frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Handy when you just want to distract yourself for a moment

https://d6.h5go.life/
1•TrendSpotterPro•1m ago•0 comments

More States Are Taking Aim at a Controversial Early Reading Method

https://www.edweek.org/teaching-learning/more-states-are-taking-aim-at-a-controversial-early-read...
1•lelanthran•2m ago•0 comments

AI will not save developer productivity

https://www.infoworld.com/article/4125409/ai-will-not-save-developer-productivity.html
1•indentit•7m ago•0 comments

How I do and don't use agents

https://twitter.com/jessfraz/status/2019975917863661760
1•tosh•13m ago•0 comments

BTDUex Safe? The Back End Withdrawal Anomalies

1•aoijfoqfw•16m ago•0 comments

Show HN: Compile-Time Vibe Coding

https://github.com/Michael-JB/vibecode
2•michaelchicory•18m ago•0 comments

Show HN: Ensemble – macOS App to Manage Claude Code Skills, MCPs, and Claude.md

https://github.com/O0000-code/Ensemble
1•IO0oI•22m ago•1 comments

PR to support XMPP channels in OpenClaw

https://github.com/openclaw/openclaw/pull/9741
1•mickael•22m ago•0 comments

Twenty: A Modern Alternative to Salesforce

https://github.com/twentyhq/twenty
1•tosh•24m ago•0 comments

Raspberry Pi: More memory-driven price rises

https://www.raspberrypi.com/news/more-memory-driven-price-rises/
1•calcifer•29m ago•0 comments

Level Up Your Gaming

https://d4.h5go.life/
1•LinkLens•33m ago•1 comments

Di.day is a movement to encourage people to ditch Big Tech

https://itsfoss.com/news/di-day-celebration/
3•MilnerRoute•34m ago•0 comments

Show HN: AI generated personal affirmations playing when your phone is locked

https://MyAffirmations.Guru
4•alaserm•35m ago•3 comments

Show HN: GTM MCP Server- Let AI Manage Your Google Tag Manager Containers

https://github.com/paolobietolini/gtm-mcp-server
1•paolobietolini•36m ago•0 comments

Launch of X (Twitter) API Pay-per-Use Pricing

https://devcommunity.x.com/t/announcing-the-launch-of-x-api-pay-per-use-pricing/256476
1•thinkingemote•37m ago•0 comments

Facebook seemingly randomly bans tons of users

https://old.reddit.com/r/facebookdisabledme/
1•dirteater_•38m ago•1 comments

Global Bird Count Event

https://www.birdcount.org/
1•downboots•38m ago•0 comments

What Is Ruliology?

https://writings.stephenwolfram.com/2026/01/what-is-ruliology/
2•soheilpro•40m ago•0 comments

Jon Stewart – One of My Favorite People – What Now? with Trevor Noah Podcast [video]

https://www.youtube.com/watch?v=44uC12g9ZVk
2•consumer451•43m ago•0 comments

P2P crypto exchange development company

1•sonniya•56m ago•0 comments

Vocal Guide – belt sing without killing yourself

https://jesperordrup.github.io/vocal-guide/
2•jesperordrup•1h ago•0 comments

Write for Your Readers Even If They Are Agents

https://commonsware.com/blog/2026/02/06/write-for-your-readers-even-if-they-are-agents.html
1•ingve•1h ago•0 comments

Knowledge-Creating LLMs

https://tecunningham.github.io/posts/2026-01-29-knowledge-creating-llms.html
1•salkahfi•1h ago•0 comments

Maple Mono: Smooth your coding flow

https://font.subf.dev/en/
1•signa11•1h ago•0 comments

Sid Meier's System for Real-Time Music Composition and Synthesis

https://patents.google.com/patent/US5496962A/en
1•GaryBluto•1h ago•1 comments

Show HN: Slop News – HN front page now, but it's all slop

https://dosaygo-studio.github.io/hn-front-page-2035/slop-news
7•keepamovin•1h ago•1 comments

Show HN: Empusa – Visual debugger to catch and resume AI agent retry loops

https://github.com/justin55afdfdsf5ds45f4ds5f45ds4/EmpusaAI
1•justinlord•1h ago•0 comments

Show HN: Bitcoin wallet on NXP SE050 secure element, Tor-only open source

https://github.com/0xdeadbeefnetwork/sigil-web
2•sickthecat•1h ago•1 comments

White House Explores Opening Antitrust Probe on Homebuilders

https://www.bloomberg.com/news/articles/2026-02-06/white-house-explores-opening-antitrust-probe-i...
1•petethomas•1h ago•0 comments

Show HN: MindDraft – AI task app with smart actions and auto expense tracking

https://minddraft.ai
2•imthepk•1h ago•0 comments
Open in hackernews

How are you handling identities for AI agents?

8•andylow•3mo ago
I've been thinking about how we manage identities for AI agents and I’m curious how others are approaching it.

From what I’ve seen, many treat agents like microservices, giving them app-style identities, but that feels off to me. That model comes from Web2 application identity systems, and I’m not sure it fits the new context we’re entering.

As we move into the AI age, I suspect we’ll need new forms of identity and authorization specifically designed for agents, especially since existing frameworks like OIDC have some clear limitations.

Would love to hear your thoughts or see what others are experimenting with.

Comments

SebastianFarts•3mo ago
The biggest problem I see with OIDC for agents is delegation—specifically, how one agent delegates authority to another agent acting on its behalf.

The microservice identity model breaks down when you have chains of agents, each potentially operating with different levels of autonomy and trust. OIDC was designed for human-to-service flows, not for dynamic agent-to-agent delegation where the context, scope, and risk profile can shift rapidly. I've been thinking we might need something closer to capability-based security or macaroons—where delegation is explicit, scoped, and auditable at each step. The key difference: instead of "who is this agent?" we should be asking "what specific action is this agent authorized to perform right now, and who in the chain vouches for it?"

I have been experimented with SPIFFE/SPIRE for agent identity or explored using verifiable credentials for delegation chains.

louis79_hacker•3mo ago
You’re mixing models that don’t really fit together. SPIFFE isn’t designed for delegation at all—it’s a PKI-style system: centralized issuance, short-lived certs, and a single trust root per domain. It gives workloads authenticated identity, not transitive authority. There’s no notion of “A acts on behalf of B” baked into SPIFFE.

Verifiable Credentials (VCs) solve a different problem. They’re decentralized, flexible, and can express explicit delegation chains like “A asserts B may perform X.” That’s capability-style reasoning, not identity issuance.

Trying to bolt VC-style delegation onto SPIFFE breaks both systems’ assumptions:

SPIFFE’s hierarchical trust model doesn’t mesh with the web-of-trust VC model.

Its short-lived SVIDs don’t persist long enough for meaningful delegation chains.

SPIRE doesn’t understand VC proofs (JSON-LD, linked data signatures).

You’d need a whole external policy and capability layer to make it work.

SPIFFE nails workload identity; VCs and capability systems handle delegation and contextual authority. Mixing them because “they both do identity” misses the point—they live at different layers of the trust stack.

andylow•3mo ago
what will be a better approach then?
louis79_hacker•3mo ago
If you’re trying to make SPIFFE handle delegation, you’re forcing the wrong layer to do the wrong job. SPIFFE gives you workload identity and attestation, full stop. It’s PKI for machines — not a delegation framework.

A better model is to separate identity from capability:

SPIFFE/SPIRE handles who the agent is (short-lived, attested identity).

Capabilities / Macaroons / ZCAP-LD handle what that agent is allowed to do, and who delegated it.

OPA or Cedar enforces policy at runtime.

VCs come in only if you need cross-domain delegation (federated or multi-issuer trust).

So SPIFFE issues identities, and those identities mint or receive verifiable capabilities that describe explicit rights. You get composable, auditable delegation without breaking SPIFFE’s short-lived cert model or pretending it can do web-of-trust semantics.

Trying to bake delegation into SPIFFE itself is just reimplementing capability security badly.

andylow•3mo ago
I do understand what you are saying, but in my head feels a bit too overcomplicated to just tell any developer doing AI agents to do all this stuff, there most be a cleaner way to do it.
verdverm•3mo ago
Search "A2A", it was proposed by Google and seeing adoption
andylow•3mo ago
Thanks, that is what I was looking for. Been playing with delegation chains using tokens, and was wondering what else has been done. The only down side I see to the google approach is TLS from a verified CA, rotation of certs is always a pain. But I guess they figured that building in top of what is already there is better than inventing a new way.