Hacker News

Comparing manual vs. AI requirements gathering: 2 sentences vs. 127-point spec

Hacker News - Thu, 02/26/2026 - 6:22am

We took a vague 2-sentence client request for a "Team Productivity Dashboard" and ran it through two different discovery processes: a traditional human analyst approach vs an AI-driven interrogation workflow.

The results were uncomfortable. The human produced a polite paragraph summarizing the "happy path." The AI produced a 127-point technical specification that highlighted every edge case, security flaw, and missing feature we usually forget until Week 8.

Here is the breakdown of the experiment and why I think "scope creep" is mostly just discovery failure.

The Problem: The "Assumption Blind Spot"

We’ve all lived through the "Week 8 Crisis." You’re 75% through a 12-week build, and suddenly the client asks, "Where is the admin panel to manage users?" The dev team assumed it was out of scope; the client assumed it was implied because "all apps have logins."

Humans have high context. When we hear "dashboard," we assume standard auth, standard errors, and standard scale. We don't write it down because it feels pedantic.

AI has zero context. It doesn't know that "auth" is implied. It doesn't know that we don't care about rate limiting for a prototype. So it asks.

The Experiment

We fed the same input to a senior human analyst and an LLM workflow acting as a technical interrogator.

Input: "We need a dashboard to track team productivity. It should pull data from Jira and GitHub and show us who is blocking who."

Path A: Human Analyst Output: ~5 bullet points. Focused on the UI and the "business value." Assumed: Standard Jira/GitHub APIs, single tenant, standard security. Result: A clean, readable, but technically hollow summary.

Path B: AI Interrogator Output: 127 distinct technical requirements. Focused on: Failure states, data governance, and edge cases. Result: A massive, boring, but exhaustive document.

The Results

The volume difference (5 vs 127) is striking, but the content difference is what matters. The AI explicitly defined requirements that the human completely "blind spotted":

- Granular RBAC: "What happens if a junior dev tries to delete a repo link?" - API Rate Limits: "How do we handle 429 errors from GitHub during a sync?" - Data Retention: "Do we store the Jira tickets indefinitely? Is there a purge policy?" - Empty States: "What does the dashboard look like for a new user with 0 tickets?"

The human spec implied these were "implementation details." The AI treated them as requirements. In my experience, treating RBAC as an implementation detail is exactly why projects go over budget.

Trade-offs and Limitations

To be fair, reading a 127-point spec is miserable. There is a serious signal-to-noise problem here.

- Bloat: The AI can be overly rigid. It suggested microservices architecture for what should be a monolith. It hallucinated complexity where none existed. - Paralysis: Handing a developer a 127-point list for a prototype is a great way to kill morale. - Filtering: You still need a human to look at the list and say, "We don't need multi-tenancy yet, delete points 45-60."

However, I'd rather delete 20 unnecessary points at the start of a project than discover 20 missing requirements two weeks before launch.

Discussion

This experiment made me realize that our hatred of writing specs—and our reliance on "implied" context—is a major source of technical debt. The AI is useful not because it's smart, but because it's pedantic enough to ask the questions we think are too obvious to ask.

I’m curious how others handle this "implied requirements" problem:

1. Do you have a checklist for things like RBAC/Auth/Rate Limits that you reuse? 2. Is a 100+ point spec actually helpful, or does it just front-load the arguments? 3. How do you filter the "AI noise" from the critical missing specs?

If anyone wants to see the specific prompts we used to trigger this "interrogator" mode, happy to share in the comments.

Comments URL: https://news.ycombinator.com/item?id=47164583

Points: 1

# Comments: 0

Categories: Hacker News

Mako: A simple virtual game console

Hacker News - Thu, 02/26/2026 - 6:19am

Article URL: https://github.com/JohnEarnest/Mako

Comments URL: https://news.ycombinator.com/item?id=47164564

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Molecular Intelligence Platform – Claude Code for Biology – Purna AI

Hacker News - Thu, 02/26/2026 - 6:18am

# Show Community: MIP - A Molecular Intelligence Platform for Biology Teams

Hi, Community!

I'm Sid, founder of Purna AI. We've been building a Molecular Intelligence Platform for the last few months, and now it's in research preview. It's a single workspace where molecular medicine teams can go from raw biology data to interpretation without juggling a dozen disconnected tools.

## The Problem

If you work in clinical genomics, rare disease research, computational biology, or similar fields, your workflow probably looks like this: export variants from one tool, look up annotations in another, cross-reference ClinVar, check gnomAD frequencies, read ACMG guidelines in a PDF, pull up a protein structure viewer separately, then paste everything into a report. Multiply that by hundreds of variants per case.

It's slow, error-prone, and most of the "analysis" time is actually spent on context-switching or copy-pasting existing scripts.

## What MIP Does

- *Singular Workspace for Biological Analysis* - Genetics, Epigenetics, Single Cell RNA, and more - *AI-powered pipelines* - Can write complex pipelines, execute on a secure compute instance, and give you results in natural language - *Variant analysis* with ACMG classification built in - *Integrated with 30+ clinical databases* - ClinVar, gnomAD, OMIM, UniProt, etc. - *Protein structure prediction with Chat* - Compare Wildtype vs Mutant Variations - *AI-assisted interpretation*, reclassification, and reporting - *Auditable Case Management* so nothing falls through the cracks

The AI layer is the key differentiator. We benchmarked it against 1,600 genomics queries from an Oxford dataset and hit 90%+ accuracy. But more importantly, it handles the kind of nuanced, multi-step reasoning that comes up in real casework, for example: "Is this VUS in a conserved domain?", "What's the functional impact given this patient's phenotype?", "Are there any recent publications reclassifying this variant?"

## The Backstory

I'm an engineer, not a biologist. We started building in the Preventive Healthcare (early diagnosis) space. Watching clinicians work with fragmented tools while making critical diagnostic decisions felt like a solvable problem. My co-founder Dr. Gitanjali (CMO) keeps us grounded in clinical reality.

## Where We Are

Early stage, two founders. We are now inviting scientists and biologists around the world to test more complex cases. We have already processed over 50 samples ourselves on the platform, and seeing PhD-grade results.

## What I'd Love From the Rainmatter Community

- If you work in *genomics, bioinformatics, drug discovery*, or similar fields, we'd love to give this to you and your team for early feedback. - If you've built *developer tools or "IDE-for-X" products*: what did you learn about adoption in specialized domains? - If you've done *B2B SaaS for life sciences*: any hard-won lessons on selling to labs and research institutions?

Happy to answer any questions about the tech, the biology, or the business.

*Check us out here:* purna.ai

Comments URL: https://news.ycombinator.com/item?id=47164562

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Tablex – Your wedding seat arrangement tool

Hacker News - Thu, 02/26/2026 - 6:17am

Hey HN.

I built Tablex (https://www.tablex.pro ), a web app to make wedding seating arrangements less painful (well any seating arrangement really).

My friend's getting married in September, thought I'd help him out knowing how it was a bit tricky to sort this all out.

Comments URL: https://news.ycombinator.com/item?id=47164551

Points: 1

# Comments: 0

Categories: Hacker News

Welcome to the Age of the Slop Fork

Hacker News - Thu, 02/26/2026 - 6:15am
Categories: Hacker News

Show HN: Anonymize LLM traffic to dodge API fingerprinting and rate-limiting

Hacker News - Thu, 02/26/2026 - 6:09am

As a heavy user of OpenClaw and various LLM clients, I’ve started noticing a disturbing trend: API providers are getting much better at "identifying" us. It’s not just about the API key anymore—it's your IP, your request timing, and your client’s specific HTTP fingerprint.

Anthropic’s recent reports on "distillation-pressure" and the community whispers about "silent" rate-limiting for specific IP ranges got me thinking: Why am I giving OpenAI/Google my home IP with every single prompt?

What I Built: I built Claw Shield. It’s a privacy layer for OpenClaw (and potentially any OpenAI-compatible client) that implements Oblivious HTTP (OHTTP).

How it works: Instead of a direct connection, Claw Shield uses a double-blind architecture:

The Client (OpenClaw Plugin) encrypts your request using HPKE.

The Relay (Cloudflare) sees your IP but cannot see your request content.

The Gateway (Your CF Worker) sees your request content but cannot see your IP.

The Model Provider sees the request coming from Cloudflare’s edge infrastructure, not you.

Why this is better than a simple VPN/Proxy:

Zero Trust: Even the Relay can't log your prompts, and the Gateway can't log your identity. You don't have to trust me or the relay provider.

Fingerprint Reduction: By standardizing the traffic through OHTTP/BHTTP, we strip away the unique signatures that providers use to identify "third-party client" traffic.

Open Source & Self-Hostable: Both the Relay and Gateway are lightweight Cloudflare Workers you can deploy in 1 click.

Status: Verified working for Gemini and OpenAI. Supporting Anthropic and others via providerTargets.

Repo: https://github.com/xinxin7/claw-shield

Comments URL: https://news.ycombinator.com/item?id=47164488

Points: 1

# Comments: 0

Categories: Hacker News

Pages