Feed aggregator
Show HN: Building a Globe Viewer When Software Is Cheap
I wanted to test a question: if producing code costs almost nothing, how would you build a globe viewer? Instead of optimizing for human productivity (high-level language, existing engine, standard formats), what if you optimize for the output: binary size, portability, runtime cost, control?
So I let Claude produce it in C targeting WebGPU. Documentation first, code second. Given clear specs, it produced working C on the first pass. Given vague specs, the code wandered or chose the obvious path. This is experimental code and there are many areas for improvement, but I was pleasantly surprised at the results.
Repository: https://github.com/arpentry/arpentry
Comments URL: https://news.ycombinator.com/item?id=47231203
Points: 1
# Comments: 0
Data Does Not Speak to You
Article URL: https://tantaman.com/2026-03-02-data-doesnt-speak.html
Comments URL: https://news.ycombinator.com/item?id=47231201
Points: 1
# Comments: 0
Legal AI slop is becoming a real problem
Article URL: https://www.ctinsider.com/connecticut/article/supreme-court-ai-cases-middletown-21950447.php
Comments URL: https://news.ycombinator.com/item?id=47231189
Points: 2
# Comments: 0
Show HN: Only firewall for AI prompts with a security grade on every PR
Every other gateway is detect-and-block. You don't get a security grade. You don't get red team in CI. We built the one that does.
PromptGuard is a proxy: change your base URL (one line with our SDK, or a few lines without), and every request gets checked for prompt injection, PII leaks, jailbreaks, and abuse. 20+ threat vectors, 39+ PII types. We also ship a red team suite and an autonomous agent that mutates attacks to find bypasses - you get a grade (A-F) and a GitHub Action that runs these tests on every PR. So you see where you're weak before you ship.
Works with OpenAI, Anthropic, Google, Azure, Gemini and more. Policy-as-Code. 10K free requests/month - link in the post.
Happy to answer questions.
Comments URL: https://news.ycombinator.com/item?id=47231187
Points: 1
# Comments: 0
Show HN: AI Referral Detector – See which AI sent traffic to your site
Article URL: https://github.com/Mantasaur/AI-referral-detector
Comments URL: https://news.ycombinator.com/item?id=47231184
Points: 2
# Comments: 0
Startup claims it can stop lightning and prevent catastrophic wildfires
Show HN: Claude Gym – a tiny CLI that nudges you to move while Claude Code runs
I’ve been using Claude Code pretty heavily lately (plan mode, multi-agent runs, long tool streaks), and I noticed a pattern:
When the AI is busy running tools, I’m usually just… sitting there.
Forty-five minutes later I realize I haven’t moved at all.
So I built a small side project called Claude Gym.
It watches Claude Code’s local JSONL logs and uses them as a signal for “AI is busy vs AI needs input.” The JSONL logs expose structured events (tool calls, agent transitions, turn boundaries), which makes them a surprisingly clean signal for detecting human idle windows.
When Claude doesn’t need me, it pops up short movement prompts (squats, stretches, wall sits). When Claude needs input again, it gets out of the way. There’s also a small pixel-art cat that jumps when a turn finishes.
No network, no telemetry — it just tails the local logs. Written in Go, runs in a separate terminal tab.
It’s intentionally small and a bit playful, but it’s been surprisingly effective at getting me to move during long sessions.
Repo (MIT): https://github.com/477-Studio/claude-gym
Curious whether others have experimented with tying human breaks to agent activity instead of timers.
Comments URL: https://news.ycombinator.com/item?id=47231176
Points: 1
# Comments: 0
SDK code mode shows SotA accuracy and performance for agents using APIs
Article URL: https://www.stainless.com/blog/sdk-code-mode
Comments URL: https://news.ycombinator.com/item?id=47231175
Points: 1
# Comments: 0
Even AI agents need a digital detox
Article URL: https://vibesprings.net
Comments URL: https://news.ycombinator.com/item?id=47231172
Points: 1
# Comments: 0
Show HN: MD Feedback – Review AI Plans in Markdown via MCP
Article URL: https://github.com/yeominux/md-feedback
Comments URL: https://news.ycombinator.com/item?id=47231167
Points: 1
# Comments: 0
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2026-21385 Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- CVE-2026-22719 Broadcom VMware Aria Operations Command Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Best Home Security Cameras With Floodlights in 2026: Smart and Bright
Best Earbuds and Headphones That Can Handle the Sweatiest Workouts
The Bank of England’s successful IT transformation, praised by the National Audit Office, is being used as a model for government departments, including NS&I, which faces a failing IT project
Executives in the West consistently underestimate technological progress in China – and the country’s differing approach to AI development will lead to a significant advantage if Western leaders fail to learn
Detecting LLM-Generated Web Novels Using "Classical" Machine Learning (AIGC Tex
Article URL: https://blog.lyc8503.net/en/post/llm-classifier/
Comments URL: https://news.ycombinator.com/item?id=47230871
Points: 1
# Comments: 0
The term 'Blood Moon' wasn't invented until 2013 (2014)
Article URL: https://www.kelleycom.com/blood-moon/
Comments URL: https://news.ycombinator.com/item?id=47230861
Points: 2
# Comments: 0
OpenAI admits defense deal 'looked opportunistic and sloppy' amid backlash
Article URL: https://www.cnbc.com/2026/03/03/openai-sam-altman-pentagon-deal-amended-surveillance-limits.html
Comments URL: https://news.ycombinator.com/item?id=47230855
Points: 2
# Comments: 0
What's new in Linux kernel for PostgreSQL
Article URL: https://erthalion.info/2026/02/03/new-linux-for-postgresql/
Comments URL: https://news.ycombinator.com/item?id=47230847
Points: 1
# Comments: 0
We built an AI SRE agent in 2 days
Article URL: https://cto.new/blog/we-built-an-ai-sre-agent-in-two-days
Comments URL: https://news.ycombinator.com/item?id=47230845
Points: 1
# Comments: 0
