<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: brianwmunz</title><link>https://news.ycombinator.com/user?id=brianwmunz</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 17:44:01 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=brianwmunz" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by brianwmunz in "Write less code, be more responsible"]]></title><description><![CDATA[
<p>Honestly I think you can tell pretty quickly if a company or person is approaching AI from the viewpoint of accelerating development and innovation or just looking to do the same amount of work with less people. The space has been flooded by mean-spirited people who love the idea of developers becoming obsolete, which is a viewpoint that isn't working out for a lot of companies right now...many are already scrambling to rehire. Approaching the situation practically, integrating AI as a tool and accelerator is the much smarter way and if done right will pay for itself anyway.</p>
]]></description><pubDate>Tue, 14 Apr 2026 01:16:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47760061</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47760061</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47760061</guid></item><item><title><![CDATA[New comment by brianwmunz in "Ask HN: Do you trust AI agents with API keys / private keys?"]]></title><description><![CDATA[
<p>Most of this thread is about protecting keys on a single developer's machine, but the problem gets way harder when you're managing credentials across customer tenants... env vars and secrets managers don't solve the orchestration problem as much the storage problem. The hard part is making sure the right token gets used for the right customer's API call at the right time without any cross-tenant leakage.</p>
]]></description><pubDate>Mon, 13 Apr 2026 13:00:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47751356</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47751356</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47751356</guid></item><item><title><![CDATA[New comment by brianwmunz in "Show HN: AI agents are bad at API integrations – we fixed it"]]></title><description><![CDATA[
<p>PayPal benchmark is a smart way to launch this I think...showing real numbers on a recognizable API gives people something concrete to evaluate against. The 65% token reduction is probably the stat that'll matter most to teams watching API costs. One thing I'd be a little worried about is how this handles APIs that version aggressively or have breaking changes between major versions. The context packaging seems like it'd get complicated fast when you're maintaining accuracy across v1 and v2 of the same API simultaneously.</p>
]]></description><pubDate>Sat, 11 Apr 2026 18:43:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47732967</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47732967</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47732967</guid></item><item><title><![CDATA[New comment by brianwmunz in "Ask HN: How do you enforce least-privilege when an API token has full access?"]]></title><description><![CDATA[
<p>A good idea is to build thin proxy layers that map "coarse" upstream tokens to more fine tuned internal permissions. The proxy holds the real API token and your internal services authenticate with scoped tokens that only allow specific endpoints/operations. Works well but you're basically rebuilding OAuth scoping yourself...which is why some teams just accept the risk and focus their security effort on token rotation and monitoring instead.</p>
]]></description><pubDate>Sun, 15 Mar 2026 15:59:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=47388654</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47388654</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47388654</guid></item><item><title><![CDATA[New comment by brianwmunz in "My Website's API Was Flagged as Phishing–and I Still Don't Know Why"]]></title><description><![CDATA[
<p>I've seen similar with AWS where an API endpoint got flagged for "suspicious traffic patterns" just because it was serving webhooks at irregular intervals. The appeal process took weeks and nobody could explain what triggered it. Firebase's tooling for this stuff feels like a black box.</p>
]]></description><pubDate>Fri, 13 Mar 2026 02:49:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47360136</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47360136</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47360136</guid></item><item><title><![CDATA[New comment by brianwmunz in "Create Google API credentials in 50 easy steps (2023)"]]></title><description><![CDATA[
<p>Lol...Google's credential setup really is the worst part of building anything with their APIs. The actual API calls are usually fine, but getting there feels like a bureaucracy designed by people who never had to use it themselves.</p>
]]></description><pubDate>Wed, 11 Mar 2026 00:34:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47330540</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47330540</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47330540</guid></item><item><title><![CDATA[New comment by brianwmunz in "Advice for Operating a Public-Facing API (2023)"]]></title><description><![CDATA[
<p>I know this is old but the OAuth advice aged well. Two years later it's still the part of every integration project that eats the most time relative to how simple it seems... Prefixed tokens especially is one of those things that seems obvious in hindsight but saves a ton in support.</p>
]]></description><pubDate>Tue, 10 Mar 2026 02:53:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47318596</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47318596</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47318596</guid></item><item><title><![CDATA[New comment by brianwmunz in "MCP Won't Solve Enterprise AI Integration (We're Missing a Layer)"]]></title><description><![CDATA[
<p>The missing middleware layer is real... MCP handles the wire format but you still need something managing OAuth flows, token refresh, rate limiting, schema mapping per user etc... all the operational stuff. Authentication alone is brutal when you've got dozens of different OAuth implementations each with their own issues around scopes and refresh logic which is where most integrations get bogged down</p>
]]></description><pubDate>Tue, 10 Mar 2026 02:49:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47318570</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47318570</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47318570</guid></item><item><title><![CDATA[New comment by brianwmunz in "Show HN: Mcp2cli – One CLI for every API, 96-99% fewer tokens than native MCP"]]></title><description><![CDATA[
<p>The token savings bit is interesting but seems incomplete without showing that tool call accuracy holds up. 
I like the CLI-as-interface idea...the model already knows how to use CLIs, and on-demand discovery is genuinely smarter than front-loading every schema.
How are you handling cases where a tool's schema changes between discovery and invocation? is there a cache invalidation story there or does it just re-fetch?</p>
]]></description><pubDate>Tue, 10 Mar 2026 02:30:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47318446</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47318446</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47318446</guid></item><item><title><![CDATA[New comment by brianwmunz in "We went from 13 to 48 tools in our trading risk API for AI agents"]]></title><description><![CDATA[
<p>Very cool..did you build this as one monolithic API with 48 endpoints, or separate services?</p>
]]></description><pubDate>Mon, 09 Mar 2026 20:08:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47314747</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47314747</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47314747</guid></item><item><title><![CDATA[New comment by brianwmunz in "Show HN: Mnemora – Serverless memory DB for AI agents (no LLM in your CRUD path)"]]></title><description><![CDATA[
<p>The no-LLM-in-CRUD-path thing makes sense...I've seen teams hit real latency walls routing every memory operation through inference.
What's your thinking around retrieval patterns? Most agent memory systems I've worked with end up needing vector similarity for semantic search but also structured queries for stuff like "all conversations from last week." Are you planning to support both or staying vector-focused?</p>
]]></description><pubDate>Fri, 06 Mar 2026 04:36:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47270921</link><dc:creator>brianwmunz</dc:creator><comments>https://news.ycombinator.com/item?id=47270921</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47270921</guid></item></channel></rss>