frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Qwen3-Coder-Next

https://qwen.ai/blog?id=qwen3-coder-next
476•danielhanchen•5h ago•275 comments

Deno Sandbox

https://deno.com/blog/introducing-deno-sandbox
212•johnspurlock•3h ago•80 comments

AliSQL: Alibaba's open-source MySQL with vector and DuckDB engines

https://github.com/alibaba/AliSQL
86•baotiao•2h ago•9 comments

Xcode 26.3 unlocks the power of agentic coding

https://www.apple.com/newsroom/2026/02/xcode-26-point-3-unlocks-the-power-of-agentic-coding/
182•davidbarker•3h ago•128 comments

Agent Skills

https://agentskills.io/home
306•mooreds•7h ago•182 comments

Prek: A better, faster, drop-in pre-commit replacement, engineered in Rust

https://github.com/j178/prek
141•fortuitous-frog•5h ago•62 comments

France dumps Zoom and Teams as Europe seeks digital autonomy from the US

https://apnews.com/article/europe-digital-sovereignty-big-tech-9f5388b68a0648514cebc8d92f682060
529•AareyBaba•4h ago•298 comments

When rust ≠ performance. a lesson in developer experience

https://suriya.cc/tech/performance/oxen-add/
26•suriya-ganesh•1h ago•9 comments

What's up with all those equals signs anyway?

https://lars.ingebrigtsen.no/2026/02/02/whats-up-with-all-those-equals-signs-anyway/
542•todsacerdoti•11h ago•166 comments

Launch HN: Modelence (YC S25) – App Builder with TypeScript / MongoDB Framework

52•eduardpi•5h ago•26 comments

Sandboxing AI Agents in Linux

https://blog.senko.net/sandboxing-ai-agents-in-linux
44•speckx•3h ago•29 comments

Bunny Database

https://bunny.net/blog/meet-bunny-database-the-sql-service-that-just-works/
207•dabinat•9h ago•96 comments

Puget Systems Most Reliable Hardware of 2025

https://www.pugetsystems.com/labs/articles/puget-systems-most-reliable-hardware-of-2025/
42•zdw•3d ago•10 comments

Another London: Excavating the disenchanted city

https://harpers.org/archive/2026/02/another-london-situationists-hari-kunzru/
18•jfil•2d ago•0 comments

How Vibe Coding Is Killing Open Source

https://hackaday.com/2026/02/02/how-vibe-coding-is-killing-open-source/
56•msolujic•1h ago•32 comments

Heritability of intrinsic human life span is about 50%

https://www.science.org/doi/10.1126/science.adz1187
118•XzetaU8•2d ago•78 comments

China Moon Mission: Aiming for 2030 Lunar Landing

https://spectrum.ieee.org/china-moon-mission-mengzhou-artemis
58•rbanffy•1h ago•42 comments

The Everdeck: A Universal Card System (2019)

https://thewrongtools.wordpress.com/2019/10/10/the-everdeck/
85•surprisetalk•6d ago•20 comments

Show HN: Octosphere, a tool to decentralise scientific publishing

https://octosphere.social/
31•crimsoneer•4h ago•12 comments

Defining Safe Hardware Design [pdf]

https://people.csail.mit.edu/rachit/files/pubs/safe-hdls.pdf
31•rachitnigam•4h ago•4 comments

X offices raided in France

https://apnews.com/article/france-x-investigation-seach-elon-musk-1116be84d84201011219086ecfd4e0bc
188•labrador•5h ago•153 comments

Show HN: C discrete event SIM w stackful coroutines runs 45x faster than SimPy

https://github.com/ambonvik/cimba
39•ambonvik•5h ago•14 comments

Anthropic AI Tool Sparks Selloff from Software to Broader Market

https://www.bloomberg.com/news/articles/2026-02-03/legal-software-stocks-plunge-as-anthropic-rele...
31•garbawarb•1h ago•7 comments

Emerge Career (YC S22) is hiring a product designer

https://www.ycombinator.com/companies/emerge-career/jobs/omqT34S-founding-product-designer
1•gabesaruhashi•9h ago

Tadpole – A modular and extensible DSL built for web scraping

https://tadpolehq.com/
30•zachperkitny•5h ago•5 comments

OpenClaw (a.k.a. Moltbot) Is Everywhere All at Once, and a Disaster

https://cacm.acm.org/blogcacm/openclaw-a-k-a-moltbot-is-everywhere-all-at-once-and-a-disaster-wai...
11•Beeroness•2h ago•1 comments

Bruce Schneier: AI and the scaling of betrayal

https://www.schneier.com/blog/archives/2023/12/ai-and-trust.html
17•insuranceguru•41m ago•2 comments

Show HN: Sandboxing untrusted code using WebAssembly

https://github.com/mavdol/capsule
57•mavdol04•7h ago•18 comments

Migrate Wizard – IMAP Based Email Migration Tool

https://migratewizard.com/#features
18•techstuff123•4h ago•18 comments

221 Cannon Road Is Not for Sale

https://fredbenenson.com/blog/2026/02/03/221-cannon-is-not-for-sale/
116•mecredis•4h ago•92 comments
Open in hackernews

Sandboxing AI Agents in Linux

https://blog.senko.net/sandboxing-ai-agents-in-linux
43•speckx•3h ago

Comments

jauntywundrkind•1h ago
Really well targeted!

I'd been thinking of using toolbox or devcontainers going forward, but having to craft containers with all my stuff sounds so painful, feels like it would become another full-time job to make containers

Bubblewrap & passing in a bunch of the current system sounds like a great compromise!

I do wonder what isolation something like systemd-run can offer, if that is enough.

Part #2 to me, I also want observability as to what the agent changed. That was one place where containers are such a clear & huge advantage! Having an overlay that contains the changes to the filesystem is so explicit. There's also works like agentfs, that offer a FUSE filesystem backed by Turso DB (sqlite compatible).

athrowaway3z•1h ago
I'm launching a SaaS to create yet another solution to the AI Sandboxing problem in linux.

My friends and I have spent a lot of time quietly injecting support down into the kernel without anybody raising a flag, and we finally have the infrastructure in place to solve this problem.

We have also poisoned all the LLMs training data with our approach, so our marketing is primed and we wont even need to learn Claude to use our tool.

We’re planning a soft launch this month, or maybe next month. Depending on how "in the vibe" (our new word for flow :) our team gets.

We’re calling it `useradd`.

Yes, the man page is intimidating, and the documentation is terrible. But once you're over the learning curve, it puts your machine into a kind of 'main frame' mode where multiple 'virtual teletypes' and users can operate on the same machine.

DM me if you want a beta key.

---

Sorry for the snark, but i cringe at the monuments to complexity I see people building, at least this solution is relative simple and free. Still, dont really see what it buys me.

tasuki•1h ago
Well done. It took me all the way up to `useradd`...

Edit: too bad about your edit. The comment was just fine without it.

athrowaway3z•19m ago
I wrote my comment to vent my disdain for all the circus projects filled with marketing blurbs and features lists for their overengineered vibeslop.

OP is just sharing the cool utility he found, and how it solved a problem for him.

It felt bad to leave them with the message they shouldn't have, or that he's a big part of the problem.

senko•17m ago
OP here, no worries, loved the comment and appreciate the feeling :)
mystifyingpoi•1h ago
`useradd` doesn't restrict network access.
kaffekaka•1h ago
I have used a separate user, but lately I have been using rootless podman containers instead for this reason. But I know too little about container escapes. So I am thinking about a combination.

Would a podman container run by a separate user provide any benefit over the two by themselves?

senko•48m ago
I love using different users for separating services I run on the same box!

For development, I want to be able to access/run/modify/delete the files alongside the AI agent. This can be done if groups and group permissions are set correctly (and the agent correctly chmods everything...), but that feels more fiddly than just isolating it with bubblewrap, systemd, or whatever, and preserving the uid/gid.

Just my 2c - it's great that we have options!

CuriouslyC•20m ago
I get where this is coming from, and it's not a terrible solution, but VMs are still better in terms of security and isolation. Typical workstation systems are not designed to be secure from their own users, and frontier models are going to get scary good at cracking systems soon.
ATechGuy•1h ago
I will ask what I've asked before: how to know what resources to make available to agents and what policies to enforce? The agent behavior is not predefined; it may need access to a number of files & web domains.

For example, you said: > I don't expose entire /etc, just the bare minimum How is "bare minimum" defined?

> Inspecting the log you can spot which files are needed and bind them as needed. This requires manual inspection.

aflag•1h ago
Ask the agent to bubblewrap itself
senko•45m ago
Article author here. I used trial and error - manual inspection it is.

This took me a few minutes but I feel more in control of what's being exposed and how. The AI recommended just exposing the entire /etc for example. It's probably okay in my case, but I wanted to go more precise.

On the network access part, I let it fully loose (no restrictions, it can access anything). I might want to tighten that in the future (or at least disallow 192.168/16 and 10/8), for now I'm not very concerned.

So there's levels of how tight you want to set it.

ATechGuy•38m ago
> I feel more in control of what's being exposed and how

Makes complete sense. Thanks for your insights!

kernc•1h ago
As a heads up and affirmation that the approach is correct, here's a small shell bubblewrap wrapper that boils the command line down to `sandbox-run claude --dangerously-skip-permissions`.

https://github.com/sandbox-utils/sandbox-run

aktuel•1h ago
I like this approach for Nix: https://dev.to/andersonjoseph/how-i-run-llm-agents-in-a-secu... It makes it also easy to give the agent only access to the tools it actually needs.
muggesmuds•1h ago
Would love this for MacOS
davidcann•54m ago
My app does this on macOS! https://multitui.com
senko•37m ago
There's https://code.claude.com/docs/en/sandboxing that uses something called Seatbelt on Mac and bubblewrap (the same thing I used here) on Linux.

No idea how customizable that is.

aflag•1h ago
I don't know if I want to create an ad-hoc list of permissions. What I would like would be something like take a snapshot of my current workspace in a VM. Run claude there and let it go wild. After the end of the session, kill the box. The only downside is potentially syncing the claude sessions/projects. But I don't think that'd be too difficult.
senko•53m ago
> take a snapshot of my current workspace in a VM. Run claude there

Sounds like docker + overlayfs might fit the bill, as long as there's a base image that is close enough to what you need.

I don't think there should be One True Way how to run these, everyone can set it up in a way that best fits their workflow.

ushakov•39m ago
both Docker and bubblewrap are not secure sandboxes. the only way to have actually isolated sandboxes is by using VMs

disclaimer: i work on secure sandboxes at E2B

senko•31m ago
No disagreement from me. From the article:

> Bubblewrap and Docker are not hardened security isolation mechanisms, but that's okay with me.

Edit to add: my understanding is the major flaw in this approach is potential bugs in Linux kernel that would allow sandbox escape. Would appreciate your insight if there are some easier/more probable attack vectors.

secure•43m ago
I recently blogged about how I do this using MicroVMs on NixOS: https://michael.stapelberg.ch/posts/2026-02-01-coding-agent-...
charcircuit•37m ago
If you have ssh installed, with network access it can ssh localhost to escape the sandbox.
senko•22m ago
Don't give it access to your ssh keys!
qwertox•19m ago
You can consider these agents criminals, or treat them like babies. Both can do harm for a while, but one offers a future.
dist-epoch•15m ago
`ssh localhost` doesn't work for me. maybe because I have enabled only key-based ssh and my user key is not in authorized_keys? am I missing something?
Jayakumark•26m ago
Saw something last week using bubblewrap as well in hn github.com/Use-Tusk/fence
bigwheels•16m ago
I use Leash [1] [2] for sandboxing my agents (to great effect!). I've been very happy with it, it provides much strict policy-level control for both process-level + network-level activity, as well as full visibility with a nice UI and dynamic runtime controls via WebUI. Way better than bubblewrap imo.

I originally saw it here on HN and have been hooked ever since.

[1] Screenshot: https://camo.githubusercontent.com/99b9e199ffb820c27c4e977f2...

[2] https://github.com/strongdm/leash

Fun fact: Do you know what container / sandboxing system is in most widespread use? Not docker containers, certainly not bubblewrap, and not even full VMs or firecracker. It's Chrome tabs.