Wednesday, September 3, 2025

Show HN: Listgitfiles.sh – Fetch Raw GitHub File URLs with One Command https://ift.tt/D68Q5yo

Show HN: Listgitfiles.sh – Fetch Raw GitHub File URLs with One Command I wrote this script to quickly retrieve raw file URLs from public GitHub repos. Added to my ~/.zshrc, it’s now a fast, reliable tool in my caveman workflow. Maybe you'll find use for it too! Have a great rest of your day, everyone! https://gist.github.com/rmtbb/d55638e758ad656eb40741dd60a39e5f September 4, 2025 at 02:28AM

Show HN: A unified approach to compute sandboxes https://ift.tt/7ludxwV

Show HN: A unified approach to compute sandboxes https://ift.tt/tjsG8ZW September 4, 2025 at 12:14AM

Show HN: Trending rust NTP inspection CLI https://ift.tt/7e4Tx2M

Show HN: Trending rust NTP inspection CLI Hi y’all, Just came across a crate on crates.io that recently hit v1.0.0. It’s called rkik - basically a "dig for NTP". I hadn’t seen a tool like this in Rust before. Looks pretty handy: it can query and compare NTP servers, output JSON for monitoring, and even run continuous checks. Seems to be getting some traction in the Rust community - might be worth a look if you’re into System administration, networking or DevOps. https://ift.tt/68TnlaZ September 3, 2025 at 11:19PM

Tuesday, September 2, 2025

Show HN: Provably secure vibe coding is now a thing https://ift.tt/RGUOeWD

Show HN: Provably secure vibe coding is now a thing Don't get your knickers in a knot. We were surprised too. We are the team behind TideCloak which we shared on HN previously ( https://ift.tt/4s9OudZ ). This time we ran an experiment. What happens when you apply a fundamentally different security model to the worst possible development process? Behold... SecureAF https://ift.tt/wlD1Tzg Build video 6 mins https://youtu.be/tx5MsJ3jeQw The code and UI are questionable and the quality assurance is non-existent. But the security model holds by treating even us as malicious, keeping authority over data out of reach for everyone except the rightful user. Can you actually use SecureAF? Hell no. We built it in 20 minutes and never tested it. What's wrong with you? What you reckon? https://ift.tt/wlD1Tzg September 3, 2025 at 12:56AM

Show HN: Unity WebGL Playground https://ift.tt/rPqfzBp

Show HN: Unity WebGL Playground https://ift.tt/vSm0koO September 2, 2025 at 11:03PM

Show HN: Lightweight server-driven template language for JavaScript https://ift.tt/tS7Y4QE

Show HN: Lightweight server-driven template language for JavaScript https://ift.tt/dIDHwNC September 2, 2025 at 11:29PM

Show HN: My first Go project, a useless animated bunny sign for your terminal https://ift.tt/n2EgPw4

Show HN: My first Go project, a useless animated bunny sign for your terminal Hi HN, I wanted to share my very first (insignificant) project written in Go: a little CLI tool that displays messages with an animated bunny holding a sign. I wanted to learn Go and needed a small, fun project to get my hands dirty with the language and the process of building and distributing a CLI. I've built a similar tool in JavaScript before so I thought porting it would be a great learning exercise. This was a dive into Go's basics for me, from package structure and CLI flag parsing to building binaries for different platforms (never did that on my JS projects). I'm starting to understand why Go is so praised: it's standard library is huge compared with other languages. One thing that really impressed me was the idea (at some point of this journey) to develop a functionality by myself (where in the javascript original project I choose to use an external library), here with the opportunities that std lib was giving me I thought "why don't try to create the function by miself?" and it worked! In the Js version I used the nodejs "log-update", here I write a dedicated pkg. I know it's a bit silly, but I could see it being used to add some fun to build scripts or idk highlight important log messages, or just make a colleague smile. It's easy to install if you have Go set up: go install github.com/fsgreco/go-bunny-sign/cmd/bunnysign@latest Since I'm new to Go, I would genuinely appreciate any feedback on the code, project structure, or Go best practices. The README also lists my planned next steps, like adding tests and setting up CI better. Thanks for taking a look! https://ift.tt/WOR2xzX August 31, 2025 at 05:16PM

Monday, September 1, 2025

Show HN: A usercript to help you filter "Who's Hiring". https://ift.tt/zeI6MXo

Show HN: A usercript to help you filter "Who's Hiring". This will work on any Hacker news post but it is especially useful for "Who's Hiring?". It will filter out comments that don't match the set filters. You can set multiple filters. Filters have an "and" relationship. Filters are regular expressions. https://ift.tt/iqJSA5v September 2, 2025 at 04:12AM

Show HN: Neuron – Cognitive Multi-Agent Architecture for Reasoning https://ift.tt/xkR4nay

Show HN: Neuron – Cognitive Multi-Agent Architecture for Reasoning Most orchestration frameworks today still behave like fragile chains — they break when faced with contradictions, long-term memory, or dynamic routing. Neuron is a cognitive multi-agent architecture that thinks in circuits instead of chains. Multiple agents collaborate in parallel, adapt their pathways in real time, and keep persistent context across extended interactions. Key components Agents: Intake, Reasoning, Response, Memory Circuits: Dynamic routing instead of linear chaining Memory: Episodic + contextual persistence Monitoring: Full reasoning traces for observability Why it matters Handles contradictory inputs without collapsing Maintains state across extended sessions Parallel coordination for complex reasoning tasks Transparent logs for debugging & trust GitHub repo: https://ift.tt/CWBpX2H Evaluation Notebook: https://ift.tt/f9rLdYJ... Tutorial Series: https://ift.tt/SMiQv7H... About me / context: https://ift.tt/Tht3uSi... Would love feedback from the HN community — especially if you’ve run into the same breakdown points with traditional tools. September 1, 2025 at 10:43PM

Show HN: Use "-f**k" to kill Google AI Overview https://ift.tt/RfWqPoX

Show HN: Use "-f**k" to kill Google AI Overview Not sure this is the right way to post this, but I'm sure quite a few people are as frustrated as I am by the AI enshittification of Google search and would like to know this. I accidentally discovered in a fit of rage against Google Search that if you add an expletive to a search term, the SERP will avoid showing ads and also an AI overview. The good thing is that it works also with the "-" (minus) operator, so you can make sure the expletive is actually not included in the result pages. Try it yourself: search for a fairly generic query that gives you ads and AI overview, and add "-f*k" at the end, uncensored of course. Enjoy a much better search experience. It might be placebo, but it feels like the results are actually better sorted. Edit: edited to avoid HN pro-expletives filter :D September 1, 2025 at 12:54PM