<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kernc</title><link>https://news.ycombinator.com/user?id=kernc</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Wed, 29 Apr 2026 23:17:25 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kernc" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kernc in "Issue links now open in a popup"]]></title><description><![CDATA[
<p>Why would they care to empower competitors?</p>
]]></description><pubDate>Sun, 26 Apr 2026 16:03:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47911353</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=47911353</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47911353</guid></item><item><title><![CDATA[New comment by kernc in "Tell HN: Litellm 1.82.7 and 1.82.8 on PyPI are compromised"]]></title><description><![CDATA[
<p>`sandbox-venv` is a small shell script that sandboxes Python virtual environments in separate Linux namespaces using Bubblewrap (and soon using only command `unshare`, bringing the whole script down to effectively 0 deps).<p><a href="https://github.com/sandbox-utils/sandbox-venv" rel="nofollow">https://github.com/sandbox-utils/sandbox-venv</a></p>
]]></description><pubDate>Thu, 26 Mar 2026 10:30:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47528740</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=47528740</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47528740</guid></item><item><title><![CDATA[New comment by kernc in "GIMP 3.2 released"]]></title><description><![CDATA[
<p>Did you also manage to enable menu icons?</p>
]]></description><pubDate>Sat, 14 Mar 2026 21:55:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=47381649</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=47381649</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47381649</guid></item><item><title><![CDATA[New comment by kernc in "GIMP 3.2 released"]]></title><description><![CDATA[
<p>Let everyone be reminded how joyful GIMP 2.10 menus used to look ...<p><a href="https://i.imgur.com/nVyMQBt.png" rel="nofollow">https://i.imgur.com/nVyMQBt.png</a></p>
]]></description><pubDate>Sat, 14 Mar 2026 21:46:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=47381570</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=47381570</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47381570</guid></item><item><title><![CDATA[New comment by kernc in "Show HN: I Built a Sandbox for Agents"]]></title><description><![CDATA[
<p>Probably not. Maybe Bubblewrap and sandbox-run. It's an anything-is-already-way-better-than-nothing type of thing.<p>[0]: <a href="https://github.com/containers/bubblewrap" rel="nofollow">https://github.com/containers/bubblewrap</a><p>[1]: <a href="https://github.com/sandbox-utils/sandbox-run" rel="nofollow">https://github.com/sandbox-utils/sandbox-run</a></p>
]]></description><pubDate>Tue, 03 Feb 2026 21:32:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46877603</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46877603</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46877603</guid></item><item><title><![CDATA[New comment by kernc in "Sandboxing AI Agents in Linux"]]></title><description><![CDATA[
<p>As a heads up and affirmation that the approach is correct, here's a small shell bubblewrap wrapper that boils the command line down to `sandbox-run claude --dangerously-skip-permissions`.<p><a href="https://github.com/sandbox-utils/sandbox-run" rel="nofollow">https://github.com/sandbox-utils/sandbox-run</a></p>
]]></description><pubDate>Tue, 03 Feb 2026 20:06:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46876513</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46876513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46876513</guid></item><item><title><![CDATA[New comment by kernc in "How does misalignment scale with model intelligence and task complexity?"]]></title><description><![CDATA[
<p>Other actionable insights are:<p>- Merge amendments up into the initial prompt.<p>- Evaluate prompts multiple times (ensemble).</p>
]]></description><pubDate>Tue, 03 Feb 2026 02:22:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46865579</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46865579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46865579</guid></item><item><title><![CDATA[New comment by kernc in "Running Claude Code dangerously (safely)"]]></title><description><![CDATA[
<p>It being deprecated and all, didn't feel like wrapping it, but macOS supposedly has a similar `sandbox-exec` command ...</p>
]]></description><pubDate>Tue, 20 Jan 2026 16:09:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46693457</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46693457</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46693457</guid></item><item><title><![CDATA[New comment by kernc in "Running Claude Code dangerously (safely)"]]></title><description><![CDATA[
<p>> Linux-only<p>What other dev OSs are there?<p>> once privileges are dropped [...] it doesn't appear to be possible to reinstate them<p>I don't understand. If unprivileged code could easily re-elevate itself, privilege dropping would be meaningless ...
If you need to communicate with the outside, you can do so via sockets (such as the bind-mounted X11 socket in one of the readme Examples).</p>
]]></description><pubDate>Tue, 20 Jan 2026 15:31:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46692830</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46692830</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46692830</guid></item><item><title><![CDATA[New comment by kernc in "Running Claude Code dangerously (safely)"]]></title><description><![CDATA[
<p>Since everyone tends to present their own solution, I bid you mine:<p><pre><code>    sandbox-run npx @anthropic-ai/claude-code
</code></pre>
This runs npx (...) transparently inside a Bubblewrap sandbox, exposing only the $PWD. Contrary to many other solutions, it is a few lines of pure POSIX shell.<p><a href="https://github.com/sandbox-utils/sandbox-run" rel="nofollow">https://github.com/sandbox-utils/sandbox-run</a></p>
]]></description><pubDate>Tue, 20 Jan 2026 15:08:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46692550</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46692550</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46692550</guid></item><item><title><![CDATA[New comment by kernc in "GitLab discovers widespread NPM supply chain attack"]]></title><description><![CDATA[
<p>I wrote myself a handy and generalized bwrap-wrapping script: <a href="https://github.com/sandbox-utils/sandbox-run" rel="nofollow">https://github.com/sandbox-utils/sandbox-run</a></p>
]]></description><pubDate>Fri, 28 Nov 2025 18:18:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46081221</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46081221</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46081221</guid></item><item><title><![CDATA[New comment by kernc in "Shai-Hulud Returns: Over 300 NPM Packages Infected"]]></title><description><![CDATA[
<p>No.1: Run untrusted code in a sandbox! <a href="https://github.com/sandbox-utils/sandbox-venv" rel="nofollow">https://github.com/sandbox-utils/sandbox-venv</a></p>
]]></description><pubDate>Mon, 24 Nov 2025 15:36:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46035221</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=46035221</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46035221</guid></item><item><title><![CDATA[New comment by kernc in "Firefox 147 Will Support the XDG Base Directory Specification"]]></title><description><![CDATA[
<p>Now that everyone is kindly on board, IBM can finally bury this standard. /s</p>
]]></description><pubDate>Thu, 20 Nov 2025 17:11:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45994942</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45994942</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45994942</guid></item><item><title><![CDATA[New comment by kernc in "Optimism associated with exceptional longevity (2019)"]]></title><description><![CDATA[
<p>What are the reasons for Snapchat? :.</p>
]]></description><pubDate>Wed, 05 Nov 2025 14:42:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=45823349</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45823349</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45823349</guid></item><item><title><![CDATA[New comment by kernc in "NPM flooded with malicious packages downloaded more than 86k times"]]></title><description><![CDATA[
<p>> alias npm=...<p>I use sandbox-run: <a href="https://github.com/sandbox-utils/sandbox-run" rel="nofollow">https://github.com/sandbox-utils/sandbox-run</a><p>The above simple alias may work for node/npm, but it doesn't generalize to many other programs available on the local system, with resources that would need to be mounted into the container ...</p>
]]></description><pubDate>Fri, 31 Oct 2025 02:46:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=45767792</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45767792</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45767792</guid></item><item><title><![CDATA[New comment by kernc in "Show HN: Katakate – Dozens of VMs per node for safe code exec"]]></title><description><![CDATA[
<p>Local-first (on Lunix), POSIX shell: <a href="https://github.com/sandbox-utils/sandbox-run" rel="nofollow">https://github.com/sandbox-utils/sandbox-run</a></p>
]]></description><pubDate>Wed, 22 Oct 2025 08:45:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=45666374</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45666374</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45666374</guid></item><item><title><![CDATA[New comment by kernc in "I almost got hacked by a 'job interview'"]]></title><description><![CDATA[
<p>A simple zero-config alternative using Linux-native containers seems to be sandbox-venv [1] for Python and sandbox-run [2] for npm ...<p>[1]: <a href="https://github.com/sandbox-utils/sandbox-venv" rel="nofollow">https://github.com/sandbox-utils/sandbox-venv</a>
[2]: <a href="https://github.com/sandbox-utils/sandbox-run" rel="nofollow">https://github.com/sandbox-utils/sandbox-run</a></p>
]]></description><pubDate>Wed, 15 Oct 2025 17:47:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=45596113</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45596113</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45596113</guid></item><item><title><![CDATA[New comment by kernc in "I almost got hacked by a 'job interview'"]]></title><description><![CDATA[
<p>> This might be a red flag for Persona service itself as it might contain serious flaws and security vulnerabilities that Cyber criminals are relying on<p>Persona seems to rely solely on NFC with a national passport/ID, so simply stolen documents would work for a certain duration ...</p>
]]></description><pubDate>Wed, 15 Oct 2025 17:41:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=45596034</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45596034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45596034</guid></item><item><title><![CDATA[New comment by kernc in "I almost got hacked by a 'job interview'"]]></title><description><![CDATA[
<p>You can use special a Unicode strikethrough glyphs such as available in <a href="https://efck-chat-keyboard.github.io" rel="nofollow">https://efck-chat-keyboard.github.io</a></p>
]]></description><pubDate>Wed, 15 Oct 2025 17:34:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=45595932</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45595932</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45595932</guid></item><item><title><![CDATA[New comment by kernc in "Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised"]]></title><description><![CDATA[
<p>Is exactly why I composed bubblewrap-based sandbox-venv for Python: <a href="https://github.com/kernc/sandbox-venv" rel="nofollow">https://github.com/kernc/sandbox-venv</a><p>Dangerous times we live in.</p>
]]></description><pubDate>Wed, 17 Sep 2025 15:48:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=45277278</link><dc:creator>kernc</dc:creator><comments>https://news.ycombinator.com/item?id=45277278</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45277278</guid></item></channel></rss>