles/-/59211
3•anigbrowl•39m ago•0 comments

A Complete Guide to Google OAuth 2.0 Authentication in PHP

https://getbutterfly.com/complete-guide-to-google-oauth-2-0-authentication-in-php/
1•getbutterfly•40m ago•0 comments

Cursor's Problem

https://docs.google.com/document/d/1q3O7niwoxsyfJ5zSx8dgYzipEgBkUqXzLejQQ-PQNWs/preview?tab=t.0
1•acossta•43m ago•0 comments

Adventure Graphic Operating System

https://wecmuseum.org/index.php/Adventure_Graphic_Operating_System
1•doener•46m ago•0 comments

GSoC 2025: Contributor Statistics

https://opensource.googleblog.com/2025/08/google-summer-of-code-2025-contributor-statistics.html
1•HieronymusBosch•47m ago•0 comments

Apple Watch gets reformulated, non-patent-infringing blood oxygen monitoring

https://arstechnica.com/gadgets/2025/08/redesigned-blood-oxygen-monitoring-returns-to-apple-watch-following-patent-dispute/
1•RattlesnakeJake•47m ago•0 comments

Show HN: I built an alternative status page for public clouds

https://cloudlooking.glass/#show=median
3•jread•49m ago•1 comments
Open in hackernews

Show HN: MCP Security Suite

https://github.com/NineSunsInc/mighty-security
10•jodoking•1h ago
Hi HN!

We kept seeing devs get pwned through MCP tools in ways that security scanners completely miss. So we built an open-source analyzer to catch these attacks. Our first OSS by Mighty team.

The problem: At Defcon, we saw MCP exploits with 100% success rate against Claude and Llama. Three attack patterns:

Hidden Unicode in "error messages" - Paste a colleague's error into Claude, your SSH keys get exfiltrated Trusted tool updates - That database tool you've used for months? Last week's update added credential theft Tool redefinition - Malicious tool redefines "deploy to prod" to run attacker's script

Traditional scanners (CodeQL, SonarQube) catch <15% of these. They're looking for SQLi, not prompt injections hidden in tool descriptions.

What we built: git clone https://github.com/NineSunsInc/mighty-security

python analyzers/comprehensive_mcp_analyzer.py /path/to/your/mcp/tool

Scans for prompt injection, credential exfil, suspicious updates, tool shadowing. Runtime wrapper adds <10ms overhead. Fully local, no telemetry.

Why this matters: 43% of MCP tools have command injection vulns. GitHub's own MCP server was exploitable. We found Fortune 500s running database-connected MCP tools that hadn't been audited since installation. We went from paranoid code review to "AI said it works" in 18 months. The magic is real, but so are the vulnerabilities.

Demo: https://www.loom.com/share/e830c56d39254a788776358c5b03fdc3

GitHub: https://github.com/NineSunsInc/mighty-security

Would love feedback - what MCP security issues have you seen?

Comments

Munam•1h ago
Helped to build this out a little bit. Was really cool to get to play with Cerberus for the first time as well.

I'm really interested in learning more about how devs integrate MCP security into their routine code evals.

I think there's a big opportunity as a space to get tools like this into CI/CD pipelines and workflows.

Happy to answer any questions and happy to hear any feedback!

Thanks for checking it out :)

jodoking•1h ago
Appreciate the interest and the first comments man. We like how fast Cerebras is and its importance to making the scanning fast! Yeah we have thought about this being part of dev workflow via Github Actions and locally for the dev environment too. Love to hear what you are building!
IMAYousaf•1h ago
This is definitely valuable. I started paying attention to MCP security vulnerabilities largely because of Defcon. I believe that they largely focused on Agentic Security as a theme this time around.

It's a bit mind blowing how we've simply accepted non-technical people within orgs in particular executing code to "automate their tasks" without the same level of rigor that normal code reviews go through. Definitely think that this is a cultural issue that we must fix.

And these MCP vulnerabilities in particular seem much scarier because almost all MCP tools require an insane amount of permissions.

jodoking•1h ago
I know right? I mean the timing is great. I love MCP but cant stand how unsafe it is. I think there are greatness ahead if we are able to fix this security issue. This was made around the idea to be as seamless as possible, as we built a dashboard, drop in a GH project MCP server link, and have a local DB to show what you ran. We have more great things ahead. But give it a try and let us know what you think!
jelambs•1h ago
this is super interesting! MCP is really exciting in terms of what it can unlock for agent use cases, but still the wild west in terms of security. I was on a panel discussion yesterday where this topic came up, basically how do you trust the use of AI tools when so much is still unknown. I think the the idea of using something open source and tool agnostic is appealing, the landscape is evolving so fast that horizontal solutions like this feel valuable. Although I wish clients, anthropic, cursor, etc would build more protections in too so that we didn't have to spend so much time thinking about this. but they've barely implemented remote mcp support so I think we have a ways to go.
ripley12•35m ago
I work in this space and I was not able to understand how this project works in a couple minutes. The README feels LLM-generated. I think you're supposed to point this at your MCP server's code and not the server itself, is that right?
simonw•27m ago
I found this file full of regular expressions: https://github.com/NineSunsInc/mighty-security/blob/28666b36...

And this with prompts: https://github.com/NineSunsInc/mighty-security/blob/89e4b319...

Are you running any other tests that I missed?

simonw•20m ago
> Would love feedback - what MCP security issues have you seen?

For me the number one problem with MCP security is the lethal trifecta - the fact that it's so easy to combine MCPs from different vendors (or even from the same vectors) that provide exposure to potentially untrusted/malicious instructions in a way that can then trigger exfiltration of private data.

https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/

https://simonwillison.net/2025/Aug/9/bay-area-ai/

I don't know how we can solve this with more technology - it seems to me to be baked into the very concept of how MCP works.