frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

LiteLLM Python package compromised by supply-chain attack

https://github.com/BerriAI/litellm/issues/24512
258•theanonymousone•2h ago•138 comments

So where are all the AI apps?

https://www.answer.ai/posts/2026-03-12-so-where-are-all-the-ai-apps.html
64•tanelpoder•35m ago•65 comments

Microsoft's "Fix" for Windows 11: Flowers After the Beating

https://www.sambent.com/microsofts-plan-to-fix-windows-11-is-gaslighting/
578•h0ek•5h ago•419 comments

I Quit Editing Photos

https://jamesbaker.uk/i-quit-editing-photos/
44•speckx•3d ago•38 comments

Debunking Zswap and Zram Myths

https://chrisdown.name/2026/03/24/zswap-vs-zram-when-to-use-what.html
78•javierhonduco•4h ago•17 comments

curl > /dev/sda: How I made a Linux distro that runs wget | dd

https://astrid.tech/2026/03/24/0/curl-to-dev-sda/
85•astralbijection•4h ago•32 comments

Ripgrep is faster than grep, ag, git grep, ucg, pt, sift (2016)

https://burntsushi.net/ripgrep/
189•jxmorris12•8h ago•81 comments

Opera: Rewind The Web to 1996 (Opera at 30)

https://www.web-rewind.com
132•thushanfernando•7h ago•76 comments

Secure Domain Name System (DNS) Deployment 2026 Guide [pdf]

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf
26•XzetaU8•2h ago•0 comments

Box of Secrets: Discreetly modding an apartment intercom to work with Apple Home

https://www.jackhogan.me/blog/box-of-secrets/
215•jackhogan11•1d ago•74 comments

Nanobrew: The fastest macOS package manager compatible with brew

https://nanobrew.trilok.ai/
28•syrusakbary•3h ago•16 comments

Missile Defense Is NP-Complete

https://smu160.github.io/posts/missile-defense-is-np-complete/
126•O3marchnative•1h ago•101 comments

Log File Viewer for the Terminal

https://lnav.org/
238•wiradikusuma•9h ago•32 comments

NanoClaw Adopts OneCLI Agent Vault

https://nanoclaw.dev/blog/nanoclaw-agent-vault/
59•turntable_pride•2h ago•8 comments

MSA: Memory Sparse Attention

https://github.com/EverMind-AI/MSA
53•chaosprint•3d ago•3 comments

iPhone 17 Pro Demonstrated Running a 400B LLM

https://twitter.com/anemll/status/2035901335984611412
672•anemll•1d ago•300 comments

Autoresearch on an old research idea

https://ykumar.me/blog/eclip-autoresearch/
394•ykumards•20h ago•86 comments

No-build, no-NPM, SSR-first JavaScript framework if you hate React, love HTML

https://qitejs.qount25.dev
88•usrbinenv•5d ago•74 comments

The Jellies That Evolved a Different Way to Keep Time

https://www.quantamagazine.org/the-jellies-that-evolved-a-different-way-to-keep-time-20260320/
4•jyunwai•3d ago•0 comments

BIO – The Bao I/O Co-Processor

https://www.crowdsupply.com/baochip/dabao/updates/bio-the-bao-i-o-co-processor
66•hasheddan•2d ago•17 comments

LLM Neuroanatomy II: Modern LLM Hacking and Hints of a Universal Language?

https://dnhkng.github.io/posts/rys-ii/
21•realberkeaslan•4h ago•9 comments

A 6502 disassembler with a TUI: A modern take on Regenerator

https://github.com/ricardoquesada/regenerator2000
70•wslh•3d ago•7 comments

FCC updates covered list to include foreign-made consumer routers

https://www.fcc.gov/document/fcc-updates-covered-list-include-foreign-made-consumer-routers
393•moonka•17h ago•258 comments

Show HN: Cq – Stack Overflow for AI coding agents

https://blog.mozilla.ai/cq-stack-overflow-for-agents/
182•peteski22•22h ago•77 comments

Dune3d: A parametric 3D CAD application

https://github.com/dune3d/dune3d
200•luu•2d ago•83 comments

Claude Code Cheat Sheet

https://cc.storyfox.cz
529•phasE89•17h ago•168 comments

Microservices and the First Law of Distributed Objects (2014)

https://martinfowler.com/articles/distributed-objects-microservices.html
37•pjmlp•3d ago•26 comments

Finding all regex matches has always been O(n²)

https://iev.ee/blog/the-quadratic-problem-nobody-fixed/
244•lalitmaganti•4d ago•63 comments

IRIX 3dfx Voodoo driver and glide2x IRIX port

https://sdz-mods.com/index.php/2026/03/23/irix-3dfx-voodoo-driver-glide2x-irix-port/
94•zdw•16h ago•23 comments

The Resolv hack: How one compromised key printed $23M

https://www.chainalysis.com/blog/lessons-from-the-resolv-hack/
103•timbowhite•16h ago•152 comments
Open in hackernews

NanoClaw Adopts OneCLI Agent Vault

https://nanoclaw.dev/blog/nanoclaw-agent-vault/
59•turntable_pride•2h ago

Comments

_pdp_•1h ago
From a security standpoint, I'm glad that people are starting to pay attention to basic security practices.

That said, while I'm hardly a fan of MCP (judge for yourself by reviewing my previous comments on the matter), at least its security model was standardised around OAuth, which in my opinion is a good thing, albeit with a few small issues.

I personally prefer CLIs, but their security is in fact worse. A lot worse! Sure, we can now store API keys in a vault, but it's not like you can rotate or expire them easily. Plus, the security model around APIs is based on path-based rules, which aren't very effective given that most services use REST-style APIs. This is even worse for GraphQL, JSON-RPC, and similar protocols.

It is backwards. I bet we will move from CLIs to something else in about 3-6 months.

rvz•53m ago
What this appears to be is that we are now reinventing proxies with policy control and the best part of this is the solution (OneCLI) has no security audit. This would give a complete dismissal from the infosec teams to even attempt integrating this vibe-coded slop.

As long as the fake keys are known, they can be mapped directly to the real key with the endpoint in OneCLI to exfiltrate the data and you don't need to leak any keys anyway.

The correct solution is that there should be no sort of keys in the VM / Container in the first place.

> It is backwards. I bet we will move from CLIs to something else in about 3-6 months.

The hype around CLIs is just as unfounded as was MCPs and made no-sense just like OpenClaw did. Other than hosting providers almost no-one is making money from OpenClaw and from its use-cases; which is just wasting tokens.

We'll move on to the next shiny vibe-coded thing because someone else on X said so.

AnDaltan•6m ago
Yeah, I think that’s broadly right.

MCP has plenty of problems, but standardising on OAuth was one of the better calls. Expiry, scopes, rotation, delegated access, all much better than the usual CLI pattern of long-lived API keys. The CLI story there is still pretty rough.

And once the policy model is host/path matching, GraphQL and JSON-RPC become awkward immediately unless the proxy starts understanding payload semantics.

jryio•1h ago
Nice upgrade. userpsace HTTP proxies are a good start and should make unlikely that a secret gets into the context window due to a high permission read. There are a few missing pieces in the agent security world in general

1. Full secret-memory isolation whereby an agent with root privileges can't exfilrate. Let's assume my agent is prompt injected to write a full-permissions script to spin up OneCli, modify the docker container, log all of the requests w/ secrets to a file outside the container, exfiltrate.

2. An intent layer on top of agents that models "you have access to my gmail (authN) but you can only act on emails where you are a participant". This would be more similar to universal RBAC between agent ↔ mcp etc.

I've been building on [2] for a while now using signed tokens expressing intent.

Jonathanfishner•58m ago
Creator of OneCLI here.

On (1), the agent runs in its own container where OneCLI doesn't exist. It can't spin up OneCLI or access its process because it's completely isolated from it. The agent only ever sees placeholder tokens, the real secrets live in a separate container it has no way to reach.

On (2), we actually address this with OneCLI Rules, deterministic constraints enforced at the proxy level before a request ever hits the API. So the agent doesn't need to "behave", it just can't do what the rules don't allow. Would love to hear more about your signed tokens approach.

gdorsi•1h ago
Interesting!

I still wouldn't give to any claw access to my mail accounts, but it is a step in the good direction.

I love how NanoClaw is aggregating the effort of making personal assistants more secure.

Good job!

falcor84•29m ago
I don't get the idea of giving a claw access to your own mail account, but am now playing with the idea of it having its own email account that I selectively forward to - that offers almost the full benefit, with significantly less risk.
ting0•19m ago
I really don't understand the fascination with openclaw. Can only assume it's mostly just guerrilla marketing spam.