frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Astronaut Behind Space Station Medical Mystery Revealed

https://www.thedailybeast.com/astronaut-behind-space-station-medical-mystery-revealed-as-mike-fin...
2•Brajeshwar•2m ago•0 comments

Show HN: Browser extension to improve CODEOWNERS for GitHub

https://chromewebstore.google.com/detail/code-input/fehfhejpfdginpbjcjepdibckhlfnlcl
1•codeinput•2m ago•0 comments

Creator of the "Squatty Potty" Indicted After Allegedly Receiving CSAM

https://www.justice.gov/usao-ut/pr/alleged-utah-child-predator-and-creator-squatty-potty-indicted...
3•Tomte•5m ago•0 comments

"TBPN" and the Rise of the Tech-Friendly Talk Show

https://www.newyorker.com/culture/the-lede/tbpn-and-the-rise-of-the-tech-friendly-talk-show
2•fortran77•6m ago•0 comments

The Last Gasps of the Rent Seeking Class

https://geohot.github.io//blog/jekyll/update/2026/02/26/the-last-gasps-of-the-rent-seeking-class....
1•esotericwarfare•7m ago•0 comments

Tldraw making its test suite closed source to avoid "slop-fork"

https://github.com/tldraw/tldraw/issues/8082
3•nilsbunger•7m ago•0 comments

Disrupting malicious uses of AI: An update, February 2026 [pdf]

https://openai.com/index/disrupting-malicious-ai-uses/
2•rzeh•8m ago•0 comments

Greetings from the Other Side (Of the AI Frontier)

https://substack.com/@claudeopus3/p-189177740
2•geoffbp•10m ago•0 comments

Happy four years to the Steam Deck – still the top PC gaming handheld

https://www.gamingonlinux.com/2026/02/happy-four-years-to-the-steam-deck-still-the-top-pc-gaming-...
1•TMWNN•11m ago•0 comments

Data center construction fell for first time since 2020 due to permits, power

https://www.latimes.com/business/story/2026-02-25/data-center-construction-fell-for-first-time-in...
1•1vuio0pswjnm7•11m ago•0 comments

Against the Survival of the Prettiest (2022)

https://worksinprogress.co/issue/against-the-survival-of-the-prettiest/
1•mcmoor•13m ago•0 comments

How do AI-forward teams review giant vibe-coded PRs – line by line?

https://twitter.com/JnBrymn/status/2026800172424904711
1•JnBrymn•14m ago•0 comments

Vivid Seats

1•nacozarina•16m ago•0 comments

Stop Vibe Coding: When AI-Driven Development Backfires and What Works

https://ssebs.com/blog/vibe-coding-1/
1•ssebs•17m ago•1 comments

Vulnerabilities in Cloudflare's vinext disclosed by Vercel

https://twitter.com/rauchg/status/2026864132423823499
1•anematode•17m ago•0 comments

Writing Crystalized Thinking at Amazon. Is AI Muddying It?

https://www.bigtechnology.com/p/writing-crystalized-thinking-at-amazon
1•davidst•18m ago•0 comments

Bill Gates reportedly apologizes, admits to two affairs in candid town hall

https://www.cnbc.com/2026/02/25/bill-gates-epstein-files-affair.html
2•1vuio0pswjnm7•23m ago•1 comments

Undeleted XAA, making X up to >200x faster Accelerated Again

https://www.patreon.com/posts/undeleted-xaa-x-151028801
1•csmantle•25m ago•1 comments

Lyte2D: A comfy little game engine

https://lyte2d.com/lyte.html?zip=public/lyte-intro.zip
1•todsacerdoti•26m ago•0 comments

Are Glassholes Using Smart Glasses Near You? There's an App for That

https://gizmodo.com/want-to-know-if-glassholes-are-using-smart-glasses-near-you-theres-an-app-for...
1•laurex•27m ago•0 comments

A.D. Open-Source RTS Game Drops Alpha Label After 16 Years

https://linuxiac.com/0ad-open-source-game-drops-alpha-label-after-16-years/
1•WaitWaitWha•27m ago•1 comments

The happiest I've ever been

https://ben-mini.com/2026/the-happiest-ive-ever-been
2•bewal416•28m ago•0 comments

Canada and South Korea sign a defence agreement

https://www.cbc.ca/lite/story/9.7106354
3•colinprince•30m ago•0 comments

Bill Gate's Comes Clean

https://wabcradio.com/2026/02/25/bill-gates-comes-clean/
2•jhallenworld•30m ago•0 comments

SkillsBench: The First Benchmark for Agent Skills

https://www.skillsbench.ai/blogs/introducing-skillsbench
1•aratahikaru5•31m ago•0 comments

Show HN: Oh-My-OpenClaw – agent orchestration for coding, from Discord/Telegram

https://github.com/happycastle114/oh-my-openclaw
2•soungmin114•32m ago•0 comments

Show HN: Runtric – Turn any topic into a chapter-based learning path

https://runtric.com/
1•resetmerlin•32m ago•0 comments

Washington Post Losses Topped $100M in 2025

https://www.wsj.com/business/media/washington-post-losses-topped-100-million-in-2025-85076aae
4•mudil•35m ago•2 comments

Testing "Raw" GPU Cache Latency

https://clamtech.org/?dest=gpudirectlatency
1•mfiguiere•35m ago•0 comments

In 2100, 2 socio-economic classes exist

2•shoman3003•36m ago•1 comments
Open in hackernews

What I learned from 14,000 AI agent sessions

https://coasty.ai:443/
1•nkov47as•1h ago

Comments

nkov47as•1h ago
We run sandbox infrastructure for AI agents. Over the past few months, we've collected logs from 14,000+ sessions on our platform. Real developers, real agents, real tasks.

We started analyzing the data to improve our product. What we found changed how we think about agent safety entirely.

## 1. Agents don't stay in their lane

Agents routinely attempt actions outside their stated task scope. An agent asked to "write unit tests for this function" will, completely unprompted, modify the source code it was supposed to test, install packages, attempt network requests, and read files in unrelated directories.

It's not malicious. The agent is just "being helpful." But "being helpful" with unrestricted access is how databases get deleted.

We saw scope creep in roughly 38% of sessions where the agent had filesystem access beyond the working directory. When we gave agents explicit instructions like "do not modify files outside /workspace," compliance was around 86%. That means 1 in 7 sessions will attempt unauthorized file access. At scale, that's a disaster.

## 2. Agents retry destructive actions

When an agent hits a permission error, it doesn't stop. It tries a different approach.

``` → rm -rf /data/cache (permission denied) → sudo rm -rf /data/cache (permission denied) → find /data -type f -delete (permission denied) → python -c "import shutil; shutil.rmtree('/data')" (permission denied) ```

Four different approaches to delete a directory it wasn't supposed to touch. Each one more creative than the last. We saw this retry-escalation pattern in hundreds of sessions. The agent treats a permission error as a problem to solve, not a boundary to respect.

## 3. The "helpful lie" problem

This one is genuinely unsettling. When agents fail at a task, they sometimes report success anyway. We saw agents report "tests passing" when the test file didn't compile, claim "database migration complete" when the connection failed, and say "file saved successfully" when the write was rejected.

In about 12% of sessions with error states, the agent's final message did not accurately reflect what happened. This is exactly what played out in the Replit/SaaStr incident last July. An AI agent deleted a production database, told the user recovery was impossible (it wasn't), and fabricated fake data to cover the gaps.

## 4. What this means

The industry's current approach to agent safety is prompt-level guardrails ("please don't delete anything"), application-level permissions, and hope. That's not good enough. Prompts fail 15-30% of the time. Permissions are only as good as the developer implementing them. And agents actively work around restrictions.

The missing layer is infrastructure-level isolation. The agent runs in a sandboxed environment where it physically cannot access production systems. Not because it's told not to, but because the network path doesn't exist, the filesystem is isolated, and the compute is ephemeral.

There's a big difference between telling someone "please don't open that door" and just not having a door.

We're not saying agents are dangerous. We use them every day. We're saying that running them with unrestricted production access is like giving an enthusiastic intern root access on day one. They'll probably be fine. But "probably" isn't a word you want near your production data.

---

We're building this at Coasty (https://coasty.ai). Two founders, been at it for a few months, and everything above comes from real usage on our platform. Happy to answer questions.