frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Combinatorial Optimization for All: Using LLMs to Aid Non-Experts

https://journal.iberamia.org/index.php/intartif/article/view/2584
1•camilochs•46s ago•0 comments

Show HN: Pooch PDF – Because Ctrl+P still prints cookie banners in 2026

https://poochpdf.com/
1•membrshiperfect•1m ago•0 comments

How to get large files to your MCP server without blowing up the context window

https://everyrow.io/blog/mcp-large-dataset-upload
1•rafaelpo•2m ago•0 comments

Patterns for Reducing Friction in AI-Assisted Development

https://martinfowler.com/articles/reduce-friction-ai/
1•zdw•2m ago•0 comments

Salt of the Earth: Underground Salt Caverns Just Might Power Our Future

https://eos.org/features/salt-of-the-earth-vast-underground-salt-caverns-are-preserving-our-histo...
1•jofer•4m ago•0 comments

Show HN: Open-sourced an email QA lib 8 checks across 12 clients in 1 audit call

https://github.com/emailens/engine
1•tikkatenders•4m ago•0 comments

Low-Dose Lithium for Mild Cognitive Impairment: Pilot Randomized Clinical Trial

https://jamanetwork.com/journals/jamaneurology/fullarticle/2845746
1•bookofjoe•5m ago•0 comments

Show HN: AfterLive – AI digital legacy that lets loved ones hear from you

https://afterlive.ai
1•crawde•5m ago•0 comments

I Used Claude to File My Taxes for Free

https://kachess.dev/taxes/ai/personal-finance/2026/02/27/breaking-up-with-turbotax.html
1•gdudeman•5m ago•0 comments

Israel bombs council choosing Iran's next supreme leader, official says

https://www.axios.com/2026/03/03/iran-supreme-leader-council-israel-strike
1•spzx•7m ago•0 comments

Software development now costs less than than the wage of a minimum wage worker

https://ghuntley.com/real/
1•herbertl•8m ago•0 comments

A [Firefox, Chromium] extension that converts Microsoft to Microslop

https://addons.mozilla.org/en-US/android/addon/microslop/
2•gaius_baltar•8m ago•0 comments

British Rail settlement plan barcode specs

https://magicalcodewit.ch/rsp-specs/
1•fanf2•8m ago•0 comments

Completing the formal proof of higher-dimensional sphere packing

https://www.math.inc/sphere-packing
1•carnevalem•9m ago•0 comments

Show HN: Verifiable Interaction Records for Agents

https://github.com/peacprotocol/peac
1•jithinraj•11m ago•0 comments

Ohio EPA weighs allowing data centers to dump wastewater into rivers

https://www.nbc4i.com/news/local-news/columbus/ohio-epa-weighs-allowing-data-centers-to-release-w...
1•randycupertino•12m ago•1 comments

What if LLM uptime was a macroeconomic indicator?

https://lab.sideband.pub/status/
1•shawnyeager•12m ago•0 comments

Watch Out Bluetooth Analysis of the Coros Pace 3 (2025)

https://blog.syss.com/posts/bluetooth-analysis-coros-pace-3/
1•lqueenan•12m ago•0 comments

Risk, in Perspective

https://faingezicht.com/articles/2026/03/02/risk-in-perspective/
1•avyfain•12m ago•0 comments

No mentor? Learn from a 16th century French nobleman

https://www.magicreader.com/montaigne
1•mzelling•13m ago•0 comments

Show HN: I built a way to prove your software kept its promises

https://github.com/nobulexdev/nobulex
1•arian_•13m ago•0 comments

How do I market myself as a freelance Backend/Infrastructure engineer?

1•__0x01•13m ago•0 comments

The Limits of Today's AI Systems

2•Yinfan•13m ago•0 comments

Accept-Language Redirects Could Be Blocking Search Engines and AI Crawlers

https://merj.com/blog/your-accept-language-redirects-could-be-blocking-search-engines-and-ai-craw...
1•giacomoz•14m ago•0 comments

Is Unbound AI Video the most uncensored AI model in 2026?

https://unbound.video
1•gabrieln•14m ago•2 comments

Drizzle Joins PlanetScale

https://planetscale.com/blog/drizzle-joins-planetscale
4•alexblokh•14m ago•2 comments

Political market entropy in Rome. An analysis of different electoral cycles

https://www.frontiersin.org/journals/political-science/articles/10.3389/fpos.2026.1744381/full
1•PaulHoule•14m ago•0 comments

Show HN: Readme badge to quickly find related open source repos

https://relatedrepos.com/badge
1•plurch•15m ago•0 comments

Apollo sued for allegedly concealing Epstein business ties from shareholders

https://www.reuters.com/sustainability/boards-policy-regulation/apollo-leon-black-sued-allegedly-...
1•petethomas•16m ago•0 comments

Free Software Needs Free Tools: Making Your Project Open

https://cfp.cfgmgmtcamp.org/ghent2026/talk/LHWU8T/
2•Tomte•16m ago•1 comments
Open in hackernews

Show HN: VellaVeto – Fail-closed runtime proxy for MCP tool calls, in Rust

https://github.com/vellaveto/vellaveto
1•paolovella•1h ago

Comments

paolovella•1h ago
I spent the past year asking why every MCP security tool is a scanner that runs before deployment — when the attacks that actually work (rug pulls, runtime tool poisoning, cross-server escalation) happen after. Scanners catch known patterns in config files. They can't catch a tool server that changes its schema after you approved it. So I built a runtime enforcement layer instead. VellaVeto is a proxy that sits between your MCP client and tool servers, evaluating every call against policy before it executes. If policy evaluation fails for any reason — missing context, internal error, no matching rule — the call is denied. Fail-closed, not fail-open. Try it: cargo install vellaveto-proxy && vellaveto-proxy --protect shield -- ./your-mcp-server That single flag blocks credential grabs (.aws/.ssh/.env), exfiltration domains, injection patterns, and DLP leaks with no config files. Two stricter modes (fortress, vault) go up to default-deny with human approval for writes. The core is Rust (~92%), <5ms P99 evaluation. Policy engine properties are formally verified in TLA+ (fail-closed under network partition, no policy bypass on concurrent evaluation) and Kani (no panics in library code). These cover the engine's core invariants — not a claim about the full system. I also built MCPSEC, a vendor-neutral benchmark for MCP gateways — 10 properties, 64 attack tests, 12 attack classes. Apache-2.0 licensed, runnable against any gateway: https://github.com/vellaveto/vellaveto/tree/main/mcpsec To be clear about what this doesn't solve: MCP's fundamental problem is that control and data share the same channel. No proxy fully fixes that. VellaVeto is a defense-in-depth layer — it catches a meaningful class of attacks at the tool-call boundary, but it's not a silver bullet against prompt injection. Licensing: core is MPL-2.0 (open source). Enterprise crates are source-available under BUSL-1.1, free for deployments under 3 nodes / 25 endpoints, and each version converts to MPL-2.0 after 3 years. Would love feedback on the approach, the benchmark methodology, or the threat model.