frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Why AI Doesn't Think: We Need to Stop Calling It "Cognition"

https://docs.google.com/document/d/1FHUgpRTtL23cUygPhAh7xasccfKpX0T2ZGdlcsEr-4U/edit?usp=sharing
1•m_Anachronism•2m ago•0 comments

Gemini Introduces Personal Intelligence

https://blog.google/innovation-and-ai/products/gemini-app/personal-intelligence/
1•gmays•5m ago•0 comments

Forecats

https://secondthoughts.my/posts/projects/forecats/
1•unsnap_biceps•13m ago•0 comments

Anthropic's Claude Code and the rise of autonomous coding tools

https://www.wsj.com/tech/ai/anthropic-claude-code-ai-7a46460e
1•julienchastang•14m ago•0 comments

Tell HN: YouTube disabled advanced subtitling, and is stripping it from old vids

2•mister_mort•14m ago•0 comments

I created an MCP that lets AI debug runtime code (breakpoints, stepping, etc.)

https://github.com/ai-debugger-inc/aidb
1•jefflester•19m ago•1 comments

Batmobile: 10-20x Faster CUDA Kernels for Equivariant Graph Neural Networks

https://elliotarledge.com/blog/batmobile
1•ipnon•21m ago•0 comments

OPDS – an open syndication standard for electronic documents

https://en.wikipedia.org/wiki/Open_Publication_Distribution_System
1•Curiositry•27m ago•0 comments

Using OpenRouter with the Anthropic Agent SDK

https://openrouter.ai/docs/guides/community/anthropic-agent-sdk
2•arbayi•29m ago•0 comments

Google Now Defaults to Not Indexing Your Content (2024)

https://www.vincentschmalbach.com/google-now-defaults-to-not-indexing-your-content/
1•AznHisoka•29m ago•1 comments

Serpl – a pleasant TUI for regex and fixed-string search and replace

https://github.com/yassinebridi/serpl
2•Curiositry•33m ago•0 comments

Show HN: App to spoof GPS location on iOS without jailbreaking

https://github.com/acheong08/ios-location-spoofer
4•acheong08•40m ago•1 comments

Fish Shell

https://fishshell.com/
6•RyanShook•44m ago•3 comments

Ask HN: How do you catch silent logic bugs that don't crash?

1•vortexshadow•44m ago•0 comments

Examplefile – Sample Document File Formats

https://www.examplefile.com/document
1•petethomas•51m ago•0 comments

Show HN: DefendFlow Domain Security Board – live scans of popular sites

1•riyao_lin•54m ago•0 comments

Show HN: Headroom (OSS): Cuts LLM costs by 85%

https://github.com/chopratejas/headroom
1•chopratejas•56m ago•1 comments

Breaking the Linearity Barrier: Recursive Swarms for Long-Horizon AI Engineering

https://www.blankline.org/research/horizon-mode
1•satvikpendem•58m ago•0 comments

Data Activation Thoughts

https://galsapir.github.io/sparse-thoughts/2026/01/17/data_activation/
1•galsapir•1h ago•0 comments

Show HN: My way – 18-agent autonomous workflow for ClaudeCode – issues to deploy

https://github.com/avifenesh/awesome-slash
2•anotherCodder•1h ago•0 comments

The life of a playboy publisher who shaped 20th-century literature

https://www.washingtonpost.com/books/2026/01/09/bennett-cerf-biography-nothing-random-feldman-boo...
3•benbreen•1h ago•0 comments

Revisiting Brat Summer: Artists, politicians, and the summer of 2024

https://thelastwave.substack.com/p/revisiting-brat-summer
2•johanam•1h ago•0 comments

Build Your Own AI Coding Agent (Full Guide) [video]

https://www.youtube.com/watch?v=3GjE_YAs03s
2•kburman•1h ago•0 comments

Umarell – men of retirement age who spend their time watching construction sites

https://en.wikipedia.org/wiki/Umarell
5•gurjeet•1h ago•1 comments

The SaaS Selloff: AI and Interest Rates

https://davefriedman.substack.com/p/the-saas-selloff-ai-and-interest
4•stosssik•1h ago•0 comments

BioNeMo Platform Accelerate AI-Driven Drug Discovery

https://nvidianews.nvidia.com/news/nvidia-bionemo-platform-adopted-by-life-sciences-leaders-to-ac...
1•gmays•1h ago•0 comments

How do I stop participating?

https://geohot.github.io//blog/jekyll/update/2026/01/18/how-do-i-stop.html
18•JuanJohnJames•1h ago•3 comments

AI Sandbox for Claude Code CLI with Node and Python SDKs

https://sandbox.stateset.app
2•domsteil•1h ago•0 comments

You Need More AWS Accounts Than You Think

https://cloudposse.com/blog/you-need-more-aws-accounts-than-you-think
4•mooreds•1h ago•4 comments

Show HN: Gollem – Go framework for agentic AI app with MCP and built-in tools

https://github.com/m-mizutani/gollem
1•masa00•1h ago•0 comments
Open in hackernews

Show HN: Spliff – Correlating XDP and TLS via eBPF (Building a Linux EDR)

https://github.com/NoFear0411/spliff
3•spliffedr•2h ago

Comments

spliffedr•2h ago
Hi HN,

I *built Spliff, a high-performance L7 sniffing and correlation engine in pure C23. The goal is to build a fully working, Linux-native EDR that isn't a resource-hogging black box.

The core innovation – "Golden Thread" correlation:

Most eBPF sniffers capture SSL data OR packets. Spliff correlates both:

  XDP (NIC) → sock_ops (socket cookies) → Uprobes (SSL buffers)
      ↓              ↓                         ↓
   packets      TCP 5-tuple              decrypted data
                     ↘         ↓         ↙
                      unified per-flow view
This maps raw decrypted TLS data back to the exact TCP flow, PID, and process—something commercial EDRs struggle with.

Technical highlights:

• XDP + sock_ops + Uprobes – Three BPF program types working together via shared maps

• Lock-free threading – Dispatcher/Worker model with Concurrency Kit SPSC queues

• Full HTTP/2 – HPACK decompression, stream multiplexing, request-response correlation

• No MITM – Hooks OpenSSL, GnuTLS, NSS, WolfSSL, BoringSSL directly via uprobes

• Static binary fingerprinting – Build ID matching for stripped binaries (Chrome)

• BPF-level filtering – AF_UNIX IPC filtered in kernel, not userspace

Current status: Working L7 visibility engine. Captures and correlates HTTPS traffic in real-time.

What's next: Process behavior tracking, file/network anomaly detection, event streaming (NATS/Kafka), threat intel integration.

Linux-only – Requires kernel 5.x+ with BTF, XDP, libbpf.

---

The project is GPL-3.0 and we're inviting anyone interested to contribute—whether it's code, architecture feedback, security research, or ideas for EDR features that actually matter (not compliance theater).

GitHub: https://github.com/NoFear0411/spliff

*Note: The codebase was written with Claude Opus. I provide the research, architecture decisions, and review every line.

ironbound•1h ago
This is super cool, I always wanted a system to peak App packets before encryption gets applied.
westurner•1h ago
Does this do flow offloading? From https://westurner.github.io/hnlog/#comment-45755142 re: awesome-ebpf:

> "eBPF/XDP hardware offload to SmartNICs",

westurner•1h ago
Also this, re any eBPF FWIU: https://news.ycombinator.com/item?id=46412107 :

> So eBPF for a WAF isn't worth it?

spliffedr•1h ago
Here are answers to both your questions:

The code has the infrastructure for XDP hardware offload:

- XDP_MODE_OFFLOAD enum exists in bpf_loader.h:61

- XDP_FLAGS_HW_MODE flag mapping in bpf_loader.c:789

But it's not usable in practice because:

1. No CLI option – There's no way to enable offload mode; it defaults to native with SKB fallback

2. BPF program isn't offload-compatible – The XDP program uses:

- Complex BPF maps (LRU hash, ring buffers)

- Helper functions not supported by most SmartNIC JITs

- The flow_cookie_map shared with sock_ops (can't be offloaded)

3. SmartNIC limitations

– Hardware offload typically only supports simple packet filtering/forwarding, not the stateful flow tracking spliff does

What would be needed for SmartNIC support:

- Split XDP program into offloadable (simple classification) and non-offloadable (stateful) parts

- Use SmartNIC-specific toolchains (Memory-1, Netronome SDK, etc.)

- Me having a device with SmartNIC and full driver support to play with. I've done all my testing on Fedora 43 on my device

For now this could be a future roadmap item, but the current "Golden Thread" correlation architecture fundamentally requires userspace + kernel cooperation that can't be fully offloaded.

Here is a sample debug output when you run spliff -d and it tries to detect all your NICs:

--- [DEBUG] Loaded BPF program from build-release/spliff.bpf.o [XDP] Found program: xdp_flow_tracker [XDP] Found required maps: flow_states, session_registry, xdp_events [XDP] Found optional map: cookie_to_ssl [XDP] Found map: flow_cookie_map (for cookie caching) [XDP] Found optional map: xdp_stats_map [XDP] Initialization complete [XDP] Discovered interface: enp0s20f0u2u4u2 (idx=2, mtu=1500, UP, physical) [XDP] Discovered interface: wlp0s20f3 (idx=4, mtu=1500, UP, physical) [XDP] Discovered interface: enp0s31f6 (idx=3, mtu=1500, UP, physical) libbpf: Kernel error message: Underlying driver does not support XDP in native mode [XDP] native mode failed on enp0s20f0u2u4u2, falling back to SKB mode [XDP] Attached to enp0s20f0u2u4u2 (idx=2) in skb mode libbpf: Kernel error message: Underlying driver does not support XDP in native mode [XDP] native mode failed on wlp0s20f3, falling back to SKB mode [XDP] Attached to wlp0s20f3 (idx=4) in skb mode libbpf: Kernel error message: Underlying driver does not support XDP in native mode [XDP] native mode failed on enp0s31f6, falling back to SKB mode [XDP] Attached to enp0s31f6 (idx=3) in skb mode [XDP] Attached to 3 of 3 discovered interfaces XDP attached to 3 interfaces [SOCKOPS] Using cgroup: /sys/fs/cgroup [SOCKOPS] Attached socket cookie caching program sock_ops attached for cookie caching [XDP] Warm-up: Seeded 5 existing TCP connections [DEBUG] Warmed up 5 existing connections ---

edit: formating is hard on my phone

westurner•1h ago
> Me having a device with SmartNIC and full driver support to play with

Same. I have a Pi Pico with PIO, though

> but the current "Golden Thread" correlation architecture fundamentally requires userspace + kernel cooperation that can't be fully offloaded.

Hard limit, I guess.

(If you indent all lines of a block of text with two spaces (including blank newlines), HN will format it as monospace text and preserve line breaks.)

spliffedr•1h ago
I've updated the Architecture diagrams to include everything: https://github.com/NoFear0411/spliff/blob/main/README.md#arc...

Thanks for the format tip.

metmac•52m ago
Just came here to say this is awesome to see more folks do novel stuff with XDP!

After reading loophole labs post [0] a few months ago. I was hoping someone would cook on this for security research.

[0] https://loopholelabs.io/blog/xdp-for-egress-traffic