frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: GibRAM an in-memory ephemeral GraphRAG runtime for retrieval

https://github.com/gibram-io/gibram
15•ktyptorio•3h ago•2 comments

Show HN: Lance – Open lakehouse format for multimodal AI datasets

https://github.com/lance-format/lance
3•criexe•51m ago•0 comments

Show HN: Speed Miners – A tiny RTS resource mini-game

https://speedminers.fun/
35•nickponline•12h ago•4 comments

Show HN: WebTerm – Browser-based terminal emulator

https://www.webterm.app/en
2•DaiAoki•1h ago•1 comments

Show HN: ChunkHound, a local-first tool for understanding large codebases

https://github.com/chunkhound/chunkhound
81•NadavBenItzhak•12h ago•25 comments

Show HN: LibreblogRSS – a simple Android RSS reader that mimics social timelines

https://github.com/LibreBlogOrg/LibreblogRSS
2•libreblog•2h ago•0 comments

Show HN: Streaming gigabyte medical images from S3 without downloading them

https://github.com/PABannier/WSIStreamer
146•el_pa_b•1d ago•46 comments

Show HN: Hekate – A Zero-Copy ZK Engine Overcoming the Memory Wall

4•y00zzeek•5h ago•9 comments

Show HN: I built a tool to assist AI agents to know when a PR is good to go

https://dsifry.github.io/goodtogo/
37•dsifry•23h ago•32 comments

Show HN: 30min video analysis for $0.003 via frame-tiling and Vision API

https://github.com/unhaya/vam-seek-ai
5•haasiy•4h ago•2 comments

Show HN: App to spoof GPS location on iOS without jailbreaking

https://github.com/acheong08/ios-location-spoofer
10•acheong08•8h ago•2 comments

Show HN: Turkish Sieve Engine – GPU-Accelerated Prime Number Generator

https://github.com/bilgisofttr/turkishsieve
3•bilgisoft•5h ago•0 comments

Show HN: Intuitive TUI for Ghostty Terminal Configuration

https://github.com/intaek-h/ghofig
3•intaek•5h ago•0 comments

Show HN: A self-custody medical records prototype (lessons learned)

https://github.com/Mzhvnn-tch/sehati-apps
3•SERSI-S•5h ago•1 comments

Show HN: Agam Space – Self-hosted, zero-knowledge, E2EE file storage

https://github.com/agam-space/agam-space
5•rameshl•9h ago•0 comments

Show HN: Tusk Drift – Turn production traffic into API tests

https://github.com/Use-Tusk/tusk-drift-cli
32•jy-tan•2d ago•6 comments

Show HN: Microwave – Native iOS app for videos on ATproto

https://testflight.apple.com/join/cVxV1W3g
35•sinned•4d ago•10 comments

Show HN: My way – 18-agent autonomous workflow for ClaudeCode – issues to deploy

https://github.com/avifenesh/awesome-slash
3•anotherCodder•9h ago•0 comments

Show HN: 1Code – Open-source Cursor-like UI for Claude Code

https://github.com/21st-dev/1code
69•Bunas•2d ago•45 comments

Show HN: Gollem – Go framework for agentic AI app with MCP and built-in tools

https://github.com/m-mizutani/gollem
3•masa00•9h ago•0 comments

Show HN: Fun things to do with your VM/370 machine

https://rbanffy.github.io/fun-with-old-mainframes.github.io/fun-with-vm370.html
20•rbanffy•6d ago•4 comments

Show HN: TinyCity – A tiny city SIM for MicroPython (Thumby micro console)

https://github.com/chrisdiana/TinyCity
140•inflam52•2d ago•26 comments

Show HN: Spliff – Correlating XDP and TLS via eBPF (Building a Linux EDR)

https://github.com/NoFear0411/spliff
4•spliffedr•10h ago•12 comments

Show HN: pgwire-replication - pure rust client for Postgres CDC

https://github.com/vnvo/pgwire-replication
45•sacs0ni•6d ago•8 comments

Show HN: mdto.page – Turn Markdown into a shareable webpage instantly

https://mdto.page
56•hjinco•1d ago•31 comments

Show HN: Sparrow-1 – Audio-native model for human-level turn-taking without ASR

https://www.tavus.io/post/sparrow-1-human-level-conversational-timing-in-real-time-voice
121•code_brian•3d ago•48 comments

Show HN: Webctl – Browser automation for agents based on CLI instead of MCP

https://github.com/cosinusalpha/webctl
134•cosinusalpha•3d ago•39 comments

Show HN: Govctl – A CLI enforcing RFC-driven discipline on AI coding

https://github.com/govctl-org/govctl
2•gabriel_wu•12h ago•0 comments

Show HN: Tabstack – Browser infrastructure for AI agents (by Mozilla)

128•MrTravisB•3d ago•23 comments

Show HN: Project RCPC – A community network for distributed logic and A

https://github.com/JTRSoftware/Project_RCPC
2•jtr87•12h ago•0 comments
Open in hackernews

Show HN: Spliff – Correlating XDP and TLS via eBPF (Building a Linux EDR)

https://github.com/NoFear0411/spliff
4•spliffedr•10h ago

Comments

spliffedr•10h ago
Hi HN,

I *built Spliff, a high-performance L7 sniffing and correlation engine in pure C23. The goal is to build a fully working, Linux-native EDR that isn't a resource-hogging black box.

The core innovation – "Golden Thread" correlation:

Most eBPF sniffers capture SSL data OR packets. Spliff correlates both:

  XDP (NIC) → sock_ops (socket cookies) → Uprobes (SSL buffers)
      ↓              ↓                         ↓
   packets      TCP 5-tuple              decrypted data
                     ↘         ↓         ↙
                      unified per-flow view
This maps raw decrypted TLS data back to the exact TCP flow, PID, and process—something commercial EDRs struggle with.

Technical highlights:

• XDP + sock_ops + Uprobes – Three BPF program types working together via shared maps

• Lock-free threading – Dispatcher/Worker model with Concurrency Kit SPSC queues

• Full HTTP/2 – HPACK decompression, stream multiplexing, request-response correlation

• No MITM – Hooks OpenSSL, GnuTLS, NSS, WolfSSL, BoringSSL directly via uprobes

• Static binary fingerprinting – Build ID matching for stripped binaries (Chrome)

• BPF-level filtering – AF_UNIX IPC filtered in kernel, not userspace

Current status: Working L7 visibility engine. Captures and correlates HTTPS traffic in real-time.

What's next: Process behavior tracking, file/network anomaly detection, event streaming (NATS/Kafka), threat intel integration.

Linux-only – Requires kernel 5.x+ with BTF, XDP, libbpf.

---

The project is GPL-3.0 and we're inviting anyone interested to contribute—whether it's code, architecture feedback, security research, or ideas for EDR features that actually matter (not compliance theater).

GitHub: https://github.com/NoFear0411/spliff

*Note: The codebase was written with Claude Opus. I provide the research, architecture decisions, and review every line.

ironbound•9h ago
This is super cool, I always wanted a system to peak App packets before encryption gets applied.
spliffedr•1h ago
Give it a test and let me know if you encounter any issues. Except the chrome/chromium with static binaries, that have BoringSSL shipped inside. The entire SSL/TLS code flow is a motherfucking spaghetti to provide acceleration and fast page loads. They even offload to system OpenSSL lib for some TLS parts and even with debug symbols (not you google that doesn't include them in repo) it is a headache to trace it
westurner•9h ago
Does this do flow offloading? From https://westurner.github.io/hnlog/#comment-45755142 re: awesome-ebpf:

> "eBPF/XDP hardware offload to SmartNICs",

westurner•9h ago
Also this, re any eBPF FWIU: https://news.ycombinator.com/item?id=46412107 :

> So eBPF for a WAF isn't worth it?

spliffedr•9h ago
Here are answers to both your questions:

The code has the infrastructure for XDP hardware offload:

- XDP_MODE_OFFLOAD enum exists in bpf_loader.h:61

- XDP_FLAGS_HW_MODE flag mapping in bpf_loader.c:789

But it's not usable in practice because:

1. No CLI option – There's no way to enable offload mode; it defaults to native with SKB fallback

2. BPF program isn't offload-compatible – The XDP program uses:

- Complex BPF maps (LRU hash, ring buffers)

- Helper functions not supported by most SmartNIC JITs

- The flow_cookie_map shared with sock_ops (can't be offloaded)

3. SmartNIC limitations

– Hardware offload typically only supports simple packet filtering/forwarding, not the stateful flow tracking spliff does

What would be needed for SmartNIC support:

- Split XDP program into offloadable (simple classification) and non-offloadable (stateful) parts

- Use SmartNIC-specific toolchains (Memory-1, Netronome SDK, etc.)

- Me having a device with SmartNIC and full driver support to play with. I've done all my testing on Fedora 43 on my device

For now this could be a future roadmap item, but the current "Golden Thread" correlation architecture fundamentally requires userspace + kernel cooperation that can't be fully offloaded.

Here is a sample debug output when you run spliff -d and it tries to detect all your NICs:

--- [DEBUG] Loaded BPF program from build-release/spliff.bpf.o [XDP] Found program: xdp_flow_tracker [XDP] Found required maps: flow_states, session_registry, xdp_events [XDP] Found optional map: cookie_to_ssl [XDP] Found map: flow_cookie_map (for cookie caching) [XDP] Found optional map: xdp_stats_map [XDP] Initialization complete [XDP] Discovered interface: enp0s20f0u2u4u2 (idx=2, mtu=1500, UP, physical) [XDP] Discovered interface: wlp0s20f3 (idx=4, mtu=1500, UP, physical) [XDP] Discovered interface: enp0s31f6 (idx=3, mtu=1500, UP, physical) libbpf: Kernel error message: Underlying driver does not support XDP in native mode [XDP] native mode failed on enp0s20f0u2u4u2, falling back to SKB mode [XDP] Attached to enp0s20f0u2u4u2 (idx=2) in skb mode libbpf: Kernel error message: Underlying driver does not support XDP in native mode [XDP] native mode failed on wlp0s20f3, falling back to SKB mode [XDP] Attached to wlp0s20f3 (idx=4) in skb mode libbpf: Kernel error message: Underlying driver does not support XDP in native mode [XDP] native mode failed on enp0s31f6, falling back to SKB mode [XDP] Attached to enp0s31f6 (idx=3) in skb mode [XDP] Attached to 3 of 3 discovered interfaces XDP attached to 3 interfaces [SOCKOPS] Using cgroup: /sys/fs/cgroup [SOCKOPS] Attached socket cookie caching program sock_ops attached for cookie caching [XDP] Warm-up: Seeded 5 existing TCP connections [DEBUG] Warmed up 5 existing connections ---

edit: formating is hard on my phone

westurner•9h ago
> Me having a device with SmartNIC and full driver support to play with

Same. I have a Pi Pico with PIO, though

> but the current "Golden Thread" correlation architecture fundamentally requires userspace + kernel cooperation that can't be fully offloaded.

Hard limit, I guess.

(If you indent all lines of a block of text with two spaces (including blank newlines), HN will format it as monospace text and preserve line breaks.)

spliffedr•9h ago
I've updated the Architecture diagrams to include everything: https://github.com/NoFear0411/spliff/blob/main/README.md#arc...

Thanks for the format tip.

westurner•7h ago
So I went looking for TLS accelerator cards again:

/? TLS accelerators open: https://www.google.com/search?q=TLS+accelerators+open :

- "AsyncGBP+: Bridging SSL/TLS and Heterogeneous Computing with GPU-Based Providers" https://ieeexplore.ieee.org/document/10713226 .. https://news.ycombinator.com/item?id=46664295

/? XDP hardware offload to GPU: https://www.google.com/search?q=XDP+hardware+offload+to+a+GP... :

- eunomia-bpf/XDP-on-GPU: https://github.com/eunomia-bpf/XDP-on-GPU

Perhaps AsyncGBP+ + XDP-on-GPU would solve.

The AsyncGBP+ article mentions support for PQ on GPU.

But then process isolation on GPUs. And they removed support for vGPU unlock.

spliffedr•1h ago
That is a rabbit hole that I don't wanna go down to again.
metmac•8h ago
Just came here to say this is awesome to see more folks do novel stuff with XDP!

After reading loophole labs post [0] a few months ago. I was hoping someone would cook on this for security research.

[0] https://loopholelabs.io/blog/xdp-for-egress-traffic

spliffedr•1h ago
I think (not 100% sure) Cillium [0][1] kinda already does this. This loophole is good for packet processing/routing and even introducing XDP based ACL to bypass any ip/nf tables and get that almost wire speed benefit. I use Cilium with these features for custom made k8s clusters with Talos OS without any kube-proxy.

[0]https://docs.cilium.io/en/stable/operations/performance/tuni...

[1]https://isovalent.com/blog/post/cilium-netkit-a-new-containe...