<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: buremba</title><link>https://news.ycombinator.com/user?id=buremba</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 09 Apr 2026 12:39:33 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=buremba" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by buremba in "OpenAI says its new model GPT-2 is too dangerous to release (2019)"]]></title><description><![CDATA[
<p>It playbook is that a model is too dangerous until a competitor releases a competing model that beats yours.</p>
]]></description><pubDate>Wed, 08 Apr 2026 03:05:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47684526</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47684526</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47684526</guid></item><item><title><![CDATA[New comment by buremba in "Show HN: Mtproto.zig – High-performance Telegram proxy with DPI evasion"]]></title><description><![CDATA[
<p>You can ask your agent to verify or review code. Just because people wrote code by hand, it doesn't mean you should trust</p>
]]></description><pubDate>Sat, 04 Apr 2026 03:10:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47635288</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47635288</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47635288</guid></item><item><title><![CDATA[New comment by buremba in "Tell HN: Anthropic no longer allowing Claude Code subscriptions to use OpenClaw"]]></title><description><![CDATA[
<p>I get why they block OpenClaw and it makes sense but I wonder if they can actually detect OpenClaw calling Claude Code CLI using something like acpx.<p>It's simply identical to how people use Claude Code locally.</p>
]]></description><pubDate>Sat, 04 Apr 2026 00:47:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47634338</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47634338</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47634338</guid></item><item><title><![CDATA[New comment by buremba in "Show HN: Mtproto.zig – High-performance Telegram proxy with DPI evasion"]]></title><description><![CDATA[
<p>does it matter?</p>
]]></description><pubDate>Sat, 04 Apr 2026 00:31:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47634211</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47634211</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47634211</guid></item><item><title><![CDATA[New comment by buremba in "Delve allegedly forked an open-source tool and sold it as its own"]]></title><description><![CDATA[
<p>Compliance tech company who doesn't know about open-source. Interesting.</p>
]]></description><pubDate>Thu, 02 Apr 2026 17:35:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47617510</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47617510</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47617510</guid></item><item><title><![CDATA[New comment by buremba in "MCP Is Overengineered, Skills Are Too Primitive"]]></title><description><![CDATA[
<p>I extensively use uv (IMO better than venv) but still it's Python specific and not universal. npm is much worse and native binaries are almost impossible to deal with multiple versions.<p>nix is specifically targeting this use-case and it'e extensively used by vendors like Replit.</p>
]]></description><pubDate>Thu, 02 Apr 2026 16:03:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47616276</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47616276</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47616276</guid></item><item><title><![CDATA[New comment by buremba in "MCP Is Overengineered, Skills Are Too Primitive"]]></title><description><![CDATA[
<p>They're composable but computers are not. Two skills might depend on a different version of a dependency which is pretty hard to maintain and their needs to be a deterministic system (agents are not) to resolve the conflicts and make sure two skills can live in the same environment.</p>
]]></description><pubDate>Thu, 02 Apr 2026 15:33:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=47615849</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47615849</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47615849</guid></item><item><title><![CDATA[New comment by buremba in "MCP Is Overengineered, Skills Are Too Primitive"]]></title><description><![CDATA[
<p>I vote for taste</p>
]]></description><pubDate>Thu, 02 Apr 2026 15:30:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=47615818</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47615818</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47615818</guid></item><item><title><![CDATA[MCP Is Overengineered, Skills Are Too Primitive]]></title><description><![CDATA[
<p>Article URL: <a href="https://lobu.ai/blog/mcp-is-overengineered-skills-are-too-primitive/">https://lobu.ai/blog/mcp-is-overengineered-skills-are-too-primitive/</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47615192">https://news.ycombinator.com/item?id=47615192</a></p>
<p>Points: 3</p>
<p># Comments: 6</p>
]]></description><pubDate>Thu, 02 Apr 2026 14:42:54 +0000</pubDate><link>https://lobu.ai/blog/mcp-is-overengineered-skills-are-too-primitive/</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47615192</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47615192</guid></item><item><title><![CDATA[New comment by buremba in "When does MCP make sense vs CLI?"]]></title><description><![CDATA[
<p>CLI enables the actions to be made on behalf of you, the external service is not aware whether it's you or AI making the calls. With MCP, Sentry knows it's AI making the call so can be smarter about the security. There is many MCP annotation hints on tools to mark the as destructive, read-only etc.</p>
]]></description><pubDate>Mon, 02 Mar 2026 12:19:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47217070</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47217070</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47217070</guid></item><item><title><![CDATA[New comment by buremba in "When does MCP make sense vs CLI?"]]></title><description><![CDATA[
<p>There is nothing wrong with MCP, it's just that stdio MCP was overengineered.<p>MCP's Streamable HTTP with OAuth discovery is the best way to ship AI integration with your product nowadays. CLIs require sandboxing, doesn't handle auth in a standard way and it doesn't integrate to ChatGPT or Claude.<p>Look at Sentry, they just ship a single URL <a href="https://mcp.sentry.dev/mcp" rel="nofollow">https://mcp.sentry.dev/mcp</a> and you don't need anything else. All agents that supports MCP lets you click a link to login to Sentry and they make calls to Sentry to fetch authentificated data.<p>The main problem with MCP is the implementation. Instead of using bash to call MCP, agents are designed to make single MCP tool calling which doesn't allow composability. We solve this problem with exposing MCP tools as HTTP endpoints and it works like charm.</p>
]]></description><pubDate>Sun, 01 Mar 2026 21:52:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47211079</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47211079</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47211079</guid></item><item><title><![CDATA[New comment by buremba in "Don't trust AI agents"]]></title><description><![CDATA[
<p>>  but it only works if the proxy itself is hardened against prompt injection.<p>Yes, I'm experimenting using a small model like Haiku to double check if the request looks good. It adds quite a bit of latency but it might be the right approach.<p>Honestly; it's still pretty much like early days of self driving cars. You can see the car can go without you supervising it but still you need to keep an eye on where it's going.</p>
]]></description><pubDate>Sat, 28 Feb 2026 21:11:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=47200278</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47200278</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47200278</guid></item><item><title><![CDATA[New comment by buremba in "MCP server that reduces Claude Code context consumption by 98%"]]></title><description><![CDATA[
<p>AFAIK Claude Code doesn't inject all the MCP output into the context. It limits 25k tokens and uses bash pipe operators to read the full output. That's at least what I see in the latest version.</p>
]]></description><pubDate>Sat, 28 Feb 2026 19:00:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47198943</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47198943</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47198943</guid></item><item><title><![CDATA[New comment by buremba in "Don't trust AI agents"]]></title><description><![CDATA[
<p>> Right now there's no way to have fine-grained draft/read only perms on most email providers or email clients. If it can read your email it can send email.<p>> harder than you might think. openclaw found my browser cookies. (I ran it on a vm so no serious cookies found, but still)<p>You should never give any secrets to your agents, like your Gmail access tokens. Whenever agents needs to take an action, it should perform the request and your proxy should check if the action is allowed and set the secrets on the fly.<p>That means agents should not have access to internet without a proxy, which has proper guardrails. Openclaw doesn't have this model unfortunately so I had to build a multi-tenant version of Openclaw with a gateway system to implement these security boundaries.</p>
]]></description><pubDate>Sat, 28 Feb 2026 15:02:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47196120</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47196120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47196120</guid></item><item><title><![CDATA[New comment by buremba in "Don't trust AI agents"]]></title><description><![CDATA[
<p>My take is that agents should only take actions that you can recover from by default. You can gradually give it more permission and build guardrails such as extra LLM auditing, time boxed whitelisted domains etc. That's what I'm experimenting with <a href="https://github.com/lobu-ai/lobu" rel="nofollow">https://github.com/lobu-ai/lobu</a><p>1. Don't let it send emails from your personal account, only let it draft email and share the link with you.<p>2. Use incremental snapshots and if agent bricks itself (often does with Openclaw if you give it access to change config) just do /revert to last snapshot. I use VolumeSnapshot for lobu.ai.<p>3. Don't let your agents see any secret. Swap the placeholder secrets at your gateway and put human in the loop for secrets you care about.<p>4. Don't let your agents have outbound network directly. It should only talk to your proxy which has strict whitelisted domains. There will be cases the agent needs to talk to different domains and I use time-box limits. (Only allow certain domains for current session 5 minutes and at the end of the session look up all the URLs it accessed.) You can also use tool hooks to audit the calls with LLM to make sure that's not triggered via a prompt injection attack.<p>Last but last least, use proper VMs like Kata Containers and Firecrackers. Not just Docker containers in production.</p>
]]></description><pubDate>Sat, 28 Feb 2026 13:27:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47195106</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47195106</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47195106</guid></item><item><title><![CDATA[New comment by buremba in "Claude Code Remote Control"]]></title><description><![CDATA[
<p>I think they should be aware that CC is big enough codebase that they can't vibe code anymore.</p>
]]></description><pubDate>Wed, 25 Feb 2026 19:49:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47156853</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47156853</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47156853</guid></item><item><title><![CDATA[New comment by buremba in "Sandboxes won't save you from OpenClaw"]]></title><description><![CDATA[
<p>Sandboxes are not enough but you can have more observability into what the agent is doing, only give it access to read-only data and let it take irreversible actions that you can recover from. Here are some tips from building sandboxed multi-tenant version of Openclaw, my startup: <a href="https://github.com/lobu-ai/lobu" rel="nofollow">https://github.com/lobu-ai/lobu</a><p>1. Don't let it send emails from your personal account, only let it draft email and share the link with you.<p>2. Use incremental snapshots and if agent bricks itself (often does with Openclaw if you give it access to change config) just do /revert to last snapshot. I use VolumeSnapshot for lobu.ai.<p>3. Don't let your agents see any secret. Swap the placeholder secrets at your gateway and put human in the loop for secrets you care about.<p>4. Don't let your agents have outbound network directly. It should only talk to your proxy which has strict whitelisted domains. There will be cases the agent needs to talk to different domains and I use time-box limits. (Only allow certain domains for current session 5 minutes and at the end of the session look up all the URLs it accessed.) You can also use tool hooks to audit the calls with LLM to make sure that's not triggered via a prompt injection attack.<p>Last but last least, use proper VMs like Kata Containers and Firecrackers.</p>
]]></description><pubDate>Wed, 25 Feb 2026 19:43:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47156753</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47156753</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47156753</guid></item><item><title><![CDATA[New comment by buremba in "Pi – A minimal terminal coding harness"]]></title><description><![CDATA[
<p>Page returns 404. ACP is great, indeed better to give pi-mono ACP than claude or codex directly. <a href="https://x.com/bu7emba/status/2026364497527513440" rel="nofollow">https://x.com/bu7emba/status/2026364497527513440</a></p>
]]></description><pubDate>Wed, 25 Feb 2026 12:54:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47150874</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47150874</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47150874</guid></item><item><title><![CDATA[New comment by buremba in "Pi – A minimal terminal coding harness"]]></title><description><![CDATA[
<p>Nobody knows, including Anthropic itself I suppose</p>
]]></description><pubDate>Wed, 25 Feb 2026 12:23:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47150604</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47150604</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47150604</guid></item><item><title><![CDATA[New comment by buremba in "Pi – A minimal terminal coding harness"]]></title><description><![CDATA[
<p>You technically still use CC, it's not via SDK but via CLI programmatically triggered via pi.</p>
]]></description><pubDate>Wed, 25 Feb 2026 08:02:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=47148705</link><dc:creator>buremba</dc:creator><comments>https://news.ycombinator.com/item?id=47148705</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47148705</guid></item></channel></rss>