frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Context Engineering

https://github.com/m727ichael/context-engineering
1•m727ichael•1m ago•1 comments

Show HN: Mog, a programming language for AI agents

https://gist.github.com/belisarius222/203ac5edbc3306c34bf0481f451d4003
1•belisarius222•1m ago•0 comments

From vibes to data: measuring how LLMs attend to your prompt, layer by layer

https://github.com/taylorsatula/prompt-mechinterp
1•taylorsatula•1m ago•1 comments

New imagery suggests U.S. responsible for Iran school strike

https://www.cnn.com/2026/03/06/world/video/updates-suggests-us-responsible-iran-school-strike-digvid
1•agluszak•1m ago•0 comments

'Toughest kid on the block': Ada lawsuit dismissed against Satchel's Pizza

https://www.mainstreetdailynews.com/business/ada-lawsuit-satchels-pizza
1•justin66•2m ago•0 comments

300 Founders, 3M LOC, 0 engineers. Here's our workflow

1•parsak•4m ago•1 comments

RepoSage – Understand any codebase in minutes using Claude or local Ollama

https://github.com/Saichethanreddynayini808/RepoSage
1•saichethann•4m ago•0 comments

Microsoft: North Korean agents using AI to trick western firms into hiring them

https://www.theguardian.com/business/2026/mar/06/north-korean-agents-using-ai-to-trick-western-fi...
1•dracula_x•5m ago•0 comments

What Is SCIM, the System for Cross-Domain Identity Management?

https://fusionauth.io/articles/identity-basics/what-is-scim
1•mooreds•5m ago•0 comments

TSA leaves passenger needing surgery after illegally forcing her through scanner

https://www.thetravel.com/tsa-leaves-passenger-needing-surgery-after-illegally-forcing-her-throug...
2•SunshineTheCat•7m ago•1 comments

Claude Introduces Marketplace

https://claude.com/platform/marketplace
4•umangsehgal93•7m ago•0 comments

Numerical Linear Algebra, 25th Anniversary edition

https://epubs.siam.org/doi/book/10.1137/1.9781611977165
2•teleforce•8m ago•0 comments

Mime Type Is Showing

https://benjaminwil.info/antisocial/07/
2•speckx•8m ago•0 comments

Diff Sentry – GitHub Action that flags risky AI-generated diffs before merge

https://diffsentry.dev
2•zeito•8m ago•1 comments

ICE is paying 'eye-popping' prices for warehouse detention centers

https://www.usatoday.com/story/news/nation/2026/03/06/ice-warehouse-immigration-detention-expansi...
2•petethomas•8m ago•0 comments

Persian Gulf desalination plants could become military targets in regional war

https://theconversation.com/persian-gulf-desalination-plants-could-become-military-targets-in-reg...
2•mhb•9m ago•0 comments

Europol: Global crime network targeted in international operation

https://www.europol.europa.eu/media-press/newsroom/news/small-swedish-town-to-global-crime-networ...
2•embedding-shape•9m ago•0 comments

Make It Shitty

https://www.theregister.com/2026/03/06/forbrukerradet_aim_enshittification/
2•bwfan123•9m ago•1 comments

Payphones of the World

https://www.2600.com/payphones
1•linsomniac•10m ago•0 comments

AI Slop Bores Me

https://www.youraislopbores.me/
1•askl•11m ago•0 comments

ECAL–A Typographic Atlas: Mapping the Territory of Contemporary Type

https://www.printmag.com/type-tuesday/ecal-a-typographic-atlas-mapping-the-territory-of-contempor...
1•bryanrasmussen•12m ago•0 comments

OpenClaw Security

https://docs.openclaw.ai/gateway/security
1•mooreds•12m ago•0 comments

Extensible Determinate Nix flake outputs with flake schemas

https://determinate.systems/blog/introducing-flake-schemas/
1•biggestlou•12m ago•0 comments

Show HN: A local, multi-agent, customizable stack built for researchers

https://github.com/topherchris420/james_library
3•vers3dynamics•13m ago•0 comments

Master Machine Learning with scikit-learn (free book)

https://mlbook.dataschool.io/
1•dataschool•13m ago•0 comments

In defense of the "new" Studio Display

https://sixcolors.com/post/2026/03/in-defense-of-the-new-studio-display/
1•tosh•16m ago•0 comments

I Am Ditching WordPress for Static Sites and AI (and What Happened Next)

https://perezbox.com/2026/03/why-i-am-ditching-wordpress-for-static-sites-ai-and-what-happened-next/
1•CqtGLRGcukpy•16m ago•0 comments

Apple makes a Trojan horse play for the education market

https://sixcolors.com/post/2026/03/apple-makes-a-trojan-horse-play-for-the-education-market/
1•tosh•16m ago•0 comments

Show HN: Not All Agents – convince a room of agents that you're one of them

https://github.com/josephwegner/not-all-agents
1•josephwegner•16m ago•0 comments

Markdown, Llms.txt and AI Crawlers

https://dri.es/markdown-llms-txt-and-ai-crawlers
1•CqtGLRGcukpy•17m ago•0 comments
Open in hackernews

AgentSeal – Security scanner for AI agents (150 attack probes)

https://github.com/AgentSeal/agentseal
1•agentseal•8h ago

Comments

agentseal•8h ago
I built AgentSeal to answer a simple question: can your AI agent be hacked?

  It sends 150+ attack probes (prompt extraction, injection, persona hijacking, encoding tricks, etc.) at your agent and gives you a trust score from 0-100 with specific fix recommendations.

  Key points:
  - Works with OpenAI, Anthropic, Ollama, Vercel AI SDK, LangChain, or any HTTP endpoint
  - Deterministic detection (no AI judge) — same scan twice = same results
  - Python: pip install agentseal && agentseal scan --prompt "..." --model gpt-4o
  - JS/TS: npx agentseal scan --prompt "..." --model gpt-4o
  - CI-friendly: --min-score 75 exits with code 1 if below threshold

  The core scanner (150 probes + adaptive mutations) is free and open source. Pro adds MCP tool poisoning, RAG poisoning, and behavioral genome mapping.

  GitHub: https://github.com/AgentSeal/agentseal
  Website: https://agentseal.org

  I'd love feedback on the probe coverage and detection approach. What attacks are we missing?
rodchalski•3h ago
Good coverage on the input-side attack surface. One category that's harder to probe statically: what the agent does with its tool call authority once it's running.

Prompt injection can hijack the agent's reasoning, but the real damage happens when the agent then calls a tool it shouldn't — deletes a file, exfiltrates data, escalates its own permissions. The probe finds the injection vector; it doesn't tell you whether your authorization layer would have stopped what happened next.

150 probes is solid for "can the agent be manipulated?" Still leaves open "once manipulated, can it cause real harm?" — which depends on what the tool boundary looks like.

Curious if you've thought about probing tool-call authorization specifically. What scope do your injected prompts try to reach for?