Feed aggregator

Show HN: 2d platformer game built with Codex (zero code)

Hacker News - Mon, 02/16/2026 - 8:34am

Hi HN!

On Sunday I spent a couple of hours building a short 2d platformer ("Prince of Persia" style). What's interesting is how I built it. I went for a zero-code approach, and built the whole thing using OpenAI Codex CLI and agent skills (with the progressive disclosure paradigm).

You can play the game here: https://acatovic.github.io/gothicvania-codex-demo/

You can see the full code, agent skills and a complete writeup here: https://github.com/acatovic/gothicvania-codex-demo

Some takeaways:

* This was one of the most enjoyable experiences ever!

* Applying harness engineering with progressive disclosure is incredibly powerful - I treated my SKILL.md as simply a ToC (a "skills map") and took it from there

* Implement -> Evaluate loops are key - I used Playwright and an evaluation checklist and the agent built and corrected automagically

* I used PROGRESS.md as a memory/log mechanism for the agent, and a way to minimize context noise

* The game dev agent was steered by the DESIGN-DOCUMENT.md, stipulating game objectives, layout and mechanics

* I used progressive prompting - I built up the game piece wise - starting with basic player mechanics, then adding tiles, NPCs, interactions, sounds, menus - one prompt at a time

Zero code written by me. Never even looked at the game engine (Phaser) API - just gave the skills a link to the documentation. The future is here!

Credits to ansimuz (gothicvania assets) and Pascal Belisle (music).

*NOTE:* The assets were *NOT* created by AI. Backgrounds and probably tiles you could generate with AI, but sprites are not quite there yet (I tried a number of different models). Something to explore fully in the future.

Enjoy and let me know what you think!

Comments URL: https://news.ycombinator.com/item?id=47034752

Points: 3

# Comments: 2

Categories: Hacker News

ClickFix added nslookup commands to its arsenal for downloading RATs

Malware Bytes Security - Mon, 02/16/2026 - 8:09am

ClickFix malware campaigns are all about tricking the victim into infecting their own machine.

Apparently, the criminals behind these campaigns have figured out that mshta and Powershell commands are increasingly being blocked by security software, so they have developed a new method using nslookup.

The initial stages are pretty much the same as we have seen before: fake CAPTCHA instructions to prove you’re not a bot, solving non-existing computer problems or updates, causing browser crashes,  and even instruction videos.

The idea is to get victims to run malicious commands to infect their own machine. The malicious command often gets copied to the victim’s clipboard with instructions to copy it into the Windows Run dialog or the Mac terminal.

Nslookup is a built‑in tool to use the internet “phonebook,” and the criminals are basically abusing that phonebook to smuggle in instructions and malware instead of just getting an address.

It exists to troubleshoot network problems, check if DNS is configured correctly, and investigate odd domains, not to download or run programs. But the criminals configured a server to reply with data that is crafted so that part of the “answer” is actually another command or a pointer to malware, not just a normal IP address.

Microsoft provided these examples of malicious commands:

These commands start an infection chain that downloads a ZIP archive from an external server. From that archive, it extracts a malicious Python script that runs routines to conduct reconnaissance, run discovery commands, and eventually drop a Visual Basic Script which drops and executes ModeloRAT.

ModeloRAT is a Python‑based remote access trojan (RAT) that gives attackers hands‑on control over an infected Windows machine.

Long story short, the cybercriminals have found yet another way to use a trusted technical tool and make it secretly carry the next step of the attack, all triggered by the victim following what looks like harmless copy‑paste support instructions. At which point they might hand over the control over their system.

How to stay safe

With ClickFix running rampant—and it doesn’t look like it’s going away anytime soon—it’s important to be aware, careful, and protected.

  • Slow down. Don’t rush to follow instructions on a webpage or prompt, especially if it asks you to run commands on your device or copy-paste code. Attackers rely on urgency to bypass your critical thinking, so be cautious of pages urging immediate action. Sophisticated ClickFix pages add countdowns, user counters, or other pressure tactics to make you act quickly.
  • Avoid running commands or scripts from untrusted sources. Never run code or commands copied from websites, emails, or messages unless you trust the source and understand the action’s purpose. Verify instructions independently. If a website tells you to execute a command or perform a technical action, check through official documentation or contact support before proceeding.
  • Limit the use of copy-paste for commands. Manually typing commands instead of copy-pasting can reduce the risk of unknowingly running malicious payloads hidden in copied text.
  • Secure your devices. Use an up-to-date, real-time anti-malware solution with a web protection component.
  • Educate yourself on evolving attack techniques. Understanding that attacks may come from unexpected vectors and evolve helps maintain vigilance. Keep reading our blog!

Pro tip: Did you know that the free Malwarebytes Browser Guard extension warns you when a website tries to copy something to your clipboard?

We don’t just report on threats—we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.

Categories: Malware Bytes

Show HN: A collection of drop-in sections for Shopify development

Hacker News - Mon, 02/16/2026 - 7:49am

Hi HN, I've put together a collection of open-source Shopify sections (Liquid, CSS, JS) that can be added to themes. I built this because I found that while Shopify is great, standard themes often lack specific sections, and custom development can be expensive for small merchants. I wanted to create a repository of high-quality, copy-pasteable sections that developers can use to speed up their workflow or merchants can use to enhance their stores without apps. The repo includes code for headers, footers, hero banners, and feature grids. It's all standard Liquid/HTML/CSS. I’d love to hear your feedback on the code structure or requests for other common sections that are usually missing from default themes.

Comments URL: https://news.ycombinator.com/item?id=47034349

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Yell into the void to find others via semantic search

Hacker News - Mon, 02/16/2026 - 7:47am

Hi HN,

I made Voidful, a kind-of-anti-social network where users can yell into the void to see how many other people are yelling the same thing. If you yell something similar, this is considered an "echo" and you gain access to a chat room about that topic with other users being notified.

Currently when users yell into the same void they are brought into a chat together, but this is somewhat of an MVP. In the future that chat may have guard rails related to the topic, rewards left by other users, and possibly more!

A key concept is that users can never enumerate or list the voids, as otherwise it will likely turn into a vanity war like traditional social media, which in my opinion is at the all-time-high for gamification. I am trying to remove the incentive to say random stuff to make line go up.

I am interested in how people use this kind of technology. I believe in the future when more consumer devices are capable of inference this will be adapted to be more client side and anonymous, with the vector database using homomorphic encryption via [HEVEC].

Check it out: https://void.devrupt.io

This was similar to my last experiment, [Ethos], also with very low inference cost using `qwen3-8b` for the LLM and `qwen3-embedding-8b` for the embedding.

Any feedback about subjects you give it and incorrect analysis is appreciated. I am curious what happens if a lot of people go into a chat at once, and it makes sense to try "Hacker News" as a chat topic.

[Ethos]: https://news.ycombinator.com/item?id=46993774

[HEVEC]: https://news.ycombinator.com/item?id=46873962

Comments URL: https://news.ycombinator.com/item?id=47034339

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: SmartDS – AI route optimization for dark store picking

Hacker News - Mon, 02/16/2026 - 7:43am

Hi HN,

We built SmartDS to solve the "walking problem" in dark stores and micro-fulfillment centers. In facilities over 400 sq.m, pickers often spend more time walking than actually picking.

We developed an AI-powered engine that:

Optimizes picking routes in real-time (reducing travel distance by up to 70%).

Uses parallel picking logic for multi-order fulfillment.

Generates heatmaps and layout recommendations based on SKU velocity and physical constraints (e.g., heavy items first).

It's hardware-agnostic and integrates via API. We’ve seen implementation go from months to about 4 weeks by mapping store layouts digitally first.

We’d love to hear your thoughts on the routing logic or how you’ve handled similar optimization problems in logistics.

Comments URL: https://news.ycombinator.com/item?id=47034307

Points: 1

# Comments: 0

Categories: Hacker News

Ethical Alternative to Grok's AI Video – Recommendations?

Hacker News - Mon, 02/16/2026 - 7:34am

I’m looking for a generative AI that can animate photos into short videos like Grok, but ideally from a company that has a better track record than X. If you’ve researched this space or made a similar switch, I’d really appreciate your thoughts I’m based in the UK, if that matters for availability. Thanks!

Comments URL: https://news.ycombinator.com/item?id=47034247

Points: 1

# Comments: 0

Categories: Hacker News

Pages