Hacker News

Latest

How the Tech World Turned Evil

2026-04-23 @ 20:48:55Points: 69Comments: 14

Using the internet like it's 1999

2026-04-23 @ 20:14:29Points: 77Comments: 48

Girl, 10, finds rare Mexican axolotl under Welsh bridge

2026-04-23 @ 19:09:40Points: 149Comments: 101

Meta to cut 10% of jobs

2026-04-23 @ 18:55:32Points: 365Comments: 328

GPT-5.5: Mythos-Like Hacking, Open to All

2026-04-23 @ 18:16:55Points: 32Comments: 7

Astronomers find the edge of the Milky Way

2026-04-23 @ 18:11:29Points: 62Comments: 11

GPT-5.5

2026-04-23 @ 18:01:39Points: 936Comments: 579

An update on recent Claude Code quality reports

2026-04-23 @ 17:48:38Points: 491Comments: 367

Palantir employees are starting to wonder if they're the bad guys

2026-04-23 @ 17:30:05Points: 591Comments: 418

MeshCore development team splits over trademark dispute and AI-generated code

2026-04-23 @ 16:55:13Points: 125Comments: 68

My phone replaced a brass plug

2026-04-23 @ 16:27:07Points: 50Comments: 7

Incident with multple GitHub services

2026-04-23 @ 16:21:55Points: 179Comments: 90

If America's so rich, how'd it get so sad?

2026-04-23 @ 16:05:30Points: 379Comments: 694

French government agency confirms breach as hacker offers to sell data

2026-04-23 @ 15:59:55Points: 339Comments: 120

Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign

2026-04-23 @ 14:17:08Points: 581Comments: 271

UK Biobank health data keeps ending up on GitHub

2026-04-23 @ 13:58:03Points: 44Comments: 12

The exposure of Biobank data on GitHub is the latest in a long series of governance challenges for UK Biobank. (My colleague and I have an editorial in the BMJ about this: http://bmj.com/cgi/content/full/bmj.s660?ijkey=dEot4dJZGZGXe...). The latest is today, with information of all half a million members listed for sale on Alibaba.

Looking at the takedown notices, we often see specific files being targeted rather than entire repositories (possibly to justify the copyright infringement as required for a takedown notice, not a copyright expert; although it is clear that they only use DMCA notices as a last resort, for GitHub users they cannot identify, and who were likely not given access in the first place). A quarter of the files are genetic/genomics. Tabular data account for another large share and could contain phenotype or health records.

I spent years trying to make CSS states predictable

2026-04-23 @ 12:37:18Points: 38Comments: 6

Jiga (YC W21) Is Hiring

2026-04-23 @ 12:02:44Points: 1

Show HN: Honker – Postgres NOTIFY/LISTEN Semantics for SQLite

2026-04-23 @ 11:53:11Points: 217Comments: 50

Writing a C Compiler, in Zig (2025)

2026-04-23 @ 09:20:47Points: 125Comments: 36

I am building a cloud

2026-04-23 @ 04:44:19Points: 947Comments: 468

Arch Linux Now Has a Bit-for-Bit Reproducible Docker Image

2026-04-23 @ 01:59:08Points: 288Comments: 102

Apple fixes bug that cops used to extract deleted chat messages from iPhones

2026-04-22 @ 20:27:31Points: 839Comments: 181

Alberta startup sells no-tech tractors for half price

2026-04-22 @ 16:29:25Points: 2126Comments: 729

Show HN: Agent Vault – Open-source credential proxy and vault for agents

2026-04-22 @ 16:25:28Points: 42Comments: 8

https://github.com/Infisical/agent-vault, and there's an in-depth description at https://infisical.com/blog/agent-vault-the-open-source-crede....

We built Agent Vault in response to a question that been plaguing the industry: How do we give agents secure access to services without them reading any secrets?

Most teams building agents have run into this exact problem: They build an agent or agentic system and come to realize at some point that it needs credentials in order to access any services. The issue is that agents, unlike traditional workloads, are non-deterministic, highly-prone to prompt injection, and thus can easily be manipulated to leaking the credentials that they need to operate. This is the problem of credential exfiltration (not to be confused with data exfiltration).

In response to this, some teams we've seen have implemented basic guardrails and security controls to mitigate this risk in their agentic environments including using short-lived access tokens. The more advanced teams have started to converge toward a pattern: credential brokering, the idea being to separate agents from their credentials through some form of egress proxy. In this model, the agent makes a request to a proxy that attaches a credential onto it and brokers it through to the target service. This proxy approach is actually used in Anthropic's Managed Agents architecture blog with it being that "the harness is never made aware of the credentials." We've seen similar credential brokering schemes come out from Vercel and in Cloudflare's latest Outbound Workers.

Seeing all this made us think: What if we could create a portable credential brokering service plugged seamlessly into agents' existing workflows in an interface agnostic way, meaning that agents could continue to work with APIs, CLIs, SDKs, MCPs without interference and get the security of credential brokering.

This led to Agent Vault - an open source HTTP credential proxy and vault that we're building for AI agents. You can deploy this as a dedicated service and set up your agent's environment to proxy requests through it. Note that in a full deployment, you do need to lock down the network so that all outbound traffic is forced through Agent Vault

The Agent Vault (AV) implementation has a few interesting design decisions: Local Forward Proxy: AV chooses an interface agnostic approach to credential brokering by following a MITM architecture using HTTPS_PROXY as an environment variable set in the agent's environment to redirect traffic through it; this also means that it runs its own CA whose certificate must be configured on the client's trust store. MITM architecture: Since AV terminates TLS in order to do credential brokering its able to inspect traffic and apply rules to it before establishing a new TLS connection upstream. This makes it a great to be able to extend AV to incorporate firewall-like features to be applied at this proxy layer. Portable: AV itself is a single Go binary that bundles a server and the CLI; it can be deployed as a Docker container as well. In practice, this means that you can self-host AV on your own infrastructure and it should work more universally than provider specific approaches like that of Vercel and Cloudflare. While the preliminary design of Agent Vault is a bit clunky to work with and we’d wished to have more time to smoothen the developer experience around it, particularly around the configuration setup for agents to start proxying requests through it, we figured it would be best to open source the technology and work with the community to make gradual improvements for it to work seamlessly across all agentic use cases since each has its own nuances.

All in all, we believe credential brokering is the right next step for how secrets management should be done for agents and would love to hear your views, questions, feedback!

WireGuard for Windows Reaches v1.0

2026-04-21 @ 21:26:25Points: 77Comments: 3

Advanced Packaging Limits Come into Focus

2026-04-21 @ 14:50:40Points: 24Comments: 3

A Renaissance gambling dispute spawned probability theory

2026-04-21 @ 12:59:59Points: 91Comments: 13

Your hex editor should color-code bytes

2026-04-21 @ 09:52:09Points: 472Comments: 137

A programmable watch you can actually wear

2026-04-21 @ 08:52:33Points: 116Comments: 61

Archives

2026

2025

2024

2023

2022