frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

GLM-5: From Vibe Coding to Agentic Engineering

https://z.ai/blog/glm-5
135•meetpateltech•1h ago•55 comments

Toyota Fluorite: "console-grade" Flutter game engine

https://fluorite.game/
69•bsimpson•1h ago•30 comments

GLM-OCR: Accurate × Fast × Comprehensive

https://github.com/zai-org/GLM-OCR
116•ms7892•4d ago•45 comments

WiFi Could Become an Invisible Mass Surveillance System

https://scitechdaily.com/researchers-warn-wifi-could-become-an-invisible-mass-surveillance-system/
141•mgh2•4d ago•69 comments

It's all a blur

https://lcamtuf.substack.com/p/its-all-a-blur
266•zdw•5d ago•57 comments

A shortage of tenors

https://www.economist.com/culture/2026/02/09/the-world-is-suffering-from-a-shortage-of-tenors
21•petethomas•1d ago•7 comments

Show HN: AI agents play SimCity through a REST API

https://hallucinatingsplines.com
112•aed•2d ago•34 comments

FAA Halts All Flights at El Paso Airport for 10 Days

https://www.nytimes.com/2026/02/11/us/faa-el-paso-flight-restrictions.html
224•edward•9h ago•412 comments

It's not finance, it's your pensions

https://theloop.ecpr.eu/its-not-finance-its-your-pensions/
7•kome•5d ago•3 comments

Why Vampires Live Forever

https://machielreyneke.com/blog/vampires-longevity/
136•machielrey•2h ago•47 comments

Rome is studded with cannon balls (2022)

https://essenceofrome.com/rome-is-studded-with-cannon-balls
68•thomassmith65•4d ago•5 comments

Should your developer company go open source?

https://extremefoundership.substack.com/p/should-your-developer-company-go
4•paraphrenia•34m ago•0 comments

Exposure Simulator

http://www.andersenimages.com/tutorials/exposure-simulator/
92•sneela•6h ago•36 comments

AI-First Company Memos

https://the-ai-native.company/
74•bobismyuncle•2h ago•115 comments

Show HN: Renovate – The Kubernetes-Native Way

https://github.com/mogenius/renovate-operator
27•JanLepsky•3h ago•13 comments

Railway (PaaS) global outage

https://status.railway.com
64•TealMyEal•2h ago•52 comments

The Day the Telnet Died

https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
456•pjf•19h ago•335 comments

Lessons you will learn living in a snowy place

https://eukaryotewritesblog.com/2026/01/21/very-snowy-place/
240•surprisetalk•5d ago•226 comments

Communities are not fungible

https://www.joanwestenberg.com/communities-are-not-fungible/
152•tardibear•10h ago•70 comments

Windows Notepad App Remote Code Execution Vulnerability

https://www.cve.org/CVERecord?id=CVE-2026-20841
643•riffraff•11h ago•401 comments

Chrome extensions spying on users' browsing data

https://qcontinuum.substack.com/p/spying-chrome-extensions-287-extensions-495
380•qcontinuum1•8h ago•161 comments

The Feynman Lectures on Physics (1961-1964)

https://www.feynmanlectures.caltech.edu/
435•rramadass•1d ago•113 comments

CoLoop (YC S21) Is Hiring Ex Technical Founders in London

https://www.workatastartup.com/jobs/90016
1•mrlowlevel•11h ago

Ask HN: Why are electronics still so unrecyclable?

30•alexandrehtrb•2h ago•58 comments

A Cosmic Miracle: A Remarkably Luminous Galaxy at z=14.44 Confirmed with JWST

https://astro.theoj.org/article/156033-a-cosmic-miracle-a-remarkably-luminous-galaxy-at-_z_-sub-s...
79•yread•9h ago•39 comments

The Singularity will occur on a Tuesday

https://campedersen.com/singularity
1284•ecto•1d ago•694 comments

End of an era for me: no more self-hosted git

https://www.kraxel.org/blog/2026/01/thank-you-ai/
167•dzulp0d•16h ago•112 comments

Scientists research man missing 90% of his brain who leads a normal life (2016)

https://www.cbc.ca/radio/asithappens/as-it-happens-thursday-edition-1.3679117/scientists-research...
14•thunderbong•1h ago•2 comments

Visualize MySQL query execution plans as interactive FlameGraphs

https://github.com/vgrippa/myflames
48•tanelpoder•4d ago•9 comments

Do not apologize for replying late to my email

https://ploum.net/2026-02-11-do_not_apologize_for_replying_to_my_email.html
171•validatori•7h ago•144 comments
Open in hackernews

NanoClaw solves one of OpenClaw's biggest security issues

https://venturebeat.com/orchestration/nanoclaw-solves-one-of-openclaws-biggest-security-issues-and-its-already
30•marsh_mellow•1h ago

Comments

senko•1h ago
File system access is not one of OpenClaw's biggest security issues. If that were so, running it in a VM or another computer (I hear Mac Minis are popular!) would solve it.

If you need it to do anything useful[0], you have to connect it to your data and give it action capabilities. All the dragons are there.

If you play it careful and don't expose your data, comm channels, etc., then it's much like the other AI assistants out there.[1]

---

[0] for your definition of useful

[1] I do appreciate the self-modification and heartbeat aspects, and don't want to downplay how technically impressive it is. The comment is purely from POV of an end-user product.

stevepike•1h ago
Reminds me of https://xkcd.com/1200/
samkim•29m ago
Agreed, sandboxing is only part of agent security. Authorization (what data the agent can access and what tools it can execute) is also a big part of it.

I've found primer on agent sandboxes [0] is a great reference on sandboxing options and the trade-offs

For agents there's a tension between level of restriction and utility. I think a large part of OpenClaw's popularity is that the lack of restriction by default has helped people see the potential utility of agents. But any agent that isn't just for trying things out requires consideration of what it should and should not be able to do and from there the decision around the best combination of sandboxing and authorization.

At work, we've found it helpful to distinguish coding agents vs product agents. Coding agents have the ability to add new execution paths by pulling in external code or writing their own code to run. Product agents have a strictly defined set of tools and the runtime prevents them from executing anything beyond that definition. This distinction helps us reason about what sandboxing is required.

For data permissions it's trickier. MCP uses OAuth for authentication but each server can have different expectations for access to the external service. Some servers let you use a service account where you can narrow the scope of access but others assume a token minted from an admin account which means the MCP server might have access to things beyond what the agent using the server should.

So for that, we have an MCP proxy that lets us define custom permissions for every tool and resource, and at runtime makes permission checks to ensure the agent only gets access to the subset of things we define ahead of time. (We're using SpiceDB to implement the authorization logic and checks) This works well for product agents because they can't add new execution paths. For coding agents, we've tinkered with plugins/skills to try to do the same but ultimately they can build their way around authorization layers that aren't part of the runtime system so it's something we're still trying to figure out.

---

[0] https://www.luiscardoso.dev/blog/sandboxes-for-ai

LelouBil•22m ago
Sandboxing is great, and stricter Authorization policies are great too, but with these kinds of software, my biggest fear (and that's why I am not trying them out now) is prompt injection.

It just seems unsolvable if you want the agent to do anything remotely useful

Someone•8m ago
I think the only sane way, if there is one, is to sandbox your LLM behind a fixed set of MCP servers that severely limit what it can do.

Reading your mail, WhatsApp and bank transactions? May be OK if your LLM runs locally, but even then, if it has any way to send data to the outside world without you checking it, maybe not even. You don’t want your LLM to send your private mail (including photos) or bank statements to somebody who uses prompt injection to get that data.

Thinking of prompt injection: we need LLMs with a Harvard architecture (https://en.wikipedia.org/wiki/Harvard_architecture), so that there is no way for LLM data inputs to be treated as instructions.

mjr00•1h ago
> Concrete Media: Public Relations for B2B tech companies

This is a marketing piece for Concrete Media.

Whenever you see an article like this, be sure to ask yourself how the author came up with the idea for the article, and how the author got in contact with any people interviewed in the article.

hypfer•1h ago
Exactly this.

The whole wording also doesn't make sense.

OpenClaw was released in November of 2025, yet the article sounds like NanoClaw _disrupts_ some old staple of the industry.

You can't use that wording 4 months into the whole "industry". Even less so, when your competitor was "launched" 2 weeks ago. Even less so when it's written by claude

This nothingburger is so much nothing, it might as well be an antiburger.

senko•1h ago
Should anyone think the comment is dismissive, here's this directly in the text:

> a respected public relations firm that often works with tech businesses covered by VentureBeat

bryan0•1h ago
Nanoclaw is excellent. Natively uses Apple containers and easy to use with oauth Claude code subscription. Only annoying thing was it defaults to WhatsApp, but it’s easy to fork and mod as you want. The best thing is asking it to mod itself!
benocodes•1h ago
if you're looking for the repo: https://github.com/qwibitai/nanoclaw

not 500 lines but looks more reasonable then openclaw

Kevcmk•1h ago
This “article” completely written with “AI”
ChrisArchitect•1h ago
Previous discussion on the Show HN: from the dev:

https://news.ycombinator.com/item?id=46850205

publicinterest•49m ago
To their credit they put a single sentence of warning into the article they commissioned, but to highlight:

- I don't care deeply about this code.

- (This isn’t) production code but a reference or starting point they can use to build functional custom software for themselves.

- I spent a weekend giving instructions to coding agents to build this.

9 days ago

moomoo11•1h ago
This is why I really think for AI tools it’s probably good to just start fresh.

Like our emails, files, other accounts and stuff. That’s “ours” and personal.

Even for business, that should be off limits.

What we do give to AI should be brand new blank slates. Like say I roll out an AI solution in March 2026. That is the seed from which everything we do using AI will work.

To get there we could move data we want to the new environment. But no access to any existing stuff. We start fresh.

If it needs to take any actions on behalf of our existing accounts it needs to go through some secure pipeline where it only tells us intent, without access.

cobbal•29m ago
This is cutting off the "Access to private data" leg of the lethal trifecta. One of the few ways to actually make an agent secure.
netdur•42m ago
I have tried to solve the agent running wild, and I found two solutions, the first is to mount the workspace folder using WASM to scope any potential damage, the second is running rquickjs with all APIs and module imports disabled, requiring the agent to call a host function that checks permissions before accessing any files

--- [0] https://github.com/netdur/hugind

tmaly•31m ago
Aside from the security differences, what can OpenClaw do that NanoClaw cannot?
sathish316•23m ago
How is NanoClaw immune to the Lethal trifecta attack based on prompt injection that OpenClaw is also prone to?

https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/

Lethal trifecta:

1. Access to your private data

2. Exposure to untrusted content

3. The ability to externally communicate

Any combination of 1-3 or more skills can result in a prompt injection attack if it satisfies the above criteria - Gmail or sales personal data, Reddit or X posts or comments in white text, Gmail or Reddit or X to send confidential information to the attacker.

LelouBil•20m ago
Prompt injection just seems unsolvable.

Are there works toward preventing it 100% of the time ? (I would assume the LLMs architectures would have to change)

kvdveer•18m ago
It is not immune, but it limits #1 and #2.

The "lethal trifecta" is a limited view on security, as it's mostly concerned with leaking data. This solution focuses on a different aspect: the ability of rogue actions (instead of rogue communications per #3).