frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Ghostty Is Leaving GitHub

https://mitchellh.com/writing/ghostty-leaving-github
41•WadeGrimridge•5m ago•0 comments

DOOM running in ChatGPT and Claude

https://chrisnager.com/blog/doom-runs-in-chatgpt-and-claude/
41•chrisnager•41m ago•12 comments

Localsend: An open-source cross-platform alternative to AirDrop

https://github.com/localsend/localsend
648•bilsbie•7h ago•212 comments

Interview with OpenAI and AWS CEOs about Bedrock Managed Agents

https://stratechery.com/2026/an-interview-with-openai-ceo-sam-altman-and-aws-ceo-matt-garman-abou...
14•translocator•25m ago•1 comments

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854
104•bo0tzz•3h ago•30 comments

Microsoft VibeVoice: Open-Source Frontier Voice AI

https://github.com/microsoft/VibeVoice
274•tosh•7h ago•161 comments

Claude.ai unavailable and elevated errors on the API

https://status.claude.com/incidents/9l93x2ht4s5w
160•shorsher•1h ago•134 comments

Patch applies fake diffs from commit messages

https://samizdat.dev/phantom-patch/
24•reconquestio•1d ago•4 comments

AISLE Discovers 38 CVEs in OpenEMR Healthcare Software

https://aisle.com/blog/aisle-discovers-38-critical-security-vulnerabilities-in-healthcare-softwar...
152•mmsc•3h ago•95 comments

Warp is now Open-Source

https://github.com/warpdotdev/warp
50•doppp•2h ago•11 comments

I have officially retired from Emacs

https://nullprogram.com/blog/2026/04/26/
121•Fudgel•2d ago•66 comments

Infisical (YC W23) Is Hiring Full Stack Software Engineers (Remote)

https://jobs.ashbyhq.com/infisical/782b9da8-20e1-48b2-919e-6c5430c58628
1•vmatsiiako•2h ago

Show HN: Live Sun and Moon Dashboard with NASA Footage

https://www.lumara-space.app/
134•beeswaxpat•6h ago•45 comments

Who owns the code Claude Code wrote?

https://legallayer.substack.com/p/who-owns-the-claude-code-wrote
177•senaevren•8h ago•194 comments

Laguna XS.2 and M.1

https://poolside.ai/blog/laguna-a-deeper-dive
71•tosh•3h ago•30 comments

C, Just In Time!

https://dyne.org/cjit/
13•smartmic•40m ago•2 comments

Things C++26 define_static_array can't do

https://quuxplusone.github.io/blog/2026/04/24/define-static-array/
31•jandeboevrie•2d ago•8 comments

Bankruptcies increase 11.9 percent

https://www.uscourts.gov/data-news/judiciary-news/2026/04/23/bankruptcies-increase-119-percent
113•jaredwiener•1h ago•51 comments

GitHub Actions is the weakest link

https://nesbitt.io/2026/04/28/github-actions-is-the-weakest-link.html
157•dochtman•7h ago•40 comments

Talkie: a 13B vintage language model from 1930

https://talkie-lm.com/introducing-talkie
595•jekude•21h ago•239 comments

FCC Funding Application Notes Paramount Will Be 49.5% Foreign-Owned Post-Merger

https://deadline.com/2026/04/paramount-fcc-request-wbd-merger-middle-east-1236873732/
160•throw0101c•3h ago•100 comments

GitHub Copilot code review will start consuming GitHub Actions minutes

https://github.blog/changelog/2026-04-27-github-copilot-code-review-will-start-consuming-github-a...
191•whtsky•10h ago•140 comments

ASML became the chokepoint for cutting-edge chips

https://worksinprogress.co/issue/the-worlds-most-complex-machine/
282•mellosouls•3d ago•174 comments

Deep under Antarctic ice, a long-predicted cosmic whisper breaks through

https://phys.org/news/2026-04-deep-antarctic-ice-cosmic-strange.html
95•rbanffy•1d ago•38 comments

Waymo in Portland

https://waymo.com/blog/shorts/waymo-in-portland/
132•xnx•1h ago•134 comments

A good AGENTS.md is a model upgrade. A bad one is worse than no docs at all

https://www.augmentcode.com/blog/how-to-write-good-agents-dot-md-files
32•gmays•1h ago•3 comments

Google and Pentagon reportedly agree on deal for 'any lawful' use of AI

https://www.theverge.com/ai-artificial-intelligence/919494/google-pentagon-classified-ai-deal
225•granzymes•4h ago•221 comments

Can You Find the Comet?

https://apod.nasa.gov/apod/ap260427.html
129•ColinWright•1d ago•84 comments

UAE Leaves OPEC and OPEC+

https://www.reuters.com/markets/commodities/uae-says-it-quits-opec-opec-statement-2026-04-28/
297•TechTechTech•6h ago•162 comments

Anthropic Joins the Blender Development Fund as Corporate Patron

https://www.blender.org/press/anthropic-joins-the-blender-development-fund-as-corporate-patron/
210•Philpax•3h ago•161 comments
Open in hackernews

Verantyx – A native IDE that obfuscates code before sending it to Cloud LLMs

https://github.com/Ag3497120/verantyx
4•kofdai•2d ago

Comments

kofdai•2d ago
I’m a student developer building Verantyx, a native macOS IDE solving a core dilemma in AI coding: We need the reasoning power of frontier models like Claude 4.7 Opus, but cannot legally or ethically leak proprietary source code, hardcoded secrets, or core business logic to their APIs. With the industry worried about losing "tacit knowledge" to AI, I built an architecture where the human retains ultimate control over semantics, while the AI is relegated strictly to structural logic patching. To achieve this, I built the "Gatekeeper" architecture. Before code leaves your local Apple Silicon machine, a Rust core parses the AST and converts it into "JCross IR"—a custom intermediate topology. It deterministically masks high-value identifiers (e.g., calculateTax() becomes [Symbol_A]()) while preserving structural logic and control flow. The Cloud LLM receives this obfuscated puzzle, writes a patch, and returns it. The local Rust vault then maps the IR patch back to your original source code. The Tech Stack & Architecture • Core (Rust): Handles the zero-copy memory vault, deterministic JCross IR generation, and AST parsing. The mapping dictionary is held strictly in local memory and never leaves the machine. • Frontend (Swift): Native macOS UI. Achieves 0-latency state sync (a 1-frame toggle response) between "Raw Code View" and "AI's JCross IR View" without heavy disk I/O. • The VS Code Bridge: To support LSPs without Electron's memory bloat, I built a background Node.js Extension Host communicating via JSON-RPC. Managing state synchronization between the Swift UI, the Rust Vault, and the Node.js host to prevent race conditions during reverse-compilation was an absolute nightmare. The Gatekeeper Flow 1. Request: User prompts the Swift UI for a refactor. 2. Obfuscation: Rust converts the file to JCross IR, locking the mapping dictionary in local memory. 3. Transmission: Swift sends only the JCross IR to the Cloud LLM. 4. Reasoning: The LLM processes the obfuscated topology and returns an IR patch. 5. Restoration: Rust uses the local dictionary to reverse-compile the IR patch back into raw code. 6. Approval: Swift presents a Diff UI to the user for final approval. Honest Trade-offs & Limitations • Semantic Loss Penalty: Blinding the AI to domain-specific context (e.g., it doesn't know [Symbol_A] means "DB Connection String") occasionally leads to syntactically correct but logically flawed code. • AST Topology Destruction: This is the most critical issue. When given complex instructions, frontier models sometimes hallucinate and destroy the AST topology of the obfuscated IR. When the structure is broken, the Rust vault cannot match it to the dictionary, causing reverse-compilation to fail and blocking the write. • API Cost Overhead: Processing obfuscated IR requires deeper reasoning steps and more tokens. • Lack of Quantitative Audits: As an independent project, enterprise-grade security audits to quantify the exact "leakage reduction rate" have not yet been performed. I built this from scratch by vibe-coding alongside AI agents. I’d love to hear your thoughts on this approach to semantic leakage and AST obfuscation.
gus_massa•1d ago
Remember, two enters

to get a new paragraph.

kofdai•1d ago
Thanks for the heads-up! Since I'm new here, I didn't realize the formatting rules and ended up missing the 2-hour edit window. I've replied to my original comment with the properly formatted version. I appreciate the help!

I’m a student developer building Verantyx, a native macOS IDE solving a core dilemma in AI coding: We need the reasoning power of frontier models like Claude 4.7 Opus, but cannot legally or ethically leak proprietary source code, hardcoded secrets, or core business logic to their APIs.

With the industry worried about losing "tacit knowledge" to AI, I built an architecture where the human retains ultimate control over semantics, while the AI is relegated strictly to structural logic patching.

To achieve this, I built the "Gatekeeper" architecture. Before code leaves your local Apple Silicon machine, a Rust core parses the AST and converts it into "JCross IR"—a custom intermediate topology. It deterministically masks high-value identifiers (e.g., calculateTax() becomes [Symbol_A]()) while preserving structural logic and control flow.

The Cloud LLM receives this obfuscated puzzle, writes a patch, and returns it. The local Rust vault then maps the IR patch back to your original source code.

The Tech Stack & Architecture

- Core (Rust): Handles the zero-copy memory vault, deterministic JCross IR generation, and AST parsing. The mapping dictionary is held strictly in local memory and never leaves the machine.

- Frontend (Swift): Native macOS UI. Achieves 0-latency state sync (a 1-frame toggle response) between "Raw Code View" and "AI's JCross IR View" without heavy disk I/O.

- The VS Code Bridge: To support LSPs without Electron's memory bloat, I built a background Node.js Extension Host communicating via JSON-RPC. Managing state synchronization between the Swift UI, the Rust Vault, and the Node.js host to prevent race conditions during reverse-compilation was an absolute nightmare.

The Gatekeeper Flow

1. Request: User prompts the Swift UI for a refactor.

2. Obfuscation: Rust converts the file to JCross IR, locking the mapping dictionary in local memory.

3. Transmission: Swift sends only the JCross IR to the Cloud LLM.

4. Reasoning: The LLM processes the obfuscated topology and returns an IR patch.

5. Restoration: Rust uses the local dictionary to reverse-compile the IR patch back into raw code.

6. Approval: Swift presents a Diff UI to the user for final approval.

Honest Trade-offs & Limitations

- Semantic Loss Penalty: Blinding the AI to domain-specific context (e.g., it doesn't know [Symbol_A] means "DB Connection String") occasionally leads to syntactically correct but logically flawed code.

- AST Topology Destruction: This is the most critical issue. When given complex instructions, frontier models sometimes hallucinate and destroy the AST topology of the obfuscated IR. When the structure is broken, the Rust vault cannot match it to the dictionary, causing reverse-compilation to fail and blocking the write.

- API Cost Overhead: Processing obfuscated IR requires deeper reasoning steps and more tokens.

- Lack of Quantitative Audits: As an independent project, enterprise-grade security audits to quantify the exact "leakage reduction rate" have not yet been performed.

I built this from scratch by vibe-coding alongside AI agents. I’d love to hear your thoughts on this approach to semantic leakage and AST obfuscation.

gus_massa•1d ago
> e.g., calculateTax() becomes [Symbol_A]()

I expect AI to guess it. For example here in Argentina the equivalent of the VAT is 21%, so I expect that if the AI see round(x*1.21, 2) will be enough (I'm not sure it's the correct rounding, this is not accounting advice :) .)