frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Railway Blocked by Google Cloud

https://status.railway.com/?date=20260519
3•aarondf•6m ago•2 comments

Google's First AI Smart Glasses Launching This Fall with iPhone Support

https://www.macrumors.com/2026/05/19/google-ai-smart-glasses-iphone-support/
1•mikhael•8m ago•0 comments

I made an App that uses local LLMs to monitor your screen

1•roy3838•8m ago•0 comments

Show HN: The user agents crawling HN today

https://ai.realhackers.org/user_agents.txt
1•Bender•10m ago•1 comments

Show HN: Export Webflow sites and CMS content

https://www.webflowexport.com/
1•happyyeti•11m ago•1 comments

Generative art collection based on human interpretation

https://www.mixedmessages.fyi/auction
1•knownquantity_•13m ago•2 comments

WhatsApp Web Became Facebook

https://old.reddit.com/r/whatsapp/comments/1ti3qxf/whatsapp_web_became_facebook/
3•Crier1002•19m ago•0 comments

Railway Currently Down

https://twitter.com/Railway/status/2056873075401007338
1•kristianc•21m ago•1 comments

El Niño is coming. The last time ocean temp. looked like this, millions died

https://respublicamgz.substack.com/p/a-super-el-nino-is-coming-the-last
4•ResPublica•23m ago•0 comments

50-year WHO/CDC Ebola outbreak pipeline in a weekend

https://github.com/vrsabha/outbreak-tracker
1•hn_career•26m ago•1 comments

Tell HN: Google banned Railway's account. Everything down

5•sergiotapia•26m ago•4 comments

GitHub is investigating unauthorized access to their internal repositories

https://twitter.com/github/status/2056884788179726685
11•splenditer•28m ago•4 comments

N display of stupid, secret CISA credentials found in public GitHub rep

https://arstechnica.com/information-technology/2026/05/in-stunning-display-of-stupid-secret-cisa-...
2•sbulaev•31m ago•1 comments

Google Cloud suspends Railway account causing major outage

https://twitter.com/Railway/status/2056883076496789854
5•sincinnatusc•31m ago•0 comments

Age Shapes the Adoption of New Technologies

https://insight.kellogg.northwestern.edu/article/swipe-or-tap-how-age-shapes-the-adoption-of-new-...
1•PopAlongKid•32m ago•1 comments

Google's AI Studio now lets anyone build Android apps in minutes

https://techcrunch.com/2026/05/19/googles-ai-studio-now-lets-anyone-build-android-apps-in-minutes/
1•cpncrunch•35m ago•0 comments

Heads, Trump Wins ( Tails, he still wins)

https://www.theatlantic.com/newsletters/2026/05/trump-corruption-irs-fund/687227/
1•KnuthIsGod•40m ago•0 comments

My Arduino spins faster when Claude burns more tokens

https://terminalbytes.com/arduino-claude-code-activity-meter/
1•mtlynch•40m ago•1 comments

HTML-in-Canvas Demos

https://github.com/GoogleChromeLabs/css-web-ui-demos/blob/main/html-in-canvas/awesome-html-in-can...
1•simonpure•41m ago•0 comments

Language Registries Are Unstable by Default

https://nesbitt.io/2026/05/15/language-registries-are-unstable-by-default.html
1•teddyh•41m ago•0 comments

Gemini Omni: where Gemini's ability to reason meets the ability to create

https://www.youtube.com/watch?v=KUyRq7szZsM
1•doener•41m ago•0 comments

CFTC sues to block Minnesota's first-in-nation ban on prediction markets

https://www.reuters.com/world/us-cftc-sues-minnesota-block-law-related-prediction-market-2026-05-19/
4•petethomas•42m ago•0 comments

Show HN: Capframe – capability tokens for AI agent tool calls

https://capframe.ai
1•euan21•43m ago•2 comments

Widening the Conversation on Frontier AI

https://www.anthropic.com/news/widening-conversation-ai
1•surprisetalk•44m ago•0 comments

Show HN: RTFRA - A Humble Proposal [RFC]

1•stgr_codes•45m ago•0 comments

Paul Schrader Had an 'AI Girlfriend' Who 'Terminated Our Conversation'

https://variety.com/2026/film/news/paul-schrader-ai-girlfriend-ended-relationship-1236753609/
1•Michelangelo11•45m ago•0 comments

Join a group chat with 30 random people that is locked forever

https://isle31.com/
2•vincentlenoach•46m ago•0 comments

ServiceNow wants to be the kill switch for AI agents that delete your database

https://fortune.com/2026/05/06/servicenow-kill-switch-ai-agents-bill-mcdermott/
1•ErystelaThevale•46m ago•1 comments

Ask HN: How are you handling the identity sprawl in your company/startup?

2•awaisras•47m ago•2 comments

Show HN: MediaMolder – A Modern Rewrite of FFmpeg

https://github.com/MediaMolder/mediamolder
2•streaming•48m ago•0 comments
Open in hackernews

Show HN: Capframe – capability tokens for AI agent tool calls

https://capframe.ai
1•euan21•43m ago

Comments

euan21•43m ago
Hi HN — I just shipped v0.2 of Capframe, an open-source toolkit or AI agentsthat call tools.The wedge I'm trying to fill: agents calling MCP servers / OpenAI functions / LangGraph nodes have no principled authority model at the tool-call boundary. Existing approaches either (a) wrap an LLM around the allow/deny decision (un-auditable), or (b) lean on prompt-time guardrails (inherits prompt injection's "best-effort" guarantee). Capframe takes the opposite stance — deterministic, capability-based, no LLM in the decision path.

  Three modules, each its own repo, glued by a single Rust
  dispatcher CLI:

  - Find (mcp-recon)  — discovers an MCP server's tool surface,
  emits a
    structured findings document. Six deterministic rules today
  (R1
    unconstrained string input, R2 missing auth on side-effecting
  tools,
    R3 side-effect/name mismatch, R4 unbounded numeric on
  money-ish params,
    R5 money in description but no money side-effect, R6
  indirect-injection
    surface from external-fetch tools).
  - Bind (capnagent)  — mints macaroon-style capability tokens.
  Ed25519
    holder-of-key, attenuable by holders without contacting the
  issuer,
    revocable, signed denial receipts (HMAC-SHA256).
  - Guard (mcp-guard) — deterministic policy evaluator with three
  modes
    (synthesize / evaluate / backtest). Pure-stdlib Python,
  microsecond
    decision path.

  The wire format binding them is a public JSON Schema (Draft
  2020-12,
  additionalProperties:false, regex-validated OWASP LLM / NIST AI
  RMF / MITRE
  ATLAS IDs): https://capframe.ai/schema . I'd like this to become
   the
  SARIF-equivalent for AI agent security — happy to take
  suggestions and PRs.

  Install: `curl -fsSL capframe.ai/install | sh` —
  sha256-verified, native
  binaries on GitHub Releases for linux/macos/windows ×
  x86_64/aarch64.
  Source: https://github.com/capframe/capframe (MIT).

  A "Pro" tier on the landing page is a waitlist, not a product —
  ignore it
  for now.

  Three things I'd love feedback on:

  1. The schema shape. If you've shipped or reviewed anything in
  this space,
     does the findings.v1 envelope work, or am I missing fields?

  2. The Find / Bind / Guard decomposition. Is that how you'd want
   to adopt
     this incrementally in an existing agent stack, or are the
  lines drawn
     wrong?

  3. The caveat DSL (`tool in [...]`, `max_refund <= 50`, `region
  == "eu"`).
     Reasonable on top of macaroons, or reinventing badly?

  Happy to answer anything.
jonnyasmar•19m ago
The "no LLM in the decision path" framing is exactly the cut I'd want here. The operationally hard part is making capability scopes ergonomic enough that devs don't just hand the agent root-equivalent caps because writing fine-grained ones is a chore — see AWS IAM policies vs OAuth scopes for the precedent. Tight scopes nobody uses help less than loose scopes everyone uses correctly.

Two questions on the threat model:

1. Can the LLM influence the capability presented to the tool? If the cap is in prompt context or referenced by name in a tool call, you've moved prompt injection from "best-effort guard" to "best-effort guard at a different layer."

2. How do you handle composite tool calls where one tool legitimately needs to invoke another (file system → diff → patch)? The capability has to flow but not amplify.