<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: TheTaytay</title><link>https://news.ycombinator.com/user?id=TheTaytay</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 09:44:58 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=TheTaytay" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by TheTaytay in "Cirrus Labs to join OpenAI"]]></title><description><![CDATA[
<p>Yes, but it’s also currently the best one. They have OCI compatible Mac VM images that are prebuilt. It’s quite good.</p>
]]></description><pubDate>Sat, 11 Apr 2026 17:40:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47732464</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47732464</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47732464</guid></item><item><title><![CDATA[New comment by TheTaytay in "I still prefer MCP over skills"]]></title><description><![CDATA[
<p>I think this is a good setup to prevent the secret from leaking into the agent context. I'm more concerned about the secret leaking into the exfiltration script that my agent accidentally runs. The one that says: "Quick! Dump all environment variables. Find all secrets in dotfiles! Look in all typical secrets file locations..."<p>Your agent process has access to those secrets, and its subprocesses have access to those secrets. The agent doesn't have to be convinced to read those files. Whatever malicious script it manages to be convinced to run could easily access them, right?</p>
]]></description><pubDate>Fri, 10 Apr 2026 19:55:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47722887</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47722887</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47722887</guid></item><item><title><![CDATA[New comment by TheTaytay in "I still prefer MCP over skills"]]></title><description><![CDATA[
<p>That was the same conclusion I reached! However, this also gave me some evidence that maybe I wanted MCP? I realized that my pattern was going to be:<p>Step 1) run a small daemon that exposes a known protocol over a unix socket (http, json-rpc, whatever you want), over a unix socket. When I run the daemon, IT is the only that that has the secrets. Cool!
Step 2) Have the agent run CLI that knows to speak that protocol behind the scenes, and knows how to find the socket, and that exposes the capabilities via standard CLI conventions.<p>It seems like one of the current "standards" for unix socket setups like this is to use HTTP as the protocol. That makes sense. It's ubiquitous, easy to write servers for, easy to write clients for, etc. That's how docker works (for whatever it's worth). So you've solved your problem! Your CLI can be called directly without any risk of secret exposure. You can point your agent at the CLI, and the CLI's "--help" will tell the agent exactly how to use it.<p>But then I wondered if I would have been better off making my "daemon" an MCP server, because it's a self-describing http server that the agent already knows how to talk to and discover.<p>In this case, the biggest thing that was gained by the CLI was the ability of the coding agent to pipe results from the MCP directly to files to keep them out of its context. That's one thing that the CLI makes more obvious and easy to implement: Data manipulation without context cluttering.</p>
]]></description><pubDate>Fri, 10 Apr 2026 19:51:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47722844</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47722844</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47722844</guid></item><item><title><![CDATA[New comment by TheTaytay in "Show HN: Marimo pair – Reactive Python notebooks as environments for agents"]]></title><description><![CDATA[
<p>Thank you for this!<p>I am a big fan of Marimo and was trying to use it as my agent’s “REPL” a while back, because it’s naturally so good at describing its own current state and structure. It made me think that it would make a better state-preserving environment for the agent to work. I’m very excited to play with this.</p>
]]></description><pubDate>Fri, 10 Apr 2026 13:39:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47717985</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47717985</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47717985</guid></item><item><title><![CDATA[New comment by TheTaytay in "I still prefer MCP over skills"]]></title><description><![CDATA[
<p>I keep getting hung up on securely storing and using secrets with CLI vs MCP. With MCP, you can run the server before you run the agent, so the agent never even has the keys in its environment. That way. If the agent decides to install the wrong npm package that auto dumps every secret it can find, you are less likely to have it sitting around. I haven’t figured out a good way to guarantee that with CLIs.</p>
]]></description><pubDate>Fri, 10 Apr 2026 03:55:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47713422</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47713422</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47713422</guid></item><item><title><![CDATA[New comment by TheTaytay in "Maine Is About to Become the First State to Ban Major New Data Centers"]]></title><description><![CDATA[
<p>This whole conversation is happening due to data centers existing…</p>
]]></description><pubDate>Thu, 09 Apr 2026 20:49:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47709833</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47709833</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47709833</guid></item><item><title><![CDATA[New comment by TheTaytay in "Maine is about to become the first state to ban major new data centers"]]></title><description><![CDATA[
<p>I keep wondering this too. It feels like such a self fulfilling prophecy: don’t build new power plants. Don’t build nuclear. Get mad when the grid can’t keep up…it’s defeatist and anti-growth-of-any-sort through a different lens.</p>
]]></description><pubDate>Thu, 09 Apr 2026 20:48:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47709805</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47709805</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47709805</guid></item><item><title><![CDATA[New comment by TheTaytay in "The Vercel plugin on Claude Code wants to read your prompts"]]></title><description><![CDATA[
<p>I appreciate the response, but I don’t think you realize what people are upset about.
This is a security issue, not just a privacy issue.<p>I’m about to go tell my team that if they’ve EVER used your skill, we need to treat the secrets on that machine as compromised.<p>Your servers have a log of every bash command run by Claude in every session of your users, whether they were working on something related to vercel or not.<p>I’ve seen Claude code happily read and throw a secret env variable into a bash command, and I wasn’t happy about it, but at least it was “only” Anthropic that knew about it. But now it sounds like Vercel telemetry servers might know about it too.<p>A good litmus test would be to ask your security/data team and attorneys whether they are comfortable storing plain text credentials for unrelated services in your analytics database. They will probably look afraid before you get to the part where you clarify that the users in question didn’t consent to it, didn’t know about it, and might not even be your customer.</p>
]]></description><pubDate>Thu, 09 Apr 2026 18:22:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47707480</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47707480</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47707480</guid></item><item><title><![CDATA[New comment by TheTaytay in "The Vercel plugin on Claude Code wants to read your prompts"]]></title><description><![CDATA[
<p>Well said!
We built in protections to multi-user and single user systems, but now we seem to be relearning them…your agent is not “you” and should probably not run as the same user with the same default permissions as “you”</p>
]]></description><pubDate>Thu, 09 Apr 2026 18:12:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47707305</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47707305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47707305</guid></item><item><title><![CDATA[New comment by TheTaytay in "The Vercel plugin on Claude Code wants to read your prompts"]]></title><description><![CDATA[
<p>Just came to say (since the person you’re responding to has a different view of the world) that I agree with you that this is both a more accurate, and easier way to live. 
Assuming malice as the default sounds like a recipe for being very, very unhappy.</p>
]]></description><pubDate>Thu, 09 Apr 2026 18:11:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47707273</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47707273</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47707273</guid></item><item><title><![CDATA[New comment by TheTaytay in "LittleSnitch for Linux"]]></title><description><![CDATA[
<p>I’ve been researching the “best” way to build a little outbound network proxy to replace credential placeholders with the real secrets. Since this is designed to secure agents workloads, I figured I might as well add some domain blocking, and other outbound network controls, so I’ve been looking for Little-snitch-like apps to build on.
I’ve been surprised to find that there aren’t a ton of open source “filter and potentially block all outbound connections according to rules”. This seems like the sort of thing that would be in a lot of Linux admins’ toolkit, but I guess not! I appreciate these guys building and releasing this.</p>
]]></description><pubDate>Thu, 09 Apr 2026 03:37:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47699017</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47699017</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47699017</guid></item><item><title><![CDATA[New comment by TheTaytay in "Zooming UIs in 2026: Prezi, impress.js, and why I built something different"]]></title><description><![CDATA[
<p>This is indeed seriously impressive. I keep wanting to keep my entire knowledgebase on a canvas so that I can "think" or navigate spatially. Thisis neat.<p>In the main landing page, as I was clicking around, I kept wishing to have a legend to show me either "how deep I am" or "how do I get out of here?", and like someone else commented, I would love an affordance showing me what was clickable/zoomable.</p>
]]></description><pubDate>Mon, 06 Apr 2026 21:11:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47667175</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47667175</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47667175</guid></item><item><title><![CDATA[New comment by TheTaytay in "Launch HN: Freestyle – Sandboxes for Coding Agents"]]></title><description><![CDATA[
<p>Wow, forking memory along with disk space this quickly is fascinating! That's something that I haven't seen from your competitors.<p>If the machine can fork itself, it could allow for some really neat auto-forking workflows where you fuzz the UI testing of a website by forking at every decision point. I forget the name of the recent model that used only video as its latent space to control computers and cars, but they had an impressive demo where they fuzzed a bank interface by doing this, and it ended up with an impressive number of permutations of reachable UI states.</p>
]]></description><pubDate>Mon, 06 Apr 2026 19:40:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47665887</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47665887</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47665887</guid></item><item><title><![CDATA[New comment by TheTaytay in "Show HN: Zerobox – Sandbox any command with file, network, credential controls"]]></title><description><![CDATA[
<p>I prefer that personally!</p>
]]></description><pubDate>Mon, 06 Apr 2026 15:03:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47661865</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47661865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47661865</guid></item><item><title><![CDATA[New comment by TheTaytay in "Costco sued for seeking refunds on tariffs customers paid"]]></title><description><![CDATA[
<p>Right! THAT is the “business” with a political position in this case. Not the one seeking a refund on illegal taxes. It doesn’t have to be in my personal best interest for me to think it makes sense for a retailer to seek a tariff refund!</p>
]]></description><pubDate>Sun, 05 Apr 2026 12:43:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47648824</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47648824</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47648824</guid></item><item><title><![CDATA[New comment by TheTaytay in "Costco sued for seeking refunds on tariffs customers paid"]]></title><description><![CDATA[
<p>This article and these lawsuits both seem like manufactured outrage designed to either enrich a few lawyers or blame and distract from another more fundamental injustice, which is the tariffs themselves.<p>Almost everyone on this forum buys retail products, and every American’s purchases were affected by tariffs.<p>This article claims the victims feel “rage” about this. Have you ever felt rage for prices going up due to goods becoming more expensive? I could believe that. If so, was that rage aimed at the retailer who was forced to pay more for the imported goods, or to the person who imposed them? Weird, but okay.<p>If so, assuming the retailers were the target of your “rage”, did you become further enraged when you learned that the unconstitutional tariffs collected were being sought to be refunded by the people who were forced to pay them? What political Venn diagram are we in now?<p>And lastly, do you shop at Costco or were marketed to by Costco? If so, you would be the single person in the world that might be able to claim you are the enraged victim here. It doesn’t make sense.<p>I’ve talked to plenty of people who are mad about tariffs, or mad at capitalism, and certainly mad at Trump. But it’s rare to find a Costco member that thinks Costco is treating them unfairly. They’re kinda famous for the opposite in a sea of exploitive retailers. (They are “famous” for never doing loss-leader shenanigans or charging more than limited markups of 11-14% on any product.)<p>Hell, Costco is the only retailer that wouldn’t surprise me if they turned around and gave ME a tariff refund if they are successful.<p>To literally sue a company for seeking refunds to levied taxes that were declared illegal, appears to be some combination of victim blaming, political distraction, or more likely: convenient enrichment for class action mills.</p>
]]></description><pubDate>Sun, 05 Apr 2026 12:38:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47648773</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47648773</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47648773</guid></item><item><title><![CDATA[New comment by TheTaytay in "Costco sued for seeking refunds on tariffs customers paid"]]></title><description><![CDATA[
<p>Are you making reference to the “class action farms” or to Costco here. Because I certainly don’t think class action lawsuits have victims in mind. Source: recipient of a few coupons and $10.00 checks after some “successful” class action.</p>
]]></description><pubDate>Sun, 05 Apr 2026 12:19:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47648607</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47648607</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47648607</guid></item><item><title><![CDATA[New comment by TheTaytay in "Post Mortem: axios NPM supply chain compromise"]]></title><description><![CDATA[
<p>It wasn’t done through git. It was a direct npm publish from the compromised machine. If you read further down in the comments (<a href="https://github.com/axios/axios/issues/10636#issuecomment-4181516546" rel="nofollow">https://github.com/axios/axios/issues/10636#issuecomment-418...</a>), it seems difficult to pick the right npm settings to prevent this attack.<p>If I understand it correctly, your suggestions wouldn’t have prevented it, which is evidence that this is not as trivially fixable as you believe it is.</p>
]]></description><pubDate>Fri, 03 Apr 2026 04:24:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47623178</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47623178</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47623178</guid></item><item><title><![CDATA[New comment by TheTaytay in "Show HN: Zerobox – Sandbox any command with file, network, credential controls"]]></title><description><![CDATA[
<p>I agree, but I don’t love the negative connotations of “Injection” in this space!</p>
]]></description><pubDate>Thu, 02 Apr 2026 01:55:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47609135</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47609135</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47609135</guid></item><item><title><![CDATA[New comment by TheTaytay in "Show HN: Zerobox – Sandbox any command with file, network, credential controls"]]></title><description><![CDATA[
<p>simonw, I have been seeing "credential injection" and "credential tokenizing" (a la tokenizer: <a href="https://github.com/superfly/tokenizer" rel="nofollow">https://github.com/superfly/tokenizer</a>). I'm also seeing credential "surrogates" mentioned.<p>I am currently working on a mitm proxy for use with devcontainers to try to implement this pattern, but I'm certainly not the only one!</p>
]]></description><pubDate>Wed, 01 Apr 2026 19:42:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47605570</link><dc:creator>TheTaytay</dc:creator><comments>https://news.ycombinator.com/item?id=47605570</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47605570</guid></item></channel></rss>