frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Richard Dawkins concludes AI is conscious, even if it doesn't know it

https://www.theguardian.com/technology/2026/may/05/richard-dawkins-ai-consciousness-anthropic-cla...
1•alefalfa•11s ago•0 comments

Oil 101, Second Edition

https://oil101.morgandowney.com
1•mxschumacher•39s ago•0 comments

An Open Letter to Jay Bhattacharya

https://www.science.org/content/blog-post/open-letter-jay-bhattacharya
2•jeromechoo•1m ago•0 comments

Show HN: I built a spoiler-free WWE dashboard for 2001-2019 with 15,000 matches

https://warner-wvez.github.io/wrestling-dashboard/
1•wvez22•2m ago•0 comments

PostHog Code

https://posthog.com/code
4•bewal416•2m ago•0 comments

Nostr Mail – Nostr Mail Documentation

https://nogringo.github.io/nostr-mail/#what-is-nostr-mail
3•janandonly•3m ago•0 comments

Spaces Protocol May 2026 Update

https://spacesprotocol.org/blog/may-2026-update/
1•ca98am79•4m ago•0 comments

Orbee chat: your name, your people, your rules

https://orbee.chat/
1•ca98am79•4m ago•0 comments

Changes in Hospital Finance, Operations and Quality After Management Consultants

https://jamanetwork.com/journals/jama/article-abstract/2848641
1•randycupertino•5m ago•1 comments

DigitalOcean's NYC region looked fine – until we ran it again

https://webbynode.com/articles/digitalocean-nyc1-performance-drops-over-time
3•gsgreen•6m ago•0 comments

Understand EOB and medical bill text locally in Chrome

https://chromewebstore.google.com/detail/keepmd-eob-decoder/dojjljfafpojmbhjljnkpglmahhglbco
1•teddyX•6m ago•1 comments

OpenAI smartphone leak reveals next-gen chipset and more details

https://www.notebookcheck.net/OpenAI-smartphone-leak-reveals-next-gen-chipset-and-more-details.12...
1•thunderbong•6m ago•0 comments

Detecting silent LLM agent degradation before users do

https://www.ainative.builders/platform/silent-agent-degradation-detection
2•v1b3•7m ago•1 comments

UALink AI Accelerator Spec Maintains Rapid Update Pace

https://www.eetimes.com/ai-accelerator-spec-maintains-rapid-update-pace/
1•mindcrime•8m ago•0 comments

The exotic particles that could break the Standard Model

https://www.nature.com/articles/d41586-026-01387-x
2•digital55•9m ago•0 comments

Quantum Key Distribution (QKD) and Quantum Cryptography (QC)

https://www.nsa.gov/Cybersecurity/Quantum-Key-Distribution-QKD-and-Quantum-Cryptography-QC/
4•mooreds•10m ago•0 comments

Teeny-Tiny Notes

https://khoaly.xyz/teeny-tiny-notes/
1•speckx•10m ago•0 comments

National space weather center on chopping block

https://www.nytimes.com/2026/03/13/climate/ncar-breakup-plan-nasa-noaa.html
1•eliascanetti•13m ago•0 comments

David Attenborough, 'the voice for nature,' turns 100

https://www.reuters.com/world/uk/david-attenborough-the-voice-nature-turns-100-2026-05-05/
1•jmsflknr•14m ago•0 comments

Dreamer: Make any coding agent self-evolving, across the whole team

https://github.com/luml-ai/dreamer
2•iryna_kondr•14m ago•1 comments

The Other Twin Towers in the Spider-Man Trailer

https://ironicsans.ghost.io/the-other-twin-towers-in-the-spider-man-trailer/
2•caminanteblanco•15m ago•0 comments

CBOMkit: Explore the Use of Cryptography in Software

https://www.zurich.ibm.com/cbom/
2•mooreds•16m ago•0 comments

Tokens and Dreams

https://charlesleifer.com/blog/tokens-and-dreams/
2•cleifer•16m ago•0 comments

Curious cases of financial engineering in biotech

https://www.owlposting.com/p/curious-cases-of-financial-engineering
1•abhishaike•16m ago•0 comments

Cross-target schema drift in Cal.com: 1 finding in 1096 fields

https://github.com/wiaahmarketplace/typerion-oss/tree/main/examples/case-studies/calcom
1•Techman92•18m ago•0 comments

Congress Is Doing Little to Prepare for Potential A.I. Job Losses

https://www.nytimes.com/2026/05/05/business/artificial-intelligence-safety-net.html
2•cdrnsf•19m ago•2 comments

Eight vaccines linked to a lower risk of dementia

https://www.gavi.org/vaccineswork/eight-vaccines-linked-lower-risk-dementia
5•ivankra•19m ago•0 comments

IBM didn't want Microsoft to use the Tab key to move between dialog fields

https://devblogs.microsoft.com/oldnewthing/20260505-00/?p=112298
33•SeenNotHeard•20m ago•12 comments

Wearables Are Going Off the Rails

https://gizmodo.com/wearables-are-going-fully-off-the-rails-2000754560
2•ulrischa•20m ago•0 comments

Humane AI Pin hacks turns the gadget into a standalone Android-powered gadget

https://liliputing.com/humane-ai-pin-hacks-turn-the-discontinued-gadget-into-a-standalone-android...
1•speckx•21m ago•0 comments
Open in hackernews

Show HN: SecretEnv – Run any process with secrets from all your backends

https://github.com/TechAlchemistX/secretenv
4•techalchemist•1h ago
Hi Guys,

I built SecretEnv to help solve one common thing that I have seen at every org, that I have worked at.

We always had more than one password/credential manager. Service tokens maybe in Vault, AWS SSM etc and some team specific service account or temp account credentials being store in another password store such as 1Password or Keeper, there was never one single credential store.

This is where SecretEnv comes in play, it runs any command with secrets injected as env vars, sourced from whatever combination of backend your team already uses.

I am sure there are other tools as well that do a similar thing, which is run a command and inject secret. However SecretEnv does one thing differently.

The key idea is separating two items which are most of the time combined. Think of SecretEnv's resolution structure like an Address Book.

- Your repo gets a secretenv.toml file which has labels in there as values against ENV Vars. These can be literally anything. DB_URL, STRIPE_KEY whatever.

- You have a registry that lives in your backend that you/your company uses. This registry holds the actual paths so the credentials.

- You have a config file on your machine called config.toml that secretenv uses to grab the aliases from secretenv.toml and resolve against registry that lives in your backend.

So imagine if you are a Platform Engineer and need to migrate password stores to different backend.

You can now migrate secrets from AWS to Vault or change the naming conventions in one central place (registry) without devs having to touch their code or update config file.

What this means is if the credential is used by 10, 15 or even 20 repos. All you need to do is update the alias in the registry and all repos pick up the changes.

No need to open PR's, involve dev teams.

The whole idea was abstracting and decoupling the dependency.

The tool currently supports 14 backends already which covers most of the ground.

Would love your feedback and if there is any backends or workflow that this does not cover.

https://github.com/TechAlchemistX/secretenv

Comments

techalchemist•1h ago
The current support for backends include

AWS SSM Parameter Store / AWS Secrets Manager / GCP Secrets Manager / Azure Key Vault / Hashicorp Vault / OpenBao / Cyberark Conjur / 1Password / Doppler / Infisical / Keeper / Cloudflare Workers KV / macOS Keychain / Local File

mutant•1h ago
or... mise and fnox
techalchemist•1h ago
I had evaluated fnox. However you have a dependency of encryption/decryption.

So imagine the use case where you need to roll out a password change to 10 repos or offboard an engineer from the team.

In either case, the touch point now becomes 10 repos which need to be co-ordinated against.

Now imagine doing this at scale, you need to migrate password stores entirely. Not that it happens often, however I have been at start-ups where we moved from one cloud provider to another because we gained better discounts on contracts. The password store migration then would be an effort vs just updating 1 line in registry and it resolves.

Similarly user offboarding is handled by IAM permission as well, as soon as the user access is revoked the secret resolution is gone.

Thank you for bringing up fnox and mise. This was something I had evaluated and even written about in the security threat model. :)

https://github.com/TechAlchemistX/secretenv/blob/main/docs/s...

jdxcode•1h ago
I am the maintainer of fnox. This is only true if you use the encryption providers. If you don't, nothing is encrypted obviously.

Your doc also doesn't seem to take into account my preferred way of using it with KMS that solves a lot of the problems mentioned.

theozero•1h ago
Check out https://varlock.dev - it uses functions and a plugin system to pull from different backends. But also allows composing values together in whatever way you like, has built in validation, extra protection for secrets, and a ton more.
techalchemist•57m ago
Thanks for pointing out varlock. Let me go check it out.
techalchemist•32m ago
Cool, I checked it out and must say varlock's solid, but it's solving different problem.

Varlock makes .env files smarter (validation, types, editor autocomplete, Next.js/Vite hooks).

SecretEnv gets rid of the .env files entirely. Your project lists what it needs by nickname, the actual secrets live in whatever backends your team already uses. Change backend? One line and every repo picks it up.

Both work with any language.

They could actually compose together, varlock can call secretenv to pull from the backends and validate on the top. :)