Feed aggregator
Managing Agent Skills with Your Package Manager
Article URL: https://pavel.pink/blog/pixi-skills/
Comments URL: https://news.ycombinator.com/item?id=47073193
Points: 6
# Comments: 0
Give Up GitHub
Article URL: https://sfconservancy.org/GiveUpGitHub/
Comments URL: https://news.ycombinator.com/item?id=47073191
Points: 4
# Comments: 0
Show HN: Unix-style pipeline composition for MCP tool calls
This is a little side-project I have been working on at my job.
Model Context Shell lets AI agents compose MCP tool calls using something similar to Unix shell scripting. Instead of the agent making each tool call individually (loading all intermediate data into context), it can express a workflow as a pipeline that executes server-side.
Since the orchestration is deterministic and reproducible, you can also use it with Skills.
Tool orchestration runs outside the agent and LLM context, so the agent can extract only the relevant parts of data and load those into context. This means you can save tokens, but also you can work with data that is too big to load into context, and your agent can trigger a very large number of tool calls if needed.
Also, this is not just a tool that runs bash - it has its own execution engine. So no need for full system access.
Example query: "List all Pokemon over 50 kg that have the chlorophyll ability"
Instead of 7+ separate tool calls loading all Pokemon data into context, the agent builds a single pipeline that:
1. Fetches the ability data 2. Extracts Pokemon URLs 3. Fetched each Pokemon's details (7 tool calls) 4. Filters by weight and formats the results
At least in it's current iteration, it's packaged as an MCP server itself. So you can use it with any agent. I made this, and some other design choices, so you can try it right away.
Comments URL: https://news.ycombinator.com/item?id=47073185
Points: 3
# Comments: 0
Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management
Formerly named Valkyrie, the company’s funding includes $25 million raised in a Series A round.
The post Venice Security Emerges From Stealth With $33M Funding for Privileged Access Management appeared first on SecurityWeek.
The summit aims to democratise AI and bridge the growing divide between countries, but critics warn that it risks becoming a mere spectacle if the technology only serves the interests of power and profit
UK to force social media to remove abusive pics in 48 hours
Article URL: https://www.theregister.com/2026/02/19/uk_intimate_images_online/
Comments URL: https://news.ycombinator.com/item?id=47072932
Points: 1
# Comments: 0
Show HN: LatentScore – Type a mood, get procedural/ambient music (open source)
Hey HN,
I've used Generative.fm for years and love it, but I always wanted to just describe what I was in the mood for instead of scrolling through presets. So I built this.
You type a text description of anything - from "mountain sunrise" to "neon city" - and it generates a procedural/ambient stream matching that mood. It runs locally, no account, no tracking, no ads.
Under the hood it's a custom synthesizer driven by sentence embeddings, not a generative AI model (although you can choose to use one!) — so there's no GPU, no API calls, and it starts playing almost instantly. The whole thing is open source: https://github.com/prabal-rje/latentscore
If you're a developer and want to use it programmatically it's also a Python library - pip install latentscore — one line to render audio. But honestly I just use the web player myself when I'm working.
Fair warning: it's still alpha and the synth has limits, so please don't expect full songs or vocals. It's ambient/procedural only. But for focus music or background atmosphere, I think it's pretty good.
Would love to know what vibes you try and whether they land!
- Prabal
Comments URL: https://news.ycombinator.com/item?id=47072930
Points: 1
# Comments: 0
Celebrate Apple's 50th at TechFest
Show HN: KGBaby – A WebRTC based audio baby monitor I built on pat leave
Baby monitors are a great boon. We use the audio-only Motorola AM21, which is excellent. But being on pat leave with a 2-month-old right now, I decided to build a browser-based alternative using WebRTC and some AI coding agents (Codex & Gemini).
It is an open-source, zero-latency P2P monitor. Hardware reuse: You can repurpose an old phone or tablet to be the child unit instead of buying single-purpose hardware. Actually private: Unlike using a never-ending Google Meet or Zoom, your stream stays private via WebRTC (PeerJS for signaling). No cloud routing. The backgrounding hack: Mobile Safari aggressively kills background audio. I used a hidden 1x1 base64 looping video to keep the microphone active when the screen dims.
Links: Live Demo: https://legodud3.github.io/kgbaby/ Repo: https://github.com/legodud3/kgbaby
Welcome all feedback!
Comments URL: https://news.ycombinator.com/item?id=47072918
Points: 1
# Comments: 0
Show HN: StatusMonk – Uptime monitoring and status pages for small SaaS teams
Hi HN,
We built StatusMonk after repeatedly finding out about outages from customers instead of our systems.
StatusMonk is an all-in-one monitoring and public status page platform designed for founders and small teams who want early detection and clear communication without enterprise complexity.
What it does today:
- Monitor websites, APIs, and cron jobs
- Domain, SSL certificate, and DNS monitoring
- Alerts via email, Slack, or webhooks
- Automatic incident creation and recovery notifications
- Public status pages with uptime history and incidents
The goal is simple: detect problems early, alert the right people fast, and keep users informed from one place.
We are still early and actively iterating based on feedback.
Would love thoughts, criticism, or feature requests.
Comments URL: https://news.ycombinator.com/item?id=47072913
Points: 1
# Comments: 0
LipoVive Reviews (Releases Updated 2026) Gelatin Trick Guide
Starforge Explorer III Pro Review: A Worthy Rival to DIY in Performance and Value
Prime Video: 24 of the Best Sci-Fi TV Shows You Should Stream Now
Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025
Security researchers have seen the vulnerabilities being exploited to deliver shells, conduct reconnaissance, and download malware.
The post Ivanti Exploitation Surges as Zero-Day Attacks Traced Back to July 2025 appeared first on SecurityWeek.
Perplexity AI drops ads implementation plan to keep user trust
Article URL: https://www.msn.com/en-us/money/other/perplexity-ai-drops-ads-implementation-plan-to-keep-user-trust/ar-AA1WBvyY
Comments URL: https://news.ycombinator.com/item?id=47072876
Points: 1
# Comments: 0
Show HN: An encrypted, local, cross-platform journaling app
Article URL: https://github.com/fjrevoredo/mini-diarium
Comments URL: https://news.ycombinator.com/item?id=47072863
Points: 1
# Comments: 0
The Popper Principle
Article URL: https://theamericanscholar.org/the-popper-principle/
Comments URL: https://news.ycombinator.com/item?id=47072849
Points: 3
# Comments: 0
Meme Monkeys
Article URL: https://mememonkeys.com/
Comments URL: https://news.ycombinator.com/item?id=47072836
Points: 1
# Comments: 0
LLM Drugs (For Humans)
Article URL: https://www.llmdrugs.com
Comments URL: https://news.ycombinator.com/item?id=47072829
Points: 2
# Comments: 0
Intimate products producer Tenga spilled customer data
Tenga confirmed reports published by several outlets that the company notified customers of a data breach.
The Japanese manufacturer of adult products appears to have fallen victim to a phishing attack targeting one of its employees. Tenga reportedly wrote in the data breach notification:
“An unauthorized party gained access to the professional email account of one of our employees.”
This unauthorized access exposed the contents of said account’s inbox, potentially including customer names, email addresses, past correspondence, order details, and customer service inquiries.
In its official statement, Tenga said a “limited segment” of US customers who interacted with the company were impacted by the incident. Regarding the scope of the stolen data, it stated:
“The information involved was limited to customer email addresses and related correspondence history. No sensitive personal data, such as Social Security numbers, billing/credit card information, or TENGA/iroha Store passwords were jeopardized in this incident.”
From the wording of Tenga’s online statement, it seems the compromised account was used to send spam emails that included an attachment.
“Attachment Safety: We want to state clearly that there is no risk to your device or data if the suspicious attachment was not opened. The risk was limited to the potential execution of the attachment within the specific ‘spam’ window (February 12, 2026, between 12am and 1am PT).”
See if your personal data has been exposed.We reached out to Tenga about this “suspicious attachment” but have not heard back at the time of writing. We’ll keep you posted.
Tenga proactively contacted potentially affected customers. It advises them to change passwords and remain vigilant about any unusual activity. We would add that affected customers should be on the lookout for sextortion-themed phishing attempts.
What to do if your data was in a breachIf you think you have been affected by a data breach, here are steps you can take to protect yourself:
- Check the company’s advice. Every breach is different, so check with the company to find out what’s happened and follow any specific advice it offers.
- Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
- Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop, or phone as your second factor. Some forms of 2FA can be phished just as easily as a password, but 2FA that relies on a FIDO2 device can’t be phished.
- Watch out for impersonators. The thieves may contact you posing as the breached platform. Check the official website to see if it’s contacting victims and verify the identity of anyone who contacts you using a different communication channel.
- Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
- Consider not storing your card details. It’s definitely more convenient to let sites remember your card details, but it increases risk if a retailer suffers a breach.
- Set up identity monitoring, which alerts you if your personal information is found being traded illegally online and helps you recover after.
- Use our free Digital Footprint scan to see whether your personal information has been exposed online.
What do cybercriminals know about you?
Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.
