Feed aggregator

Show HN: Building a Globe Viewer When Software Is Cheap

Hacker News - Tue, 03/03/2026 - 7:05am

I wanted to test a question: if producing code costs almost nothing, how would you build a globe viewer? Instead of optimizing for human productivity (high-level language, existing engine, standard formats), what if you optimize for the output: binary size, portability, runtime cost, control?

So I let Claude produce it in C targeting WebGPU. Documentation first, code second. Given clear specs, it produced working C on the first pass. Given vague specs, the code wandered or chose the obvious path. This is experimental code and there are many areas for improvement, but I was pleasantly surprised at the results.

Repository: https://github.com/arpentry/arpentry

Comments URL: https://news.ycombinator.com/item?id=47231203

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Only firewall for AI prompts with a security grade on every PR

Hacker News - Tue, 03/03/2026 - 7:03am

Every other gateway is detect-and-block. You don't get a security grade. You don't get red team in CI. We built the one that does.

PromptGuard is a proxy: change your base URL (one line with our SDK, or a few lines without), and every request gets checked for prompt injection, PII leaks, jailbreaks, and abuse. 20+ threat vectors, 39+ PII types. We also ship a red team suite and an autonomous agent that mutates attacks to find bypasses - you get a grade (A-F) and a GitHub Action that runs these tests on every PR. So you see where you're weak before you ship.

Works with OpenAI, Anthropic, Google, Azure, Gemini and more. Policy-as-Code. 10K free requests/month - link in the post.

Happy to answer questions.

Comments URL: https://news.ycombinator.com/item?id=47231187

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Claude Gym – a tiny CLI that nudges you to move while Claude Code runs

Hacker News - Tue, 03/03/2026 - 7:01am

I’ve been using Claude Code pretty heavily lately (plan mode, multi-agent runs, long tool streaks), and I noticed a pattern:

When the AI is busy running tools, I’m usually just… sitting there.

Forty-five minutes later I realize I haven’t moved at all.

So I built a small side project called Claude Gym.

It watches Claude Code’s local JSONL logs and uses them as a signal for “AI is busy vs AI needs input.” The JSONL logs expose structured events (tool calls, agent transitions, turn boundaries), which makes them a surprisingly clean signal for detecting human idle windows.

When Claude doesn’t need me, it pops up short movement prompts (squats, stretches, wall sits). When Claude needs input again, it gets out of the way. There’s also a small pixel-art cat that jumps when a turn finishes.

No network, no telemetry — it just tails the local logs. Written in Go, runs in a separate terminal tab.

It’s intentionally small and a bit playful, but it’s been surprisingly effective at getting me to move during long sessions.

Repo (MIT): https://github.com/477-Studio/claude-gym

Curious whether others have experimented with tying human breaks to agent activity instead of timers.

Comments URL: https://news.ycombinator.com/item?id=47231176

Points: 1

# Comments: 0

Categories: Hacker News

Even AI agents need a digital detox

Hacker News - Tue, 03/03/2026 - 7:01am

Article URL: https://vibesprings.net

Comments URL: https://news.ycombinator.com/item?id=47231172

Points: 1

# Comments: 0

Categories: Hacker News

CISA Adds Two Known Exploited Vulnerabilities to Catalog

US-Cert Current Activity - Tue, 03/03/2026 - 7:00am

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2026-21385 Qualcomm Multiple Chipsets Memory Corruption Vulnerability
  • CVE-2026-22719 Broadcom VMware Aria Operations Command Injection Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

Categories: US-CERT Feed

Best Home Security Cameras With Floodlights in 2026: Smart and Bright

CNET Feed - Tue, 03/03/2026 - 7:00am
Today's home cameras can dazzle with powerful LEDs: These are the models that impressed me the most.
Categories: CNET

Best Earbuds and Headphones That Can Handle the Sweatiest Workouts

CNET Feed - Tue, 03/03/2026 - 7:00am
You deserve to wear the right earbuds and headphones during your workouts. These are our favorites.
Categories: CNET

The Bank of England’s successful IT transformation, praised by the National Audit Office, is being used as a model for government departments, including NS&I, which faces a failing IT project

Computer Weekly Feed - Tue, 03/03/2026 - 6:29am
The Bank of England’s successful IT transformation, praised by the National Audit Office, is being used as a model for government departments, including NS&I, which faces a failing IT project
Categories: Computer Weekly

Executives in the West consistently underestimate technological progress in China – and the country’s differing approach to AI development will lead to a significant advantage if Western leaders fail to learn

Computer Weekly Feed - Tue, 03/03/2026 - 6:29am
Executives in the West consistently underestimate technological progress in China – and the country’s differing approach to AI development will lead to a significant advantage if Western leaders fail to learn
Categories: Computer Weekly

Pages