How to effectively write quality code with AI
3 by i5heu | 0 comments on Hacker News.
top story news
top story haker news new yourk tims
Ad
Friday, 6 February 2026
New top story on Hacker News: Show HN: Daily-updated database of malicious browser extensions
Show HN: Daily-updated database of malicious browser extensions
7 by toborrm9 | 3 comments on Hacker News.
Hey HN, I built an automated system that tracks malicious Chrome/Edge extensions daily. The database updates automatically by monitoring chrome-stats for removed extensions and scanning security blogs. Currently tracking 1000+ known malicious extensions with extension IDs, names, and dates. I'm working on detection tools (GUI + CLI) to scan locally installed extensions against this database, but wanted to share the raw data first since maintained threat intelligence lists like this are hard to find. The automation runs 24/7 and pushes updates to GitHub. Free to use for research, integration into security tools, or whatever you need. Happy to answer questions about the scraping approach or data collection methods.
7 by toborrm9 | 3 comments on Hacker News.
Hey HN, I built an automated system that tracks malicious Chrome/Edge extensions daily. The database updates automatically by monitoring chrome-stats for removed extensions and scanning security blogs. Currently tracking 1000+ known malicious extensions with extension IDs, names, and dates. I'm working on detection tools (GUI + CLI) to scan locally installed extensions against this database, but wanted to share the raw data first since maintained threat intelligence lists like this are hard to find. The automation runs 24/7 and pushes updates to GitHub. Free to use for research, integration into security tools, or whatever you need. Happy to answer questions about the scraping approach or data collection methods.
Thursday, 5 February 2026
New top story on Hacker News: Claude Code Agent Teams
Wednesday, 4 February 2026
New top story on Hacker News: AI needs to augment rather than replace humans or the workplace is doomed
AI needs to augment rather than replace humans or the workplace is doomed
35 by PaulHoule | 7 comments on Hacker News.
35 by PaulHoule | 7 comments on Hacker News.
New top story on Hacker News: Arcan-A12: Weaving a Different Web
Tuesday, 3 February 2026
New top story on Hacker News: Show HN: PII-Shield – Log Sanitization Sidecar with JSON Integrity (Go, Entropy)
Show HN: PII-Shield – Log Sanitization Sidecar with JSON Integrity (Go, Entropy)
5 by aragoss | 0 comments on Hacker News.
What PII-Shield does: It's a K8s sidecar (or CLI tool) that pipes application logs, detects secrets using Shannon entropy (catching unknown keys like "sk-live-..." without predefined patterns), and redacts them deterministically using HMAC. Why deterministic? So that "pass123" always hashes to the same "[HIDDEN:a1b2c]", allowing QA/Devs to correlate errors without seeing the raw data. Key features: 1. JSON Integrity: It parses JSON, sanitizes values, and rebuilds it. It guarantees valid JSON output for your SIEM (ELK/Datadog). 2. Entropy Detection: Uses context-aware entropy analysis to catch high-randomness strings. 3. Fail-Open: Designed as a transparent pipe wrapper to preserve app uptime. The project is open-source (Apache 2.0). Repo: https://ift.tt/7GJU65M Docs: https://pii-shield.gitbook.io/docs/ I'd love your feedback on the entropy/threshold logic!
5 by aragoss | 0 comments on Hacker News.
What PII-Shield does: It's a K8s sidecar (or CLI tool) that pipes application logs, detects secrets using Shannon entropy (catching unknown keys like "sk-live-..." without predefined patterns), and redacts them deterministically using HMAC. Why deterministic? So that "pass123" always hashes to the same "[HIDDEN:a1b2c]", allowing QA/Devs to correlate errors without seeing the raw data. Key features: 1. JSON Integrity: It parses JSON, sanitizes values, and rebuilds it. It guarantees valid JSON output for your SIEM (ELK/Datadog). 2. Entropy Detection: Uses context-aware entropy analysis to catch high-randomness strings. 3. Fail-Open: Designed as a transparent pipe wrapper to preserve app uptime. The project is open-source (Apache 2.0). Repo: https://ift.tt/7GJU65M Docs: https://pii-shield.gitbook.io/docs/ I'd love your feedback on the entropy/threshold logic!
Monday, 2 February 2026
Sunday, 1 February 2026
New top story on Hacker News: Apple: Our philosophy is to provide software for our machines free (1976)
Apple: Our philosophy is to provide software for our machines free (1976)
47 by janandonly | 20 comments on Hacker News.
47 by janandonly | 20 comments on Hacker News.
Saturday, 31 January 2026
New top story on Hacker News: Bitcoin Looks Set for Longest Monthly Losing Streak Since 2018
Bitcoin Looks Set for Longest Monthly Losing Streak Since 2018
33 by 1vuio0pswjnm7 | 16 comments on Hacker News.
33 by 1vuio0pswjnm7 | 16 comments on Hacker News.
Friday, 30 January 2026
Thursday, 29 January 2026
New top story on Hacker News: AI's Impact on Engineering Jobs May Be Different Than Expected
AI's Impact on Engineering Jobs May Be Different Than Expected
29 by rbanffy | 22 comments on Hacker News.
29 by rbanffy | 22 comments on Hacker News.
Wednesday, 28 January 2026
New top story on Hacker News: Android's full desktop interface leaks: New status bar, Chrome Extensions
Android's full desktop interface leaks: New status bar, Chrome Extensions
39 by thunderbong | 33 comments on Hacker News.
39 by thunderbong | 33 comments on Hacker News.
Tuesday, 27 January 2026
New top story on Hacker News: A few random notes from Claude coding quite a bit last few weeks
A few random notes from Claude coding quite a bit last few weeks
51 by bigwheels | 65 comments on Hacker News.
https://ift.tt/UtB7DnJ
51 by bigwheels | 65 comments on Hacker News.
https://ift.tt/UtB7DnJ
Subscribe to:
Comments (Atom)