frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Show HN: kitty-graphics.el – Images, LaTeX and PDFs in terminal Emacs

https://github.com/cashmeredev/kitty-graphics.el
3•cashmere1337•2h ago•1 comments

Show HN: How I topped the HuggingFace open LLM leaderboard on two gaming GPUs

https://dnhkng.github.io/posts/rys/
389•dnhkng•21h ago•103 comments

Show HN: Joha – a free browser-based drawing playground with preset shape tools

https://joha-app.pages.dev/
10•smlee•3d ago•2 comments

Show HN: DD Photos – open-source photo album site generator (Go and SvelteKit)

https://github.com/dougdonohoe/ddphotos
62•dougdonohoe•21h ago•19 comments

Show HN: Modulus – Cross-repository knowledge orchestration for coding agents

https://modulus.so
10•dasubhajit•15h ago•4 comments

Show HN: Ash, an Agent Sandbox for Mac

https://ashell.dev
9•amsha•19h ago•8 comments

Show HN: I Was Here – Draw on street view, others can find your drawings

https://washere.live
61•mrktsm__•1d ago•44 comments

Show HN: CryptoFlora – Visualize SHA256 to a flower using Rose curves

https://crypto-flora.tonytonyjan.net/
2•tonytonyjan•6h ago•1 comments

Show HN: Claude Code Token Elo

https://www.clauderank.com
7•ymaws•1d ago•5 comments

Show HN: The Mog Programming Language

https://moglang.org
162•belisarius222•1d ago•76 comments

Show HN: 2D RPG base game client recreated in modern HTML5 game engine with AI

https://github.com/ErkoKnoll/helbreath-base-game
5•erkok•14h ago•3 comments

Show HN: Remotely use my guitar tuner

https://realtuner.online/
251•smith-kyle•4d ago•59 comments

Show HN: A modern React onboarding tour library

https://github.com/btahir/react-tourlight
11•bilater•18h ago•2 comments

Show HN: A playable version of the Claude Code Terraform destroy incident

https://www.youbrokeprod.com
22•cdnsteve•20h ago•9 comments

Show HN: DenchClaw – Local CRM on Top of OpenClaw

https://github.com/DenchHQ/DenchClaw
140•kumar_abhirup•1d ago•124 comments

Show HN: VS Code Agent Kanban: Task Management for the AI-Assisted Developer

https://www.appsoftware.com/blog/introducing-vs-code-agent-kanban-task-management-for-the-ai-assi...
95•gbro3n•2d ago•50 comments

Show HN: Readhn – AI-Native Hacker News MCP Server (Discover, Trust, Understand)

https://github.com/xodn348/readhn
2•xodn348•9h ago•2 comments

Show HN: A retention mechanic for learning that isn't Duolingo manipulation?

https://www.dailylabs.co/
6•aidanadd•1d ago•4 comments

Show HN: Satellite imagery object detection using text prompts

https://www.useful-ai-tools.com/tools/satellite-analysis-demo/
7•eyasu6464•2d ago•3 comments

Show HN: Skir – like Protocol Buffer but better

https://skir.build/
111•gepheum•2d ago•65 comments

Show HN: What's my JND? – a colour guessing game

https://www.keithcirkel.co.uk/whats-my-jnd/?r=ARUjKP__-ve-
42•Keithamus•1d ago•41 comments

Show HN: I built a real-time OSINT dashboard pulling 15 live global feeds

https://github.com/BigBodyCobain/Shadowbroker
305•vancecookcobxin•2d ago•122 comments

Show HN: Draxl, agent-native source code with stable AST node IDs

https://github.com/draxl-org/draxl
4•rndhouse•13h ago•0 comments

Show HN: Hopalong Attractor. An old classic with a new perspective in 3D

https://github.com/ratwolfzero/hopalong_python
24•ratwolf•4d ago•2 comments

Show HN: I built a site where strangers leave kind voice notes for each other

https://kindvoicenotes.com
57•thepaulthomson•2d ago•38 comments

Show HN: KaraMagic – automatic karaoke video maker

https://karamagic.com/
2•godot•14h ago•0 comments

SHOW HN: A usage circuit breaker for Cloudflare Workers

17•ethan_zhao•21h ago•7 comments

Show HN: Don't share code. Share the prompt

https://openprompthub.com/#
2•jacomoRodriguez•15h ago•1 comments

Show HN: Eyot, A programming language where the GPU is just another thread

https://cowleyforniastudios.com/2026/03/08/announcing-eyot/
78•steeleduncan•2d ago•18 comments

Show HN: Agentic Data Analysis with Claude Code

https://rubenflamshepherd.com/articles/2026-03-09-agentic-data-analysis-with-claude-code
5•rubenflamshep•18h ago•0 comments
Open in hackernews

Show HN: Agentcheck – Check what an AI agent can access before you run it

https://github.com/Pringled/agentcheck
4•Bibabomas•2d ago
Hey HN! I've just open-sourced agentcheck, a fast, read-only CLI tool that scans your shell and reports what an AI agent could access: cloud IAM credentials, API keys, Kubernetes contexts, local tools, and more.

Main features:

- Broad coverage: scans AWS, GCP, Azure, 100+ API key environment variables and credential files, Kubernetes, Docker, SSH keys, Terraform configs, and .env files

- Severity levels: every finding is tagged LOW, MODERATE, HIGH, or CRITICAL so you know what actually matters

- CI/CD integration: run agentcheck --ci to fail a pipeline if findings exceed a configurable threshold, with JSON and Markdown output for automation

- Configurable: extend it with your own env vars, credential files, and CLI tool checks via a config file

When you hand a shell to an AI agent, it inherits everything in that environment: cloud credentials, API keys, SSH keys, kubectl contexts. That's often more access than you'd consciously grant, and it’s hard to keep track of what permissions your user account actually has. Agentcheck makes that surface area visible before you run the agent.

It’s a single Go binary, no dependencies. Install with Homebrew:

brew install Pringled/tap/agentcheck

Code: github.com/Pringled/agentcheck

Let me know if you have any feedback!

Comments

matrixgard•2d ago
Running an AI agent with whatever credentials happen to be in the shell is basically the same mistake as running your app as root — feels fine until the agent makes a bad decision or gets manipulated. On a typical dev machine that's a personal AWS profile with admin access; on prod it's usually whatever the CI service account can touch, which is often a lot more than it should be.

The CI integration is the piece I'd actually lean on first. Most teams I've seen think about agent access controls after they've already deployed, at which point you're doing cleanup instead of prevention. Gating it in the pipeline means the access question gets answered before the agent is running against your Terraform state and live kube contexts.

Are you seeing any patterns in severity distribution — mostly cloud creds coming up critical, or are the kube context exposures landing higher than expected?