Feed aggregator

Show HN: Agent Paperclip: A Desktop "Clippy" That Monitors Claude Code/Codex

Hacker News - Wed, 02/18/2026 - 12:38pm

Hi HN

I built a small desktop companion that monitors CLI AI coding agents so you don’t have to stare at the terminal during long tasks.

It shows when the agent is done, needs input, and the current token/context usage (useful to know when it’s about to compact). It’s fully local + free + open source: https://github.com/fredruss/agent-paperclip

It supports Claude Code via hooks and Codex CLI by watching local session files. Default sticker pack is a small Clippy nod (no affiliation, Microsoft please don't sue me).

Next on the to-do list: multi-session visibility.

Would love feedback / issues / stars.

Comments URL: https://news.ycombinator.com/item?id=47063723

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Supervisor IDE – Command center for coding agents in complex projects

Hacker News - Wed, 02/18/2026 - 12:34pm

Hey Hacker forum,

I'm trying to build the most complete IDE for vibe coding, by this i mean a command center to manage contexts, permissions, skills, apps and tasks in complexe project with multiples codebase and knowledge sources.

The release is now live :

- Layered project/app/agent/task context with smart automatic injection

- Specialized agents with defined skills, scope, and models

- Global agent that spawn sub agents to solve specific tasks

- Permissions management for each agent and app assignements

- Persistent multi-agent background sessions, you can close chats and just get notified

- No need for chat : the write a kanban task, agent pick it, review, automated git branche and worktrees to avoid messy workspace, automatic PR creation on validation

- Kanban task planning from agent, with files to be modified, risks,...

- Create audit task that render markdown to feed your knowledge base for your projects and futur tasks

- Per-task token & cost breakdown

You can join on discord to discuss: https://discord.gg/2R3GJYWg

In the futur i want to build a real entreprise grade solution, with collaborative feature and fine grained permissions and costs management.

As well as connections for knowledge base, more compatiblity, better visualization, agents flows and many more ideas.

I need your feedback on the solution or even the idea, thanks hackers !

Comments URL: https://news.ycombinator.com/item?id=47063668

Points: 1

# Comments: 0

Categories: Hacker News

The Perils of ISBN

Hacker News - Wed, 02/18/2026 - 12:34pm
Categories: Hacker News

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft

Wired Security - Wed, 02/18/2026 - 12:22pm
A database left accessible to anyone online contained billions of records, including sensitive personal data that criminals appear to have not yet exploited.
Categories: Wired Security

This New Toilet Won't Do You Dirty. It Cleans the Entire Bowl and Rim With One Flush

CNET Feed - Wed, 02/18/2026 - 12:13pm
At KBIS 2026, we got a first look at Toto's industry-first Aurora Washlet+, which aims to solve a cleanliness problem that has frustrated us all.
Categories: CNET

Betterment data breach might be worse than we thought

Malware Bytes Security - Wed, 02/18/2026 - 12:09pm

Betterment LLC is an investment advisor registered with US Securities and Exchange Commission (SEC). The company disclosed a January 2026 incident in which an attacker used social engineering to access a third‑party platform used for customer communications, then abused it to send crypto‑themed phishing messages and exfiltrate contact and identity data for more than a million people.

What makes this particularly concerning is the depth of the exposed information. This isn’t just a list of email addresses. The leaked files include retirement plan details, financial interests, internal meeting notes, and pipeline data. It’s information that gives cybercriminals real context about a person’s finances and professional life.

What’s worse is that ransomware group Shiny Hunters claims that, since Betterment refused to pay their demanded ransom, it is publishing the stolen data.

While Betterment has not revealed the number of affected customers in its online communications, general consensus indicates that the data of 1.4 million customers was involved. And now, every cybercriminal can download this information at their leisure.

We analyzed some of the data and found one particularly worrying CSV file with detailed data on 181,487 people. This file included information such as:

  • Full names (first and last)
  • Personal email addresses (e.g., Gmail)
  • Work email addresses
  • Company name and employer info
  • Job titles and roles
  • Phone numbers (both mobile and work numbers)
  • Addresses and company websites
  • Plan details—company retirement/401k plans, assets, participants
  • Survey responses, deal and client pipeline details, meeting notes
  • Financial needs/interests (e.g., requesting a securities-backed line of credit for a house purchase)
See if your personal data has been exposed.

SCAN NOW

This kind of data is a gold mine for phishers, who can use it in targeted attacks. It has enough context to craft convincing, individually tailored phishing emails. For example:

  • Addressing someone by their real name, company, and job title
  • Referencing the company’s retirement or financial plans
  • Impersonating Betterment advisors or plan administrators
  • Initiating scam calls about financial advice

Combined with data from other breaches it could even be worse and lead to identity theft.

What to do if your data was in a breach

If you think you have been affected by a data breach, here are steps you can take to protect yourself:

  • Check the company’s advice. Every breach is different, so check with the company to find out what’s happened and follow any specific advice it offers.
  • Change your password. You can make a stolen password useless to thieves by changing it. Choose a strong password that you don’t use for anything else. Better yet, let a password manager choose one for you.
  • Enable two-factor authentication (2FA). If you can, use a FIDO2-compliant hardware key, laptop, or phone as your second factor. Some forms of 2FA can be phished just as easily as a password, but 2FA that relies on a FIDO2 device can’t be phished.
  • Watch out for impersonators. The thieves may contact you posing as the breached platform. Check the official website to see if it’s contacting victims and verify the identity of anyone who contacts you using a different communication channel.
  • Take your time. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.
  • Consider not storing your card details. It’s definitely more convenient to let sites remember your card details, but it increases risk if a retailer suffers a breach.
  • Set up identity monitoring, which alerts you if your personal information is found being traded illegally online and helps you recover after.

Use Malwarebytes’ free Digital Footprint scan to see whether your personal information has been exposed online.

SCAN NOW

We don’t just report on threats—we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.

Categories: Malware Bytes

Pages