frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Zen Tools

http://postmake.io/zen-list
1•Malfunction92•40s ago•0 comments

Is the Detachment in the Room? – Agents, Cruelty, and Empathy

https://hailey.at/posts/3mear2n7v3k2r
1•carnevalem•1m ago•0 comments

The purpose of Continuous Integration is to fail

https://blog.nix-ci.com/post/2026-02-05_the-purpose-of-ci-is-to-fail
1•zdw•3m ago•0 comments

Apfelstrudel: Live coding music environment with AI agent chat

https://github.com/rcarmo/apfelstrudel
1•rcarmo•4m ago•0 comments

What Is Stoicism?

https://stoacentral.com/guides/what-is-stoicism
3•0xmattf•4m ago•0 comments

What happens when a neighborhood is built around a farm

https://grist.org/cities/what-happens-when-a-neighborhood-is-built-around-a-farm/
1•Brajeshwar•4m ago•0 comments

Every major galaxy is speeding away from the Milky Way, except one

https://www.livescience.com/space/cosmology/every-major-galaxy-is-speeding-away-from-the-milky-wa...
2•Brajeshwar•4m ago•0 comments

Extreme Inequality Presages the Revolt Against It

https://www.noemamag.com/extreme-inequality-presages-the-revolt-against-it/
1•Brajeshwar•5m ago•0 comments

There's no such thing as "tech" (Ten years later)

1•dtjb•6m ago•0 comments

What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work

https://medium.com/@aglaforge/what-really-killed-flash-player-a-six-year-campaign-of-deliberate-p...
1•jbegley•6m ago•0 comments

Ask HN: Anyone orchestrating multiple AI coding agents in parallel?

1•buildingwdavid•7m ago•0 comments

Show HN: Knowledge-Bank

https://github.com/gabrywu-public/knowledge-bank
1•gabrywu•13m ago•0 comments

Show HN: The Codeverse Hub Linux

https://github.com/TheCodeVerseHub/CodeVerseLinuxDistro
3•sinisterMage•14m ago•2 comments

Take a trip to Japan's Dododo Land, the most irritating place on Earth

https://soranews24.com/2026/02/07/take-a-trip-to-japans-dododo-land-the-most-irritating-place-on-...
2•zdw•14m ago•0 comments

British drivers over 70 to face eye tests every three years

https://www.bbc.com/news/articles/c205nxy0p31o
15•bookofjoe•14m ago•4 comments

BookTalk: A Reading Companion That Captures Your Voice

https://github.com/bramses/BookTalk
1•_bramses•15m ago•0 comments

Is AI "good" yet? – tracking HN's sentiment on AI coding

https://www.is-ai-good-yet.com/#home
2•ilyaizen•16m ago•1 comments

Show HN: Amdb – Tree-sitter based memory for AI agents (Rust)

https://github.com/BETAER-08/amdb
1•try_betaer•17m ago•0 comments

OpenClaw Partners with VirusTotal for Skill Security

https://openclaw.ai/blog/virustotal-partnership
2•anhxuan•17m ago•0 comments

Show HN: Seedance 2.0 Release

https://seedancy2.com/
2•funnycoding•18m ago•0 comments

Leisure Suit Larry's Al Lowe on model trains, funny deaths and Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
1•thelok•18m ago•0 comments

Towards Self-Driving Codebases

https://cursor.com/blog/self-driving-codebases
1•edwinarbus•18m ago•0 comments

VCF West: Whirlwind Software Restoration – Guy Fedorkow [video]

https://www.youtube.com/watch?v=YLoXodz1N9A
1•stmw•19m ago•1 comments

Show HN: COGext – A minimalist, open-source system monitor for Chrome (<550KB)

https://github.com/tchoa91/cog-ext
1•tchoa91•20m ago•1 comments

FOSDEM 26 – My Hallway Track Takeaways

https://sluongng.substack.com/p/fosdem-26-my-hallway-track-takeaways
1•birdculture•20m ago•0 comments

Show HN: Env-shelf – Open-source desktop app to manage .env files

https://env-shelf.vercel.app/
1•ivanglpz•24m ago•0 comments

Show HN: Almostnode – Run Node.js, Next.js, and Express in the Browser

https://almostnode.dev/
1•PetrBrzyBrzek•24m ago•0 comments

Dell support (and hardware) is so bad, I almost sued them

https://blog.joshattic.us/posts/2026-02-07-dell-support-lawsuit
1•radeeyate•25m ago•0 comments

Project Pterodactyl: Incremental Architecture

https://www.jonmsterling.com/01K7/
1•matt_d•25m ago•0 comments

Styling: Search-Text and Other Highlight-Y Pseudo-Elements

https://css-tricks.com/how-to-style-the-new-search-text-and-other-highlight-pseudo-elements/
1•blenderob•27m ago•0 comments
Open in hackernews

Show HN: How we solved the InfoSec adoption blocker for cloud tools

1•sureshcsdp•1w ago
I've been building CleanCloud (open-source cloud cost scanner) and discovered the biggest adoption blocker wasn't our feature set

It was InfoSec approval.

  The Problem: The Code Audit Wall

  Every enterprise we talked to had the same process:
  1. SRE team loves the tool, wants to use it
  2. InfoSec requires security review before production use
  3. Security team must audit the entire codebase to verify read-only claims
  4. Process takes 2-4 weeks (or gets stuck in backlog indefinitely)

  One CISO told us: "I don't care if your README says 'read-only'. I need to verify you're not calling DeleteBucket() anywhere in 10,000 lines of Python."

  Fair point. But this kills adoption velocity.

  The Insight: Don't Ask Them to Trust Your Code

  The breakthrough came from asking: "Who do InfoSec teams already trust?"

  Answer: AWS and Azure. They already trust the cloud provider's IAM enforcement.

  So instead of asking them to audit our code, we provide:

  1. A 30-line JSON IAM policy (read-only by design)
  2. A verification script they can run to prove it's safe
  3. OIDC setup (GitHub Actions) with no stored credentials
  4. Runtime safety tests that fail if we call forbidden APIs

  The IAM Proof Pack: https://github.com/cleancloud-io/cleancloud/tree/main/docs

  The Result

  InfoSec teams now audit a 30-line JSON file instead of our entire codebase. Trust is enforced by AWS/Azure IAM, not by promises in our README.

  A colleague who reviewed it said:
  > "I specifically love the IAM Proof Pack approach. By requiring a separate, verifiable Read-Only IAM role, you shift trust from your code to the Cloud Provider's enforcement. They don't have to audit your Python code line-by-line—they just verify the JSON policy is safe."

  This reduced our InfoSec approval time from 2-4 weeks to same-day in several cases.

  Technical Details

  The approach works because:

  1. **Verifiable IAM Policy**: The read-only policy is declarative, easy to audit
     ```json
     {
       "Version": "2012-10-17",
       "Statement": [{
         "Effect": "Allow",
         "Action": ["ec2:Describe*", "s3:List*", "s3:GetBucketTagging"],
         "Resource": "*"
       }]
     }

  2. OIDC-First: No long-lived credentials, temporary tokens only
    - GitHub Actions → AWS STS AssumeRoleWithWebIdentity
    - Azure Workload Identity Federation
    - Zero secrets stored in CI/CD
  3. Runtime Guards: Our test suite mocks AWS/Azure SDKs and fails if forbidden methods are called
  def test_aws_runtime_readonly():
      with patch('boto3.client') as mock:
          mock.return_value.delete_bucket.side_effect = AssertionError("Forbidden!")
          scan_aws()  # Must not call delete_bucket
  4. Static Analysis: AST parsing blocks dangerous imports/calls at CI time

  Why This Matters

  If you're building DevOps/security tools that need cloud access, the "trust me, it's read-only" approach doesn't scale. InfoSec teams need verifiable guarantees, not promises.

  Shifting trust from your code to the cloud provider's enforcement makes security review tractable.

  Open Questions

  - Is there a better way to prove read-only behavior programmatically?
  - How do other cloud tools handle InfoSec approval?
  - Should this be a standard pattern for cloud security tools?

  GitHub: https://github.com/cleancloud-io/cleancloud
  Docs: https://github.com/cleancloud-io/cleancloud/blob/main/docs/infosec-readiness.md

  Happy to discuss the approach or share more details about what worked (and what didn't).

Comments

sureshcsdp•1w ago
here is the PYPI page if anybody interested: https://pypi.org/project/cleancloud/