Hacker News

Latest

UK Biobank leak: Health details of 500 000 people are offered for sale

2026-04-24 @ 11:09:36Points: 124Comments: 44

Hear your agent suffer through your code

2026-04-24 @ 10:58:45Points: 40Comments: 14

How to be anti-social – a guide to incoherent and isolating social experiences

2026-04-24 @ 10:48:14Points: 92Comments: 71

nowhere: an entire website encoded in a URL

2026-04-24 @ 10:44:09Points: 67Comments: 48

Mounting tar archives as a filesystem in WebAssembly

2026-04-24 @ 10:13:26Points: 31Comments: 4

S. Korea police arrest man over AI image of runaway wolf that misled authorities

2026-04-24 @ 09:17:57Points: 151Comments: 86

Spinel: Ruby AOT Native Compiler

2026-04-24 @ 08:28:47Points: 126Comments: 28

Composition Shouldn't be this Hard

2026-04-24 @ 07:22:31Points: 86Comments: 59

Show HN: How LLMs Work – Interactive visual guide based on Karpathy's lecture

2026-04-24 @ 06:48:53Points: 122Comments: 29

All content is based on Andrej Karpathy's "Intro to Large Language Models" lecture (youtube.com/watch?v=7xTGNNLPyMI). I downloaded the transcript and used Claude Code to generate the entire interactive site from it — single HTML file. I find it useful to revisit this content time to time.

Show HN: Gova – The declarative GUI framework for Go

2026-04-24 @ 06:16:47Points: 70Comments: 14

Familiarity is the enemy: On why Enterprise systems have failed for 60 years

2026-04-24 @ 04:48:54Points: 66Comments: 33

Habitual coffee intake shapes the microbiome, modifies physiology and cognition

2026-04-24 @ 04:04:42Points: 197Comments: 143

DeepSeek v4

2026-04-24 @ 03:01:21Points: 1249Comments: 885

Why I Write (1946)

2026-04-24 @ 02:26:23Points: 206Comments: 50

Show HN: Tolaria – Open-source macOS app to manage Markdown knowledge bases

2026-04-23 @ 22:01:59Points: 236Comments: 98

https://refactoring.fm/ and I built Tolaria for myself to manage my own knowledge base (10K notes, 300+ articles written in over 6 years of newslettering) and work well with AI.

Tolaria is offline-first, file-based, has first-class support for git, and has strong opinions about how you should organize notes (types, relationships, etc).

Let me know your thoughts!

US special forces soldier arrested after allegedly winning $400k on Maduro raid

2026-04-23 @ 21:56:15Points: 366Comments: 410

TorchTPU: Running PyTorch Natively on TPUs at Google Scale

2026-04-23 @ 20:53:27Points: 159Comments: 14

Using the internet like it's 1999

2026-04-23 @ 20:14:29Points: 183Comments: 124

Meta tells staff it will cut 10% of jobs

2026-04-23 @ 18:55:32Points: 668Comments: 642

Astronomers find the edge of the Milky Way

2026-04-23 @ 18:11:29Points: 136Comments: 38

GPT-5.5

2026-04-23 @ 18:01:39Points: 1424Comments: 947

An update on recent Claude Code quality reports

2026-04-23 @ 17:48:38Points: 791Comments: 611

MeshCore development team splits over trademark dispute and AI-generated code

2026-04-23 @ 16:55:13Points: 239Comments: 127

My phone replaced a brass plug

2026-04-23 @ 16:27:07Points: 159Comments: 39

Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign

2026-04-23 @ 14:17:08Points: 798Comments: 381

UK Biobank health data keeps ending up on GitHub

2026-04-23 @ 13:58:03Points: 165Comments: 40

The exposure of Biobank data on GitHub is the latest in a long series of governance challenges for UK Biobank. (My colleague and I have an editorial in the BMJ about this: http://bmj.com/cgi/content/full/bmj.s660?ijkey=dEot4dJZGZGXe...). The latest is today, with information of all half a million members listed for sale on Alibaba.

Looking at the takedown notices, we often see specific files being targeted rather than entire repositories (possibly to justify the copyright infringement as required for a takedown notice, not a copyright expert; although it is clear that they only use DMCA notices as a last resort, for GitHub users they cannot identify, and who were likely not given access in the first place). A quarter of the files are genetic/genomics. Tabular data account for another large share and could contain phenotype or health records.

Show HN: Honker – Postgres NOTIFY/LISTEN Semantics for SQLite

2026-04-23 @ 11:53:11Points: 276Comments: 68

Alberta startup sells no-tech tractors for half price

2026-04-22 @ 16:29:25Points: 2223Comments: 750

Show HN: Agent Vault – Open-source credential proxy and vault for agents

2026-04-22 @ 16:25:28Points: 119Comments: 40

https://github.com/Infisical/agent-vault, and there's an in-depth description at https://infisical.com/blog/agent-vault-the-open-source-crede....

We built Agent Vault in response to a question that been plaguing the industry: How do we give agents secure access to services without them reading any secrets?

Most teams building agents have run into this exact problem: They build an agent or agentic system and come to realize at some point that it needs credentials in order to access any services. The issue is that agents, unlike traditional workloads, are non-deterministic, highly-prone to prompt injection, and thus can easily be manipulated to leaking the credentials that they need to operate. This is the problem of credential exfiltration (not to be confused with data exfiltration).

In response to this, some teams we've seen have implemented basic guardrails and security controls to mitigate this risk in their agentic environments including using short-lived access tokens. The more advanced teams have started to converge toward a pattern: credential brokering, the idea being to separate agents from their credentials through some form of egress proxy. In this model, the agent makes a request to a proxy that attaches a credential onto it and brokers it through to the target service. This proxy approach is actually used in Anthropic's Managed Agents architecture blog with it being that "the harness is never made aware of the credentials." We've seen similar credential brokering schemes come out from Vercel and in Cloudflare's latest Outbound Workers.

Seeing all this made us think: What if we could create a portable credential brokering service plugged seamlessly into agents' existing workflows in an interface agnostic way, meaning that agents could continue to work with APIs, CLIs, SDKs, MCPs without interference and get the security of credential brokering.

This led to Agent Vault - an open source HTTP credential proxy and vault that we're building for AI agents. You can deploy this as a dedicated service and set up your agent's environment to proxy requests through it. Note that in a full deployment, you do need to lock down the network so that all outbound traffic is forced through Agent Vault

The Agent Vault (AV) implementation has a few interesting design decisions:

- Local Forward Proxy: AV chooses an interface agnostic approach to credential brokering by following a MITM architecture using HTTPS_PROXY as an environment variable set in the agent's environment to redirect traffic through it; this also means that it runs its own CA whose certificate must be configured on the client's trust store.

- MITM architecture: Since AV terminates TLS in order to do credential brokering its able to inspect traffic and apply rules to it before establishing a new TLS connection upstream. This makes it a great to be able to extend AV to incorporate firewall-like features to be applied at this proxy layer.

- Portable: AV itself is a single Go binary that bundles a server and the CLI; it can be deployed as a Docker container as well. In practice, this means that you can self-host AV on your own infrastructure and it should work more universally than provider specific approaches like that of Vercel and Cloudflare.

While the preliminary design of Agent Vault is a bit clunky to work with and we’d wished to have more time to smoothen the developer experience around it, particularly around the configuration setup for agents to start proxying requests through it, we figured it would be best to open source the technology and work with the community to make gradual improvements for it to work seamlessly across all agentic use cases since each has its own nuances.

All in all, we believe credential brokering is the right next step for how secrets management should be done for agents and would love to hear your views, questions, feedback!

A programmable watch you can actually wear

2026-04-21 @ 08:52:33Points: 199Comments: 94

Archives

2026

2025

2024

2023

2022