frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Dexterous robotic hands: 2009 – 2014 – 2025

https://old.reddit.com/r/robotics/comments/1qp7z15/dexterous_robotic_hands_2009_2014_2025/
1•gmays•55s ago•0 comments

Interop 2025: A Year of Convergence

https://webkit.org/blog/17808/interop-2025-review/
1•ksec•10m ago•1 comments

JobArena – Human Intuition vs. Artificial Intelligence

https://www.jobarena.ai/
1•84634E1A607A•14m ago•0 comments

Concept Artists Say Generative AI References Only Make Their Jobs Harder

https://thisweekinvideogames.com/feature/concept-artists-in-games-say-generative-ai-references-on...
1•KittenInABox•17m ago•0 comments

Show HN: PaySentry – Open-source control plane for AI agent payments

https://github.com/mkmkkkkk/paysentry
1•mkyang•19m ago•0 comments

Show HN: Moli P2P – An ephemeral, serverless image gallery (Rust and WebRTC)

https://moli-green.is/
1•ShinyaKoyano•29m ago•0 comments

The Crumbling Workflow Moat: Aggregation Theory's Final Chapter

https://twitter.com/nicbstme/status/2019149771706102022
1•SubiculumCode•33m ago•0 comments

Pax Historia – User and AI powered gaming platform

https://www.ycombinator.com/launches/PMu-pax-historia-user-ai-powered-gaming-platform
2•Osiris30•34m ago•0 comments

Show HN: I built a RAG engine to search Singaporean laws

https://github.com/adityaprasad-sudo/Explore-Singapore
1•ambitious_potat•40m ago•0 comments

Scams, Fraud, and Fake Apps: How to Protect Your Money in a Mobile-First Economy

https://blog.afrowallet.co/en_GB/tiers-app/scams-fraud-and-fake-apps-in-africa
1•jonatask•40m ago•0 comments

Porting Doom to My WebAssembly VM

https://irreducible.io/blog/porting-doom-to-wasm/
1•irreducible•41m ago•0 comments

Cognitive Style and Visual Attention in Multimodal Museum Exhibitions

https://www.mdpi.com/2075-5309/15/16/2968
1•rbanffy•42m ago•0 comments

Full-Blown Cross-Assembler in a Bash Script

https://hackaday.com/2026/02/06/full-blown-cross-assembler-in-a-bash-script/
1•grajmanu•47m ago•0 comments

Logic Puzzles: Why the Liar Is the Helpful One

https://blog.szczepan.org/blog/knights-and-knaves/
1•wasabi991011•59m ago•0 comments

Optical Combs Help Radio Telescopes Work Together

https://hackaday.com/2026/02/03/optical-combs-help-radio-telescopes-work-together/
2•toomuchtodo•1h ago•1 comments

Show HN: Myanon – fast, deterministic MySQL dump anonymizer

https://github.com/ppomes/myanon
1•pierrepomes•1h ago•0 comments

The Tao of Programming

http://www.canonical.org/~kragen/tao-of-programming.html
2•alexjplant•1h ago•0 comments

Forcing Rust: How Big Tech Lobbied the Government into a Language Mandate

https://medium.com/@ognian.milanov/forcing-rust-how-big-tech-lobbied-the-government-into-a-langua...
3•akagusu•1h ago•0 comments

PanelBench: We evaluated Cursor's Visual Editor on 89 test cases. 43 fail

https://www.tryinspector.com/blog/code-first-design-tools
2•quentinrl•1h ago•2 comments

Can You Draw Every Flag in PowerPoint? (Part 2) [video]

https://www.youtube.com/watch?v=BztF7MODsKI
1•fgclue•1h ago•0 comments

Show HN: MCP-baepsae – MCP server for iOS Simulator automation

https://github.com/oozoofrog/mcp-baepsae
1•oozoofrog•1h ago•0 comments

Make Trust Irrelevant: A Gamer's Take on Agentic AI Safety

https://github.com/Deso-PK/make-trust-irrelevant
7•DesoPK•1h ago•4 comments

Show HN: Sem – Semantic diffs and patches for Git

https://ataraxy-labs.github.io/sem/
1•rs545837•1h ago•1 comments

Hello world does not compile

https://github.com/anthropics/claudes-c-compiler/issues/1
35•mfiguiere•1h ago•20 comments

Show HN: ZigZag – A Bubble Tea-Inspired TUI Framework for Zig

https://github.com/meszmate/zigzag
3•meszmate•1h ago•0 comments

Metaphor+Metonymy: "To love that well which thou must leave ere long"(Sonnet73)

https://www.huckgutman.com/blog-1/shakespeare-sonnet-73
1•gsf_emergency_6•1h ago•0 comments

Show HN: Django N+1 Queries Checker

https://github.com/richardhapb/django-check
1•richardhapb•1h ago•1 comments

Emacs-tramp-RPC: High-performance TRAMP back end using JSON-RPC instead of shell

https://github.com/ArthurHeymans/emacs-tramp-rpc
1•todsacerdoti•1h ago•0 comments

Protocol Validation with Affine MPST in Rust

https://hibanaworks.dev
1•o8vm•2h ago•1 comments

Female Asian Elephant Calf Born at the Smithsonian National Zoo

https://www.si.edu/newsdesk/releases/female-asian-elephant-calf-born-smithsonians-national-zoo-an...
5•gmays•2h ago•1 comments
Open in hackernews

Show HN: How we solved the InfoSec adoption blocker for cloud tools

1•sureshcsdp•1w ago
I've been building CleanCloud (open-source cloud cost scanner) and discovered the biggest adoption blocker wasn't our feature set

It was InfoSec approval.

  The Problem: The Code Audit Wall

  Every enterprise we talked to had the same process:
  1. SRE team loves the tool, wants to use it
  2. InfoSec requires security review before production use
  3. Security team must audit the entire codebase to verify read-only claims
  4. Process takes 2-4 weeks (or gets stuck in backlog indefinitely)

  One CISO told us: "I don't care if your README says 'read-only'. I need to verify you're not calling DeleteBucket() anywhere in 10,000 lines of Python."

  Fair point. But this kills adoption velocity.

  The Insight: Don't Ask Them to Trust Your Code

  The breakthrough came from asking: "Who do InfoSec teams already trust?"

  Answer: AWS and Azure. They already trust the cloud provider's IAM enforcement.

  So instead of asking them to audit our code, we provide:

  1. A 30-line JSON IAM policy (read-only by design)
  2. A verification script they can run to prove it's safe
  3. OIDC setup (GitHub Actions) with no stored credentials
  4. Runtime safety tests that fail if we call forbidden APIs

  The IAM Proof Pack: https://github.com/cleancloud-io/cleancloud/tree/main/docs

  The Result

  InfoSec teams now audit a 30-line JSON file instead of our entire codebase. Trust is enforced by AWS/Azure IAM, not by promises in our README.

  A colleague who reviewed it said:
  > "I specifically love the IAM Proof Pack approach. By requiring a separate, verifiable Read-Only IAM role, you shift trust from your code to the Cloud Provider's enforcement. They don't have to audit your Python code line-by-line—they just verify the JSON policy is safe."

  This reduced our InfoSec approval time from 2-4 weeks to same-day in several cases.

  Technical Details

  The approach works because:

  1. **Verifiable IAM Policy**: The read-only policy is declarative, easy to audit
     ```json
     {
       "Version": "2012-10-17",
       "Statement": [{
         "Effect": "Allow",
         "Action": ["ec2:Describe*", "s3:List*", "s3:GetBucketTagging"],
         "Resource": "*"
       }]
     }

  2. OIDC-First: No long-lived credentials, temporary tokens only
    - GitHub Actions → AWS STS AssumeRoleWithWebIdentity
    - Azure Workload Identity Federation
    - Zero secrets stored in CI/CD
  3. Runtime Guards: Our test suite mocks AWS/Azure SDKs and fails if forbidden methods are called
  def test_aws_runtime_readonly():
      with patch('boto3.client') as mock:
          mock.return_value.delete_bucket.side_effect = AssertionError("Forbidden!")
          scan_aws()  # Must not call delete_bucket
  4. Static Analysis: AST parsing blocks dangerous imports/calls at CI time

  Why This Matters

  If you're building DevOps/security tools that need cloud access, the "trust me, it's read-only" approach doesn't scale. InfoSec teams need verifiable guarantees, not promises.

  Shifting trust from your code to the cloud provider's enforcement makes security review tractable.

  Open Questions

  - Is there a better way to prove read-only behavior programmatically?
  - How do other cloud tools handle InfoSec approval?
  - Should this be a standard pattern for cloud security tools?

  GitHub: https://github.com/cleancloud-io/cleancloud
  Docs: https://github.com/cleancloud-io/cleancloud/blob/main/docs/infosec-readiness.md

  Happy to discuss the approach or share more details about what worked (and what didn't).

Comments

sureshcsdp•1w ago
here is the PYPI page if anybody interested: https://pypi.org/project/cleancloud/