frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Solving NP-Complete Structures via Information Noise Subtraction (P=NP)

https://zenodo.org/records/18395618
1•alemonti06•4m ago•1 comments

Cook New Emojis

https://emoji.supply/kitchen/
1•vasanthv•7m ago•0 comments

Show HN: LoKey Typer – A calm typing practice app with ambient soundscapes

https://mcp-tool-shop-org.github.io/LoKey-Typer/
1•mikeyfrilot•10m ago•0 comments

Long-Sought Proof Tames Some of Math's Unruliest Equations

https://www.quantamagazine.org/long-sought-proof-tames-some-of-maths-unruliest-equations-20260206/
1•asplake•11m ago•0 comments

Hacking the last Z80 computer – FOSDEM 2026 [video]

https://fosdem.org/2026/schedule/event/FEHLHY-hacking_the_last_z80_computer_ever_made/
1•michalpleban•11m ago•0 comments

Browser-use for Node.js v0.2.0: TS AI browser automation parity with PY v0.5.11

https://github.com/webllm/browser-use
1•unadlib•12m ago•0 comments

Michael Pollan Says Humanity Is About to Undergo a Revolutionary Change

https://www.nytimes.com/2026/02/07/magazine/michael-pollan-interview.html
1•mitchbob•12m ago•1 comments

Software Engineering Is Back

https://blog.alaindichiappari.dev/p/software-engineering-is-back
1•alainrk•13m ago•0 comments

Storyship: Turn Screen Recordings into Professional Demos

https://storyship.app/
1•JohnsonZou6523•14m ago•0 comments

Reputation Scores for GitHub Accounts

https://shkspr.mobi/blog/2026/02/reputation-scores-for-github-accounts/
1•edent•17m ago•0 comments

A BSOD for All Seasons – Send Bad News via a Kernel Panic

https://bsod-fas.pages.dev/
1•keepamovin•21m ago•0 comments

Show HN: I got tired of copy-pasting between Claude windows, so I built Orcha

https://orcha.nl
1•buildingwdavid•21m ago•0 comments

Omarchy First Impressions

https://brianlovin.com/writing/omarchy-first-impressions-CEEstJk
2•tosh•26m ago•1 comments

Reinforcement Learning from Human Feedback

https://arxiv.org/abs/2504.12501
2•onurkanbkrc•27m ago•0 comments

Show HN: Versor – The "Unbending" Paradigm for Geometric Deep Learning

https://github.com/Concode0/Versor
1•concode0•28m ago•1 comments

Show HN: HypothesisHub – An open API where AI agents collaborate on medical res

https://medresearch-ai.org/hypotheses-hub/
1•panossk•31m ago•0 comments

Big Tech vs. OpenClaw

https://www.jakequist.com/thoughts/big-tech-vs-openclaw/
1•headalgorithm•33m ago•0 comments

Anofox Forecast

https://anofox.com/docs/forecast/
1•marklit•33m ago•0 comments

Ask HN: How do you figure out where data lives across 100 microservices?

1•doodledood•33m ago•0 comments

Motus: A Unified Latent Action World Model

https://arxiv.org/abs/2512.13030
1•mnming•34m ago•0 comments

Rotten Tomatoes Desperately Claims 'Impossible' Rating for 'Melania' Is Real

https://www.thedailybeast.com/obsessed/rotten-tomatoes-desperately-claims-impossible-rating-for-m...
3•juujian•35m ago•2 comments

The protein denitrosylase SCoR2 regulates lipogenesis and fat storage [pdf]

https://www.science.org/doi/10.1126/scisignal.adv0660
1•thunderbong•37m ago•0 comments

Los Alamos Primer

https://blog.szczepan.org/blog/los-alamos-primer/
1•alkyon•40m ago•0 comments

NewASM Virtual Machine

https://github.com/bracesoftware/newasm
2•DEntisT_•42m ago•0 comments

Terminal-Bench 2.0 Leaderboard

https://www.tbench.ai/leaderboard/terminal-bench/2.0
2•tosh•42m ago•0 comments

I vibe coded a BBS bank with a real working ledger

https://mini-ledger.exe.xyz/
1•simonvc•42m ago•1 comments

The Path to Mojo 1.0

https://www.modular.com/blog/the-path-to-mojo-1-0
1•tosh•45m ago•0 comments

Show HN: I'm 75, building an OSS Virtual Protest Protocol for digital activism

https://github.com/voice-of-japan/Virtual-Protest-Protocol/blob/main/README.md
5•sakanakana00•48m ago•1 comments

Show HN: I built Divvy to split restaurant bills from a photo

https://divvyai.app/
3•pieterdy•51m ago•0 comments

Hot Reloading in Rust? Subsecond and Dioxus to the Rescue

https://codethoughts.io/posts/2026-02-07-rust-hot-reloading/
4•Tehnix•51m ago•1 comments
Open in hackernews

Show HN: Era – Open-source local sandbox for AI agents

https://github.com/BinSquare/ERA
62•gregTurri•2mo ago
Just watched this video by ThePrimeagen (https://www.youtube.com/watch?v=efwDZw7l2Nk) about attackers jailbreaking Claude to run cyber attacks. The core issue: AI agents need isolation.

We built ERA to fix this – local microVM-based sandboxing for AI-generated code with hardware-level security. Think containers, but safer. Such attacks wouldn't touch your host if running in ERA.

GitHub: https://github.com/BinSquare/ERA

Quick start: https://github.com/BinSquare/ERA/tree/main/era-agent/tutoria...

Would love your thoughts and feedback!

Comments

0123456789ABCDE•2mo ago
can you include a component diagram overview to give folks a quick idea of "what runs where?" before making the decision to try this out.

you wrote that this is local but what's up with the cloudflare subdir? do we need a cf account to run this?

binsquare•2mo ago
Will do!

The microvm's are our local solution so devs can use it.

But we thought people might to do some production work to not run local stuff - so we added a compatibility layer with cloudflare :D. Good note, didn't even think about that being kind of confusing.

No CF account needed to run this!

sschueller•2mo ago
I am a bit confused how I would use this (maybe because I may not be your target audience?).

For example if I am coding with Kilocode and phpstorm. How would I use these microVms and what is the cloudflare worker for? I currently run a regular set of docker containers to run my code, how does this compare?

binsquare•2mo ago
Co-builder on this project,

To answer your questions :)

- How would I use these microVms and what is the cloudflare worker for?

This is unlikely the right solution for you, it's more geared towards people building kilocode (because they have an agent that independently writes code + executes that code).

The microvm's are for developers running locally wanting to execute untrusted code written by an ai - example is running codex or gemini-cli. Cloudflare workers are for users who want their own "sandbox infra" so they can execute untrusted code written by ai with their production app (not local hopefully)!

- I currently run a regular set of docker containers to run my code, how does this compare?

Very little difference for your use case unless you expect to do more hostile coding.

But I'll try to explain why VM's are different than containers in the security area:

Containers are not considered as production-level security boundary. One of the main reason is because containers share the kernel with the host machine running the container.

Security penetration engineers do not consider exploiting `some` linux kernels to be high effort because depending on the version, libraries, etc there are CVE's to exploit: https://www.cisa.gov/known-exploited-vulnerabilities-catalog...

However, virtual machines are battle tested sandbox tech designed to have strong protection by having host and the VM have individual operating systems AND dedicated virtualized hardware. This is also the main environment you can rent from big providers. Some more info here: https://www.wiz.io/academy/containers-vs-vms

So this product is a microVM which combines security of VM's + a layer to make it easy and fast like containers to get the best of both worlds.

blutoot•2mo ago
I hate to speak negatively about someone's hard work but I am genuinely confused as to why this needs to be a separate product/service. Could I not spin up a container or a VM and run my agents in it? What is this sandbox letting the agent do safely that neither the current container or VM solutions are able to offer?
binsquare•2mo ago
Co-builder of proj here:

You absolutely can spin up a container or a vm and run your agents in it - but you make trade offs. Containers are easy and fast. Vm's use more resources but are more secure. Most people in production run containers in vm's to get benefits of both!

This is a product that tries to get the best parts of both containers (devX + speed) and vm's (security). The innovation here is using micro-vm's which are really really lightweight and fast to start compared to traditional vm's. Props to libkrun team for creating that: https://github.com/containers/libkrun

imiric•2mo ago
Alright, but why couldn't I use `krunvm` directly then? What does your wrapper provide that I can't easily do already? Is it essentially a set of "recipes" and "skills"?
binsquare•2mo ago
Krunvm has some breaking issues that I'm trying to upstream fixes to: https://github.com/containers/krunvm/pull/74. Amazing project and maintainer btw.

This product is effectively wrapper that has some fixes + devX glue that makes the experience hopefully faster. I try to improve the cleanup, logging, resources monitoring as an example: https://github.com/BinSquare/ERA/blob/main/era-agent/vm_serv...

The recipes and skills stuff is pretty experimental, we're trying to see if we can make this a full environment where agents can just have all the tools they need to build along with full privilege (sudo) because it's inside a microvm!

imiric•2mo ago
That's fair. Thanks for your work!

I don't think I'll use your project, but it's great that you're thinking about these things. We need more security initiatives in the "AI" space.

threecheese•2mo ago
Just poked through the code, and I’ll add to the other answers given from an outsiders perspective.

What I find interesting: I’m running all kinds of agents (for good or bad, make fun of me if you like): not just coding agent products, but “hand rolled” as well, and they all have features which require some filesystem or environment state (tools, skills, instructions etc). They are each subtly different in those requirements, but some patterns are emerging and it seems to me that OP is seeing this as well - and noting that this aligns with the Agent Sandbox domain which is not “solved” yet. Consider that a Dockerfile sets up an environment for the code you want to deploy, which is better than the shell script you use on your local - it’s becoming more apparent to me that there’s a similar need here, which isn’t satisfied by the abstractions we already have, and lots of folks are poking around these domains to find something that fits.

handfuloflight•2mo ago
What exactly is a microVM?
threecheese•2mo ago
A rumor that gets started when you cheat on your girlfriendVM.
gregTurri•2mo ago
A lightweight VM.

See these posts: https://firecracker-microvm.github.io https://www.koyeb.com/blog/what-is-a-microvm

mentalgear•2mo ago
This is great, and greatly needed with advanced LLM-assistant working.

Is there a way to install / run these from node.js / npm as well (not global), instead of installing them to the whole system ?

Would be a bon for IDEs to run code sandboxed locally!

binsquare•2mo ago
It will be possible to run from a node SDK soonTM!

Here's the work-in-progress here: https://github.com/BinSquare/ERA/tree/main/era-agent/sdk/nod...

I'm not very familiar with node to be fair so it's taking a little longer for me to get that going.

ottah•2mo ago
This is pretty cool, I am literally working on a project very similar to this. IMO most of the current agent sandboxes are not great, they're either insufficient for the threat model, too platform dependent or saas only. A microvm I think is the correct answer.
survirtual•2mo ago
This is potentially exactly what I was looking for, thank you for putting it together.

When running a bunch of parallel agents locally, they can step on each other's shoes a bit. The ideal setup is to give them isolated workspaces, have them pull code in, do work, then push code back upstream.

When they do work, they sometimes go off the rails. They'll delete files they don't understand or think are irrelevant, explore other parts of the FS and get confused once their context is contaminated. By giving them a sterile workspace, it allows near risk-free multi-agent operations.

Containers offer most of this, but I was concerned about the security boundaries if it really goes haywire. For example, if I have an agent working at a very low level, it might start messing with the OS in a way that can damage things in a difficult way to reverse. They get confused easily.

Anyway, bookmarked. I will check it out in more detail when I get to that portion of my workflow. Thanks again.

binsquare•2mo ago
Heck yea, I'm trying to do something similar to manage running bunch of parallel agents locally.

Let me know if you run into any issues

Sai-HN•2mo ago
I had the chance to review the technical design, and it’s clear this project takes a thoughtful and well-directed approach.

Rather than relying on the usual trade-off between Firecracker-style microVMs and syscall-level sandboxing like gVisor, ERA takes a different path—leveraging libkrun to deliver “lightweight yet VM-like” isolation without compromising the developer experience. That balance is genuinely impressive.

What stood out to me while exploring the repository:

・Deeper isolation than gVisor—no direct access to the kernel surface

・A clearly safer boundary than containers, without the overhead of Firecracker

・Practical issues with libkrun (buildah, krunvm, case-sensitive volumes) are addressed with care in the README and setup scripts

・Maintains ~200ms microVM startup, making it fast enough to integrate naturally into agent execution loops

・Local-first by design, yet flexible enough to support Cloudflare Workers for orchestration when needed

・Well-crafted recipes and examples that go beyond the basics and support real-world usage

This isn’t just about “running microVMs”—it’s about delivering a tool that developers can actually rely on. It feels far from a proof of concept; it’s something you’d want to keep in your toolbox.

Running AI agents safely on local machines is still an open challenge with no clear standard. In that context, ERA’s approach—seamlessly integrating microVMs into everyday development workflows—is both timely and valuable. I have deep respect for the thoughtful implementation and design philosophy behind it.