frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

OpenClaw Addresses Security Risks

https://thebiggish.com/news/openclaw-s-security-flaws-expose-enterprise-risk-22-of-deployments-un...
1•vedantnair•24s ago•0 comments

Apple finalizes Gemini / Siri deal

https://www.engadget.com/ai/apple-reportedly-plans-to-reveal-its-gemini-powered-siri-in-february-...
1•vedantnair•56s ago•0 comments

Italy Railways Sabotaged

https://www.bbc.co.uk/news/articles/czr4rx04xjpo
1•vedantnair•1m ago•0 comments

Emacs-tramp-RPC: high-performance TRAMP back end using MsgPack-RPC

https://github.com/ArthurHeymans/emacs-tramp-rpc
1•fanf2•2m ago•0 comments

Nintendo Wii Themed Portfolio

https://akiraux.vercel.app/
1•s4074433•6m ago•1 comments

"There must be something like the opposite of suicide "

https://post.substack.com/p/there-must-be-something-like-the
1•rbanffy•9m ago•0 comments

Ask HN: Why doesn't Netflix add a “Theater Mode” that recreates the worst parts?

2•amichail•9m ago•0 comments

Show HN: Engineering Perception with Combinatorial Memetics

1•alan_sass•16m ago•2 comments

Show HN: Steam Daily – A Wordle-like daily puzzle game for Steam fans

https://steamdaily.xyz
1•itshellboy•18m ago•0 comments

The Anthropic Hive Mind

https://steve-yegge.medium.com/the-anthropic-hive-mind-d01f768f3d7b
1•spenvo•18m ago•0 comments

Just Started Using AmpCode

https://intelligenttools.co/blog/ampcode-multi-agent-production
1•BojanTomic•19m ago•0 comments

LLM as an Engineer vs. a Founder?

1•dm03514•20m ago•0 comments

Crosstalk inside cells helps pathogens evade drugs, study finds

https://phys.org/news/2026-01-crosstalk-cells-pathogens-evade-drugs.html
2•PaulHoule•21m ago•0 comments

Show HN: Design system generator (mood to CSS in <1 second)

https://huesly.app
1•egeuysall•21m ago•1 comments

Show HN: 26/02/26 – 5 songs in a day

https://playingwith.variousbits.net/saturday
1•dmje•22m ago•0 comments

Toroidal Logit Bias – Reduce LLM hallucinations 40% with no fine-tuning

https://github.com/Paraxiom/topological-coherence
1•slye514•24m ago•1 comments

Top AI models fail at >96% of tasks

https://www.zdnet.com/article/ai-failed-test-on-remote-freelance-jobs/
5•codexon•24m ago•2 comments

The Science of the Perfect Second (2023)

https://harpers.org/archive/2023/04/the-science-of-the-perfect-second/
1•NaOH•25m ago•0 comments

Bob Beck (OpenBSD) on why vi should stay vi (2006)

https://marc.info/?l=openbsd-misc&m=115820462402673&w=2
2•birdculture•29m ago•0 comments

Show HN: a glimpse into the future of eye tracking for multi-agent use

https://github.com/dchrty/glimpsh
1•dochrty•30m ago•0 comments

The Optima-l Situation: A deep dive into the classic humanist sans-serif

https://micahblachman.beehiiv.com/p/the-optima-l-situation
2•subdomain•30m ago•1 comments

Barn Owls Know When to Wait

https://blog.typeobject.com/posts/2026-barn-owls-know-when-to-wait/
1•fintler•30m ago•0 comments

Implementing TCP Echo Server in Rust [video]

https://www.youtube.com/watch?v=qjOBZ_Xzuio
1•sheerluck•31m ago•0 comments

LicGen – Offline License Generator (CLI and Web UI)

1•tejavvo•34m ago•0 comments

Service Degradation in West US Region

https://azure.status.microsoft/en-gb/status?gsid=5616bb85-f380-4a04-85ed-95674eec3d87&utm_source=...
2•_____k•34m ago•0 comments

The Janitor on Mars

https://www.newyorker.com/magazine/1998/10/26/the-janitor-on-mars
1•evo_9•36m ago•0 comments

Bringing Polars to .NET

https://github.com/ErrorLSC/Polars.NET
3•CurtHagenlocher•38m ago•0 comments

Adventures in Guix Packaging

https://nemin.hu/guix-packaging.html
1•todsacerdoti•39m ago•0 comments

Show HN: We had 20 Claude terminals open, so we built Orcha

1•buildingwdavid•39m ago•0 comments

Your Best Thinking Is Wasted on the Wrong Decisions

https://www.iankduncan.com/engineering/2026-02-07-your-best-thinking-is-wasted-on-the-wrong-decis...
1•iand675•39m ago•0 comments
Open in hackernews

Clawdbot is a security nightmare [video]

https://www.youtube.com/watch?v=kSno1-xOjwI
23•carlos-menezes•1w ago

Comments

dfajgljsldkjag•1w ago
It is very sad that we are ignoring the lessons we learned about security twenty years ago just because we want new toys. We spent so much time making sure that user input could not change how a program runs and now we are doing the exact opposite. The video is right that the problem is not a bug in the code but a flaw in how the whole system thinks. We are building a house on sand.
mrkeen•1w ago
I don't think we did security 20 years ago, even if there were lessons.

Maybe the path was:

  * Build it
  * Build it right
  * Build it fast
  * Build it secure
It felt like we made it somewhere into the 'built it fast' phase before getting yanked onto the next feature.

These days it feels more like:

  * Build it
  * Build it with k8s
  * Build it with observability
  * Get sidetracked and play with AI
  * Debug it 
  * Debug it some more
  * Give up on debugging it
  * Do a tech debt sprint
  * Refactor the deployment pipeline
I would love the Overton window to somehow shift back to topics like "how do we know the code is correct and addresses the right problem?" over "how many tickets or LOC did your agent do for you today?". I don't know how we get back.
jeromechoo•1w ago
Response from Clawdbot author when I said this: https://masto.ai/@jeromechoo/115928552690869904
akmarinov•1w ago
TLDW: prompt injections exists, beware
rizzo94•1w ago
I felt this firsthand while experimenting with Moltbot (Clawdbot). The power is impressive, but the configuration and security hardening took a huge amount of time, and I constantly felt like I was building on fragile assumptions.

During that process, I came across PAIO, and the contrast was interesting—especially the one-click integration and the BYOK architecture. Having privacy and credential control baked in from the start felt like a more practical approach for everyday users, not just engineers willing to maintain their own security stack.

It really highlights the broader point here: AI agents are powerful, but the foundations (security, trust, and architecture) matter just as much as the “new toys.”

ArickVigas•1w ago
I experienced this firsthand. I'm a full-stack dev with 12+ years of experience and even for me, security hardening OpenClaw on a VPS took hours — UFW, fail2ban, SSH key-only auth, disabling password login, configuring Docker isolation, setting up proper firewall rules. And I knew what I was doing.

The core problem the video highlights is real: OpenClaw gives an AI agent shell access, messaging access, and browser access. The default setup has none of the security guardrails you'd want. Most users either skip security entirely or make mistakes that leave them exposed.

After setting it up securely for myself and a few friends, I started automating the whole process — automated provisioning on Hetzner with Docker sandbox, UFW, fail2ban, SSH key auth pre-configured. Turned it into a small managed hosting service (runclaw.ai) because I kept seeing the same setup struggles everywhere.

The broader point stands though: the security model for AI agents with system access is fundamentally unsolved. Sandboxing helps. Proper infrastructure helps. But prompt injection and trust boundaries are architectural problems that no amount of hosting can fix.