frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: Engineering Perception with Combinatorial Memetics

1•alan_sass•2m ago•1 comments

Show HN: Steam Daily – A Wordle-like daily puzzle game for Steam fans

https://steamdaily.xyz
1•itshellboy•4m ago•0 comments

The Anthropic Hive Mind

https://steve-yegge.medium.com/the-anthropic-hive-mind-d01f768f3d7b
1•spenvo•4m ago•0 comments

Just Started Using AmpCode

https://intelligenttools.co/blog/ampcode-multi-agent-production
1•BojanTomic•5m ago•0 comments

LLM as an Engineer vs. a Founder?

1•dm03514•6m ago•0 comments

Crosstalk inside cells helps pathogens evade drugs, study finds

https://phys.org/news/2026-01-crosstalk-cells-pathogens-evade-drugs.html
2•PaulHoule•7m ago•0 comments

Show HN: Design system generator (mood to CSS in <1 second)

https://huesly.app
1•egeuysall•7m ago•1 comments

Show HN: 26/02/26 – 5 songs in a day

https://playingwith.variousbits.net/saturday
1•dmje•8m ago•0 comments

Toroidal Logit Bias – Reduce LLM hallucinations 40% with no fine-tuning

https://github.com/Paraxiom/topological-coherence
1•slye514•10m ago•1 comments

Top AI models fail at >96% of tasks

https://www.zdnet.com/article/ai-failed-test-on-remote-freelance-jobs/
4•codexon•10m ago•1 comments

The Science of the Perfect Second (2023)

https://harpers.org/archive/2023/04/the-science-of-the-perfect-second/
1•NaOH•11m ago•0 comments

Bob Beck (OpenBSD) on why vi should stay vi (2006)

https://marc.info/?l=openbsd-misc&m=115820462402673&w=2
2•birdculture•15m ago•0 comments

Show HN: a glimpse into the future of eye tracking for multi-agent use

https://github.com/dchrty/glimpsh
1•dochrty•16m ago•0 comments

The Optima-l Situation: A deep dive into the classic humanist sans-serif

https://micahblachman.beehiiv.com/p/the-optima-l-situation
2•subdomain•16m ago•0 comments

Barn Owls Know When to Wait

https://blog.typeobject.com/posts/2026-barn-owls-know-when-to-wait/
1•fintler•16m ago•0 comments

Implementing TCP Echo Server in Rust [video]

https://www.youtube.com/watch?v=qjOBZ_Xzuio
1•sheerluck•17m ago•0 comments

LicGen – Offline License Generator (CLI and Web UI)

1•tejavvo•20m ago•0 comments

Service Degradation in West US Region

https://azure.status.microsoft/en-gb/status?gsid=5616bb85-f380-4a04-85ed-95674eec3d87&utm_source=...
2•_____k•20m ago•0 comments

The Janitor on Mars

https://www.newyorker.com/magazine/1998/10/26/the-janitor-on-mars
1•evo_9•22m ago•0 comments

Bringing Polars to .NET

https://github.com/ErrorLSC/Polars.NET
3•CurtHagenlocher•24m ago•0 comments

Adventures in Guix Packaging

https://nemin.hu/guix-packaging.html
1•todsacerdoti•25m ago•0 comments

Show HN: We had 20 Claude terminals open, so we built Orcha

1•buildingwdavid•25m ago•0 comments

Your Best Thinking Is Wasted on the Wrong Decisions

https://www.iankduncan.com/engineering/2026-02-07-your-best-thinking-is-wasted-on-the-wrong-decis...
1•iand675•25m ago•0 comments

Warcraftcn/UI – UI component library inspired by classic Warcraft III aesthetics

https://www.warcraftcn.com/
1•vyrotek•26m ago•0 comments

Trump Vodka Becomes Available for Pre-Orders

https://www.forbes.com/sites/kirkogunrinde/2025/12/01/trump-vodka-becomes-available-for-pre-order...
1•stopbulying•28m ago•0 comments

Velocity of Money

https://en.wikipedia.org/wiki/Velocity_of_money
1•gurjeet•30m ago•0 comments

Stop building automations. Start running your business

https://www.fluxtopus.com/automate-your-business
1•valboa•34m ago•1 comments

You can't QA your way to the frontier

https://www.scorecard.io/blog/you-cant-qa-your-way-to-the-frontier
1•gk1•35m ago•0 comments

Show HN: PalettePoint – AI color palette generator from text or images

https://palettepoint.com
1•latentio•36m ago•0 comments

Robust and Interactable World Models in Computer Vision [video]

https://www.youtube.com/watch?v=9B4kkaGOozA
2•Anon84•40m ago•0 comments
Open in hackernews

Clawdbot is a security nightmare [video]

https://www.youtube.com/watch?v=kSno1-xOjwI
23•carlos-menezes•1w ago

Comments

dfajgljsldkjag•1w ago
It is very sad that we are ignoring the lessons we learned about security twenty years ago just because we want new toys. We spent so much time making sure that user input could not change how a program runs and now we are doing the exact opposite. The video is right that the problem is not a bug in the code but a flaw in how the whole system thinks. We are building a house on sand.
mrkeen•1w ago
I don't think we did security 20 years ago, even if there were lessons.

Maybe the path was:

  * Build it
  * Build it right
  * Build it fast
  * Build it secure
It felt like we made it somewhere into the 'built it fast' phase before getting yanked onto the next feature.

These days it feels more like:

  * Build it
  * Build it with k8s
  * Build it with observability
  * Get sidetracked and play with AI
  * Debug it 
  * Debug it some more
  * Give up on debugging it
  * Do a tech debt sprint
  * Refactor the deployment pipeline
I would love the Overton window to somehow shift back to topics like "how do we know the code is correct and addresses the right problem?" over "how many tickets or LOC did your agent do for you today?". I don't know how we get back.
jeromechoo•1w ago
Response from Clawdbot author when I said this: https://masto.ai/@jeromechoo/115928552690869904
akmarinov•1w ago
TLDW: prompt injections exists, beware
rizzo94•1w ago
I felt this firsthand while experimenting with Moltbot (Clawdbot). The power is impressive, but the configuration and security hardening took a huge amount of time, and I constantly felt like I was building on fragile assumptions.

During that process, I came across PAIO, and the contrast was interesting—especially the one-click integration and the BYOK architecture. Having privacy and credential control baked in from the start felt like a more practical approach for everyday users, not just engineers willing to maintain their own security stack.

It really highlights the broader point here: AI agents are powerful, but the foundations (security, trust, and architecture) matter just as much as the “new toys.”

ArickVigas•1w ago
I experienced this firsthand. I'm a full-stack dev with 12+ years of experience and even for me, security hardening OpenClaw on a VPS took hours — UFW, fail2ban, SSH key-only auth, disabling password login, configuring Docker isolation, setting up proper firewall rules. And I knew what I was doing.

The core problem the video highlights is real: OpenClaw gives an AI agent shell access, messaging access, and browser access. The default setup has none of the security guardrails you'd want. Most users either skip security entirely or make mistakes that leave them exposed.

After setting it up securely for myself and a few friends, I started automating the whole process — automated provisioning on Hetzner with Docker sandbox, UFW, fail2ban, SSH key auth pre-configured. Turned it into a small managed hosting service (runclaw.ai) because I kept seeing the same setup struggles everywhere.

The broader point stands though: the security model for AI agents with system access is fundamentally unsolved. Sandboxing helps. Proper infrastructure helps. But prompt injection and trust boundaries are architectural problems that no amount of hosting can fix.