Feed aggregator

Give Up GitHub

Hacker News - Thu, 02/19/2026 - 7:47am
Categories: Hacker News

Show HN: Unix-style pipeline composition for MCP tool calls

Hacker News - Thu, 02/19/2026 - 7:46am

This is a little side-project I have been working on at my job.

Model Context Shell lets AI agents compose MCP tool calls using something similar to Unix shell scripting. Instead of the agent making each tool call individually (loading all intermediate data into context), it can express a workflow as a pipeline that executes server-side.

Since the orchestration is deterministic and reproducible, you can also use it with Skills.

Tool orchestration runs outside the agent and LLM context, so the agent can extract only the relevant parts of data and load those into context. This means you can save tokens, but also you can work with data that is too big to load into context, and your agent can trigger a very large number of tool calls if needed.

Also, this is not just a tool that runs bash - it has its own execution engine. So no need for full system access.

Example query: "List all Pokemon over 50 kg that have the chlorophyll ability"

Instead of 7+ separate tool calls loading all Pokemon data into context, the agent builds a single pipeline that:

1. Fetches the ability data 2. Extracts Pokemon URLs 3. Fetched each Pokemon's details (7 tool calls) 4. Filters by weight and formats the results

At least in it's current iteration, it's packaged as an MCP server itself. So you can use it with any agent. I made this, and some other design choices, so you can try it right away.

Comments URL: https://news.ycombinator.com/item?id=47073185

Points: 3

# Comments: 0

Categories: Hacker News

Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management

Security Week - Thu, 02/19/2026 - 7:23am

Formerly named Valkyrie, the company’s funding includes $25 million raised in a Series A round. 

The post Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management appeared first on SecurityWeek.

Categories: SecurityWeek

The summit aims to democratise AI and bridge the growing divide between countries, but critics warn that it risks becoming a mere spectacle if the technology only serves the interests of power and profit

Computer Weekly Feed - Thu, 02/19/2026 - 7:13am
The summit aims to democratise AI and bridge the growing divide between countries, but critics warn that it risks becoming a mere spectacle if the technology only serves the interests of power and profit
Categories: Computer Weekly

Show HN: LatentScore – Type a mood, get procedural/ambient music (open source)

Hacker News - Thu, 02/19/2026 - 7:06am

Hey HN,

I've used Generative.fm for years and love it, but I always wanted to just describe what I was in the mood for instead of scrolling through presets. So I built this.

You type a text description of anything - from "mountain sunrise" to "neon city" - and it generates a procedural/ambient stream matching that mood. It runs locally, no account, no tracking, no ads.

Under the hood it's a custom synthesizer driven by sentence embeddings, not a generative AI model (although you can choose to use one!) — so there's no GPU, no API calls, and it starts playing almost instantly. The whole thing is open source: https://github.com/prabal-rje/latentscore

If you're a developer and want to use it programmatically it's also a Python library - pip install latentscore — one line to render audio. But honestly I just use the web player myself when I'm working.

Fair warning: it's still alpha and the synth has limits, so please don't expect full songs or vocals. It's ambient/procedural only. But for focus music or background atmosphere, I think it's pretty good.

Would love to know what vibes you try and whether they land!

- Prabal

Comments URL: https://news.ycombinator.com/item?id=47072930

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: KGBaby – A WebRTC based audio baby monitor I built on pat leave

Hacker News - Thu, 02/19/2026 - 7:04am

Baby monitors are a great boon. We use the audio-only Motorola AM21, which is excellent. But being on pat leave with a 2-month-old right now, I decided to build a browser-based alternative using WebRTC and some AI coding agents (Codex & Gemini).

It is an open-source, zero-latency P2P monitor. Hardware reuse: You can repurpose an old phone or tablet to be the child unit instead of buying single-purpose hardware. Actually private: Unlike using a never-ending Google Meet or Zoom, your stream stays private via WebRTC (PeerJS for signaling). No cloud routing. The backgrounding hack: Mobile Safari aggressively kills background audio. I used a hidden 1x1 base64 looping video to keep the microphone active when the screen dims.

Links: Live Demo: https://legodud3.github.io/kgbaby/ Repo: https://github.com/legodud3/kgbaby

Welcome all feedback!

Comments URL: https://news.ycombinator.com/item?id=47072918

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: StatusMonk – Uptime monitoring and status pages for small SaaS teams

Hacker News - Thu, 02/19/2026 - 7:03am

Hi HN,

We built StatusMonk after repeatedly finding out about outages from customers instead of our systems.

StatusMonk is an all-in-one monitoring and public status page platform designed for founders and small teams who want early detection and clear communication without enterprise complexity.

What it does today:

- Monitor websites, APIs, and cron jobs

- Domain, SSL certificate, and DNS monitoring

- Alerts via email, Slack, or webhooks

- Automatic incident creation and recovery notifications

- Public status pages with uptime history and incidents

The goal is simple: detect problems early, alert the right people fast, and keep users informed from one place.

We are still early and actively iterating based on feedback.

Would love thoughts, criticism, or feature requests.

Comments URL: https://news.ycombinator.com/item?id=47072913

Points: 1

# Comments: 0

Categories: Hacker News

Starforge Explorer III Pro Review: A Worthy Rival to DIY in Performance and Value

CNET Feed - Thu, 02/19/2026 - 7:01am
The Starforge Explorer III Pro is a big, exceptional machine that delivers stellar performance and value.
Categories: CNET

Prime Video: 24 of the Best Sci-Fi TV Shows You Should Stream Now

CNET Feed - Thu, 02/19/2026 - 7:00am
Whatever type of sci-fi you're looking for, Prime Video has it.
Categories: CNET

Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025

Security Week - Thu, 02/19/2026 - 6:56am

Security researchers have seen the vulnerabilities being exploited to deliver shells, conduct reconnaissance, and download malware.

The post Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025 appeared first on SecurityWeek.

Categories: SecurityWeek

The Popper Principle

Hacker News - Thu, 02/19/2026 - 6:52am
Categories: Hacker News

Meme Monkeys

Hacker News - Thu, 02/19/2026 - 6:51am

Article URL: https://mememonkeys.com/

Comments URL: https://news.ycombinator.com/item?id=47072836

Points: 1

# Comments: 0

Categories: Hacker News

LLM Drugs (For Humans)

Hacker News - Thu, 02/19/2026 - 6:50am

Article URL: https://www.llmdrugs.com

Comments URL: https://news.ycombinator.com/item?id=47072829

Points: 2

# Comments: 0

Categories: Hacker News

Intimate products producer Tenga spilled customer data

Malware Bytes Security - Thu, 02/19/2026 - 6:48am

Tenga confirmed reports published by several outlets that the company notified customers of a data breach.

The Japanese manufacturer of adult products appears to have fallen victim to a phishing attack targeting one of its employees. Tenga reportedly wrote in the data breach notification:

“An unauthorized party gained access to the professional email account of one of our employees.”

This unauthorized access exposed the contents of said account’s inbox, potentially including customer names, email addresses, past correspondence, order details, and customer service inquiries.

In its official statement, Tenga said a “limited segment” of US customers who interacted with the company were impacted by the incident. Regarding the scope of the stolen data, it stated:

“The information involved was limited to customer email addresses and related correspondence history. No sensitive personal data, such as Social Security numbers, billing/credit card information, or TENGA/iroha Store passwords were jeopardized in this incident.”

From the wording of Tenga’s online statement, it seems the compromised account was used to send spam emails that included an attachment.

“Attachment Safety: We want to state clearly that there is no risk to your device or data if the suspicious attachment was not opened. The risk was limited to the potential execution of the attachment within the specific ‘spam’ window (February 12, 2026, between 12am and 1am PT).”

See if your personal data has been exposed.

SCAN NOW

We reached out to Tenga about this “suspicious attachment” but have not heard back at the time of writing. We’ll keep you posted.

Tenga proactively contacted potentially affected customers. It advises them to change passwords and remain vigilant about any unusual activity. We would add that affected customers should be on the lookout for sextortion-themed phishing attempts.

What to do if your data was in a breach

If you think you have been affected by a data breach, here are steps you can take to protect yourself:

  • Check the company’s advice. Every breach is different, so check with the company to find out what’s happened and follow any specific advice it offers.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop, or phone as your second factor. Some forms of 2FA can be phished just as easily as a password, but 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for impersonators. The thieves may contact you posing as the breached platform. Check the official website to see if it’s contacting victims and verify the identity of anyone who contacts you using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
  • Consider not storing your card details. It’s definitely more convenient to let sites remember your card details, but it increases risk if a retailer suffers a breach.
  • Set up identity monitoring, which alerts you if your personal information is found being traded illegally online and helps you recover after.
  • Use our free Digital Footprint scan to see whether your personal information has been exposed online.

What do cybercriminals know about you?

Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.

SCAN NOW

Categories: Malware Bytes

Pages