Eight More Months of Agents
10 by arrowsmith | 2 comments on Hacker News.
top story news
top story haker news new yourk tims
Ad
Monday, 9 February 2026
Sunday, 8 February 2026
New top story on Hacker News: Show HN: I created a Mars colony RPG based on Kim Stanley Robinson's Mars books
Show HN: I created a Mars colony RPG based on Kim Stanley Robinson's Mars books
25 by ariaalam | 4 comments on Hacker News.
25 by ariaalam | 4 comments on Hacker News.
Saturday, 7 February 2026
New top story on Hacker News: SectorC: A C Compiler in 512 bytes
New top story on Hacker News: U.S. Jobs Disappear at Fastest January Pace Since Great Recession
U.S. Jobs Disappear at Fastest January Pace Since Great Recession
42 by alephnerd | 14 comments on Hacker News.
42 by alephnerd | 14 comments on Hacker News.
Friday, 6 February 2026
New top story on Hacker News: Show HN: Daily-updated database of malicious browser extensions
Show HN: Daily-updated database of malicious browser extensions
7 by toborrm9 | 3 comments on Hacker News.
Hey HN, I built an automated system that tracks malicious Chrome/Edge extensions daily. The database updates automatically by monitoring chrome-stats for removed extensions and scanning security blogs. Currently tracking 1000+ known malicious extensions with extension IDs, names, and dates. I'm working on detection tools (GUI + CLI) to scan locally installed extensions against this database, but wanted to share the raw data first since maintained threat intelligence lists like this are hard to find. The automation runs 24/7 and pushes updates to GitHub. Free to use for research, integration into security tools, or whatever you need. Happy to answer questions about the scraping approach or data collection methods.
7 by toborrm9 | 3 comments on Hacker News.
Hey HN, I built an automated system that tracks malicious Chrome/Edge extensions daily. The database updates automatically by monitoring chrome-stats for removed extensions and scanning security blogs. Currently tracking 1000+ known malicious extensions with extension IDs, names, and dates. I'm working on detection tools (GUI + CLI) to scan locally installed extensions against this database, but wanted to share the raw data first since maintained threat intelligence lists like this are hard to find. The automation runs 24/7 and pushes updates to GitHub. Free to use for research, integration into security tools, or whatever you need. Happy to answer questions about the scraping approach or data collection methods.
Thursday, 5 February 2026
New top story on Hacker News: Claude Code Agent Teams
Wednesday, 4 February 2026
New top story on Hacker News: AI needs to augment rather than replace humans or the workplace is doomed
AI needs to augment rather than replace humans or the workplace is doomed
35 by PaulHoule | 7 comments on Hacker News.
35 by PaulHoule | 7 comments on Hacker News.
New top story on Hacker News: Arcan-A12: Weaving a Different Web
Tuesday, 3 February 2026
New top story on Hacker News: Show HN: PII-Shield – Log Sanitization Sidecar with JSON Integrity (Go, Entropy)
Show HN: PII-Shield – Log Sanitization Sidecar with JSON Integrity (Go, Entropy)
5 by aragoss | 0 comments on Hacker News.
What PII-Shield does: It's a K8s sidecar (or CLI tool) that pipes application logs, detects secrets using Shannon entropy (catching unknown keys like "sk-live-..." without predefined patterns), and redacts them deterministically using HMAC. Why deterministic? So that "pass123" always hashes to the same "[HIDDEN:a1b2c]", allowing QA/Devs to correlate errors without seeing the raw data. Key features: 1. JSON Integrity: It parses JSON, sanitizes values, and rebuilds it. It guarantees valid JSON output for your SIEM (ELK/Datadog). 2. Entropy Detection: Uses context-aware entropy analysis to catch high-randomness strings. 3. Fail-Open: Designed as a transparent pipe wrapper to preserve app uptime. The project is open-source (Apache 2.0). Repo: https://ift.tt/7GJU65M Docs: https://pii-shield.gitbook.io/docs/ I'd love your feedback on the entropy/threshold logic!
5 by aragoss | 0 comments on Hacker News.
What PII-Shield does: It's a K8s sidecar (or CLI tool) that pipes application logs, detects secrets using Shannon entropy (catching unknown keys like "sk-live-..." without predefined patterns), and redacts them deterministically using HMAC. Why deterministic? So that "pass123" always hashes to the same "[HIDDEN:a1b2c]", allowing QA/Devs to correlate errors without seeing the raw data. Key features: 1. JSON Integrity: It parses JSON, sanitizes values, and rebuilds it. It guarantees valid JSON output for your SIEM (ELK/Datadog). 2. Entropy Detection: Uses context-aware entropy analysis to catch high-randomness strings. 3. Fail-Open: Designed as a transparent pipe wrapper to preserve app uptime. The project is open-source (Apache 2.0). Repo: https://ift.tt/7GJU65M Docs: https://pii-shield.gitbook.io/docs/ I'd love your feedback on the entropy/threshold logic!
Monday, 2 February 2026
Sunday, 1 February 2026
New top story on Hacker News: Apple: Our philosophy is to provide software for our machines free (1976)
Apple: Our philosophy is to provide software for our machines free (1976)
47 by janandonly | 20 comments on Hacker News.
47 by janandonly | 20 comments on Hacker News.
Subscribe to:
Comments (Atom)