frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: MCP App to play backgammon with your LLM

https://github.com/sam-mfb/backgammon-mcp
2•sam256•23m ago•0 comments

Show HN: Look Ma, No Linux: Shell, App Installer, Vi, Cc on ESP32-S3 / BreezyBox

https://github.com/valdanylchuk/breezydemo
241•isitcontent•16h ago•26 comments

Show HN: I spent 4 years building a UI design tool with only the features I use

https://vecti.com
343•vecti•18h ago•153 comments

Show HN: If you lose your memory, how to regain access to your computer?

https://eljojo.github.io/rememory/
307•eljojo•19h ago•190 comments

Show HN: I'm 75, building an OSS Virtual Protest Protocol for digital activism

https://github.com/voice-of-japan/Virtual-Protest-Protocol/blob/main/README.md
5•sakanakana00•1h ago•1 comments

Show HN: I built Divvy to split restaurant bills from a photo

https://divvyai.app/
3•pieterdy•1h ago•0 comments

Show HN: R3forth, a ColorForth-inspired language with a tiny VM

https://github.com/phreda4/r3
77•phreda4•15h ago•14 comments

Show HN: Smooth CLI – Token-efficient browser for AI agents

https://docs.smooth.sh/cli/overview
93•antves•1d ago•69 comments

Show HN: ARM64 Android Dev Kit

https://github.com/denuoweb/ARM64-ADK
17•denuoweb•2d ago•2 comments

Show HN: BioTradingArena – Benchmark for LLMs to predict biotech stock movements

https://www.biotradingarena.com/hn
26•dchu17•20h ago•12 comments

Show HN: I Hacked My Family's Meal Planning with an App

https://mealjar.app
2•melvinzammit•3h ago•0 comments

Show HN: Artifact Keeper – Open-Source Artifactory/Nexus Alternative in Rust

https://github.com/artifact-keeper
152•bsgeraci•1d ago•64 comments

Show HN: Slack CLI for Agents

https://github.com/stablyai/agent-slack
47•nwparker•1d ago•11 comments

Show HN: I built a free UCP checker – see if AI agents can find your store

https://ucphub.ai/ucp-store-check/
2•vladeta•4h ago•2 comments

Show HN: Gigacode – Use OpenCode's UI with Claude Code/Codex/Amp

https://github.com/rivet-dev/sandbox-agent/tree/main/gigacode
18•NathanFlurry•1d ago•9 comments

Show HN: Compile-Time Vibe Coding

https://github.com/Michael-JB/vibecode
10•michaelchicory•5h ago•1 comments

Show HN: Slop News – HN front page now, but it's all slop

https://dosaygo-studio.github.io/hn-front-page-2035/slop-news
15•keepamovin•6h ago•5 comments

Show HN: Daily-updated database of malicious browser extensions

https://github.com/toborrm9/malicious_extension_sentry
14•toborrm9•21h ago•7 comments

Show HN: Horizons – OSS agent execution engine

https://github.com/synth-laboratories/Horizons
23•JoshPurtell•1d ago•5 comments

Show HN: Micropolis/SimCity Clone in Emacs Lisp

https://github.com/vkazanov/elcity
172•vkazanov•2d ago•49 comments

Show HN: Falcon's Eye (isometric NetHack) running in the browser via WebAssembly

https://rahuljaguste.github.io/Nethack_Falcons_Eye/
5•rahuljaguste•15h ago•1 comments

Show HN: Fitspire – a simple 5-minute workout app for busy people (iOS)

https://apps.apple.com/us/app/fitspire-5-minute-workout/id6758784938
2•devavinoth12•9h ago•0 comments

Show HN: I built a RAG engine to search Singaporean laws

https://github.com/adityaprasad-sudo/Explore-Singapore
4•ambitious_potat•9h ago•4 comments

Show HN: Local task classifier and dispatcher on RTX 3080

https://github.com/resilientworkflowsentinel/resilient-workflow-sentinel
25•Shubham_Amb•1d ago•2 comments

Show HN: Sem – Semantic diffs and patches for Git

https://ataraxy-labs.github.io/sem/
2•rs545837•10h ago•1 comments

Show HN: A password system with no database, no sync, and nothing to breach

https://bastion-enclave.vercel.app
12•KevinChasse•21h ago•16 comments

Show HN: FastLog: 1.4 GB/s text file analyzer with AVX2 SIMD

https://github.com/AGDNoob/FastLog
5•AGDNoob•12h ago•1 comments

Show HN: GitClaw – An AI assistant that runs in GitHub Actions

https://github.com/SawyerHood/gitclaw
9•sawyerjhood•21h ago•0 comments

Show HN: Gohpts tproxy with arp spoofing and sniffing got a new update

https://github.com/shadowy-pycoder/go-http-proxy-to-socks
2•shadowy-pycoder•13h ago•0 comments

Show HN: I built a directory of $1M+ in free credits for startups

https://startupperks.directory
4•osmansiddique•13h ago•0 comments
Open in hackernews

Show HN: The firmware that got me detained by Swiss Intelligence

https://github.com/seabass011/davos-incident-firmware
5•reutinger•2w ago

Comments

reutinger•2w ago
OP here. I literally just got released from 13 hours in a Swiss holding cell because this prototype looked like a bomb to the WEF police.

To get released, I had to walk a forensic expert ('Chris') through this codebase line-by-line. He didn't care about the pitch; he audited the Rust borrow checker logs, the specific hardware interrupts, and the encryption implementation to prove it wasn't a trigger mechanism.

It was the most aggressive code audit of my life. Happy to answer questions about the stack, the 'vibe coding' workflow I used to build it, or the Swiss prison lasagna."

steveklabnik•2w ago
What are the “borrow checker logs” in this context?
reutinger•2w ago
Hi Steve- honored to see you here! (I’m practically using your book to reverse-engineer what the AI wrote ).

To be precise with my terminology: I showed the forensic expert the terminal history and compiler output in my VS Code/Cursor logs.

Because I was 'vibe coding' with LLMs, I had a long scrollback of cargo build failing repeatedly with ownership/borrow errors. 'Chris' (the forensic expert) reviewed that timestamped history to verify that I was genuinely struggling to compile a harmless display driver in a hotel room that morning, rather than deploying a pre-compiled malicious payload.

His logic was essentially: 'A terrorist brings a clean binary. A developer brings a terminal full of red text.' The broken build state was my alibi.

steveklabnik•2w ago
Ah, that makes sense, I was just confused because I don't think of the borrow checker as producing logs, but the terminal output is a great thing to show someone, yeah.
KomoD•2w ago
So it wasn't really the firmware but the hardware that they thought looked suspicious and the fact that you placed a black box in a hotel restaurant and walked away. Especially suspicious since WEF guests were staying there.

Thread for those who don't have an account: https://xcancel.com/s_heyneman/status/2014519007244656652

ggm•2w ago
Based on what this looks like, I don't really feel surprised at the outcome.

Based on what security is meant to do, Likewise.

Based on the lack of (apparent) self awareness of the author, I think I'd expect a little better of somebody using a device as a pitch-deck to the wealthy in a location of heightened security.

Is it security pantomime? yes. What did the OP expect? Is the OP really as naieve as they are saying? Was this not forseen/forseeable?

Being wise after the event means being wise. Does anyone else reading this think the OP was not wise?

defrost•2w ago
It's pretty straightforward, if it looks like a bomb, it gets treated like it might be a bomb.

If it looks like Osama bin Laden attending a War on Terror summit ... they'll wave it right through.

* https://www.theguardian.com/tv-and-radio/2020/jan/20/how-the...

Not an especially wise move if unintended, and a precarious risk if intended fpr the drama.

I'm thinking my personal best time getting grilled over a suspected security issue runs to 36 hours or so .. hard to tell in retrospect, the US TLA bods do like their blinken lights and screeching music to mess with peoples internal clocks.

reutinger•2w ago
36 hours? You win. I bow to the master.

You are absolutely right about the optics (and the blinkin' lights). The forensic expert made the same point—unintended drama is still drama. I definitely didn't aim for this (just wanted to demo the hardware), but once the process started, I had to respect the thoroughness. Their protocols are no joke.

defrost•2w ago
I travelled globally a lot for work, many borders and often laden with many trunks of equipment - getting stopped for inspections, often driven by curiousity, was par for the course.

The grilling by US security types was a "feature" of crossing any US controlled border space for a number of years after this: https://news.ycombinator.com/item?id=46597539 in 1998.

You spend one month at ground zero for 11 nuclear tests that caught most of the five eyes by suprise and that's all they ever seem to ask about forever.

reutinger•2w ago
11 nuclear tests? I officially surrender the title. My 13 hours over a breadboard feels very quaint by comparison.

It is fascinating to see the evolution of the 'threat signature,' though. You were flagged for proximity to literal nuclear physics in 1998; I was flagged for a vibe-coded prototype that just looked like physics in 2026.

I have a sinking feeling that, like you, I've just unlocked the 'secondary screening' achievement for the next decade. I’ll take the permanent Swiss police record over the Five Eyes watchlist any day. You win.

defrost•2w ago
The world's an interesting place, bang in the middle of the period of getting routinely stopped crossing US spaces I was seperately contracted to them (US DoD) to do similar work in other parts of the world.

Seperately again some nice people in Finland gave us some really nice SAKO TRG's and spotting scopes in return for being the fastest to find some drums of waste they hid in a forest.

My father (still alive) is a few years older than M.J., they grew up together, being from the same part of the same state .. so it was handy having them going to bat for us when faecal matter contacted propellers ( https://en.wikipedia.org/wiki/Michael_Jeffery ).

reutinger•2w ago
I’ll accept the 'naive' label on this one.

I’ve walked around SF and NYC with prototypes for years without issue. I genuinely failed to code-switch for the environment. I expected a bag search; I didn't expect a 13-hour detention and a forensic code audit.

It felt like 'pantomime' at first, but once the forensic team arrived, it became very real. They weren't performing theater; they were genuinely verifying the interrupt handlers in the code.

reutinger•2w ago
I want to clarify the 'walking away' part: I was standing about 10 feet away at the reception desk, so I hadn't abandoned it—but I wasn't holding it.

That said, your point is the correct one. In a normal setting, leaving a bag near your table while you check in is fine. In a high-security zone during WEF, placing a black box with wires on a bench is a massive red flag. I treated it like a backpack; they treated it like a potential threat. It was a hard lesson in situational awareness.

1970-01-01•2w ago
No props. You can't do that. It looks like a bomb.

https://en.wikipedia.org/wiki/Ahmed_Mohamed_clock_incident

reutinger•2w ago
Fair point on the optics. In hindsight, clear casing would have been the smart play for 2026.

That said, the scrutiny shifted quickly from the 'black box' visual to the actual tech. It wasn't just a physical inspection; they brought in a forensic expert to audit the Rust borrow checker logs and interrupt handlers to verify the triggers were benign. It turned into a very technical interview, just with higher stakes.

bigfatkitten•2w ago
If anything, the Swiss authorities should be commended for their effective and proportionate response.
reutinger•2w ago
100% agreed.

They were incredibly professional. Once we moved past the initial 'threat assessment' phase, the officers and the forensic expert were fair, logical, and treated me well. The system worked exactly as it should for a suspicious package in a high-security zone.