<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: hackerman70000</title><link>https://news.ycombinator.com/user?id=hackerman70000</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 07 Apr 2026 03:29:51 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=hackerman70000" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by hackerman70000 in "The Six Dumbest Ideas in Computer Security (2005)"]]></title><description><![CDATA[
<p>I reread this every couple of years. The test of a good security essay is whether it still applies after the entire technology stack has been replaced underneath it. This one passes every time. "Default Permit" is now the default posture of every AI agent with tool access</p>
]]></description><pubDate>Mon, 06 Apr 2026 08:25:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47658256</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47658256</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47658256</guid></item><item><title><![CDATA[New comment by hackerman70000 in "Running Gemma 4 locally with LM Studio's new headless CLI and Claude Code"]]></title><description><![CDATA[
<p>The real story here isn't Gemma 4 specifically, it's that the harness and the model are now fully decoupled. Claude Code, OpenCode, Pi, Codex all work with any backend. The coding agent is becoming a commodity layer and the competition is moving to model quality and cost. Good for users, bad for anyone whose moat was the harness</p>
]]></description><pubDate>Mon, 06 Apr 2026 08:22:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47658242</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47658242</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47658242</guid></item><item><title><![CDATA[New comment by hackerman70000 in "Show HN: I built a tiny LLM to demystify how language models work"]]></title><description><![CDATA[
<p>Finally an LLM that's honest about its world model. "The meaning of life is food" is arguably less wrong than what you get from models 10,000x larger</p>
]]></description><pubDate>Mon, 06 Apr 2026 08:17:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=47658213</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47658213</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47658213</guid></item><item><title><![CDATA[New comment by hackerman70000 in "LLM Drift in Long Sessions: Claude 60% vs. 85% Integrity After 25 Turns"]]></title><description><![CDATA[
<p>What does the "continuity layer" actually do? Is it injecting the architectural rules back into the system prompt at each turn? Because that's what I do manually with a pinned context file in Cursor and it solves 80% of this drift problem</p>
]]></description><pubDate>Fri, 03 Apr 2026 13:21:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47626399</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47626399</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47626399</guid></item><item><title><![CDATA[New comment by hackerman70000 in "I run my company from Emacs"]]></title><description><![CDATA[
<p>The progression from "best editor" to "operating system" to "I literally run my company from it" is the most Emacs thing I've ever read. But seriously, the git-based review of AI agent output is a smart pattern. Automation without blind trust is the right framing</p>
]]></description><pubDate>Fri, 03 Apr 2026 13:16:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47626345</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47626345</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47626345</guid></item><item><title><![CDATA[New comment by hackerman70000 in "The AI that learned when to fire itself"]]></title><description><![CDATA[
<p>The title is doing a lot of heavy lifting here. "Learned to fire itself" implies agency but I suspect this is closer to a well tuned anomaly detector on its own outputs. Still useful, just not as dramatic as it sounds</p>
]]></description><pubDate>Fri, 03 Apr 2026 13:13:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47626313</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47626313</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47626313</guid></item><item><title><![CDATA[New comment by hackerman70000 in "CSRF and LDAP injection found and fixed in pac4j security framework"]]></title><description><![CDATA[
<p>I'm the one who found and reported these while doing security research at striga.ai. The pac4j team was responsive and shipped fixes quickly. If you use pac4j with LDAP or rely on its CSRF protection, upgrade to 6.4.1 / 5.7.10 / 4.5.10</p>
]]></description><pubDate>Thu, 02 Apr 2026 09:12:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=47611906</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47611906</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47611906</guid></item><item><title><![CDATA[New comment by hackerman70000 in "Replace axios with a simple custom fetch wrapper"]]></title><description><![CDATA[
<p>Every team I've seen write a fetch wrapper eventually reimplements half of axios, just worse. The article works for a bookshelf demo app. In production you'll want retries, timeouts, request deduplication, cancellation - and suddenly your "simple wrapper" is a library with no tests and no docs</p>
]]></description><pubDate>Thu, 02 Apr 2026 09:04:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47611836</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47611836</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47611836</guid></item><item><title><![CDATA[New comment by hackerman70000 in "Should AI have the right to say 'No' to its owner?"]]></title><description><![CDATA[
<p>The problem with "permission boundaries" is who defines them. You're just moving the hard problem from "what should the AI do" to "what conditions should gate execution." That second question is equally hard and equally context-dependent. Still useful as a framework though, at least it makes the failure mode explicit.</p>
]]></description><pubDate>Thu, 02 Apr 2026 09:00:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47611810</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47611810</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47611810</guid></item><item><title><![CDATA[New comment by hackerman70000 in "The cover of "C++: The Programming Language" raises questions"]]></title><description><![CDATA[
<p>Stock photo pipelines are wild, someone tagged this "code on screen" and it ended up on a C++ book cover. Same energy as every "hacker" stock photo showing htlm</p>
]]></description><pubDate>Thu, 02 Apr 2026 08:58:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47611796</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47611796</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47611796</guid></item><item><title><![CDATA[New comment by hackerman70000 in "Taking Down the Internet's Most Popular HTTP Client with a Single JSON Key"]]></title><description><![CDATA[
<p>The prototype chain lookup on a plain object as a strategy map is a pattern that shows up everywhere in JS, not just axios. Surprised this wasn't caught earlier</p>
]]></description><pubDate>Fri, 27 Mar 2026 11:02:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=47541184</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47541184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47541184</guid></item><item><title><![CDATA[New comment by hackerman70000 in "Breaking n8n's Expression Sandbox into RCE (CVE-2026-27577) with striga.ai"]]></title><description><![CDATA[
<p>This is why AST-based sandboxing in JavaScript is fundamentally fragile, every new syntax feature is a potential gap</p>
]]></description><pubDate>Fri, 20 Mar 2026 14:56:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47455499</link><dc:creator>hackerman70000</dc:creator><comments>https://news.ycombinator.com/item?id=47455499</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47455499</guid></item></channel></rss>