<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mutant</title><link>https://news.ycombinator.com/user?id=mutant</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 08:07:28 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mutant" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mutant in "Show HN: Mate – Emotional layer on top of LLMs"]]></title><description><![CDATA[
<p>I wrote a mathematical kernel and plugged it into Claude.<p>wut?</p>
]]></description><pubDate>Fri, 03 Apr 2026 22:48:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=47633353</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47633353</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47633353</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Amoxide – The right aliases, at the right time"]]></title><description><![CDATA[
<p>or... mise.. whatever</p>
]]></description><pubDate>Wed, 01 Apr 2026 05:26:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=47597141</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47597141</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47597141</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Wozcode – double Claude Code output"]]></title><description><![CDATA[
<p>HAHAHAHA<p>trust us bro, send us your context, we're for sure 100% safe<p>we're going to literally hotmod your contrxt for you and not tell you how.</p>
]]></description><pubDate>Tue, 31 Mar 2026 19:32:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47592298</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47592298</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47592298</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: MCP Isn't Dead. You're Just Using It Wrong"]]></title><description><![CDATA[
<p>Yeah, I'm well aware of the pattern, and I'm aware of the Cloudflare code paper and I know that the overhead of MCP is still unneeded because you still have to have those open HTTP connections or local connections or whatever the case is. Those are completely unnecessary when your harness can use a tool like a CLI. It's way more efficient. You can explain it in less tokens or you can type script out the entire primitive so that you don't need the overhead.<p>I still don't see it. I appreciate that you do and that you made a product to deal with it but I just think it's still a bad pattern.</p>
]]></description><pubDate>Tue, 17 Mar 2026 15:48:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=47414349</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47414349</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47414349</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: MCP Isn't Dead. You're Just Using It Wrong"]]></title><description><![CDATA[
<p>"we do it better-er"<p>Mcp is dead, gtf out of my context, progressive disclosure is a superior system, server connection bloat was a shittastic idea</p>
]]></description><pubDate>Tue, 17 Mar 2026 14:12:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=47412948</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47412948</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47412948</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Mengram – Open-source memory layer for AI agents"]]></title><description><![CDATA[
<p>.</p>
]]></description><pubDate>Tue, 17 Mar 2026 14:09:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47412914</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47412914</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47412914</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: NatShell Local-first natural language shell (no cloud, no API keys)"]]></title><description><![CDATA[
<p>i mean, 'claude --dangerously-skip-permissions -p "categorize my downloads folder into iso date formats, by modified date" is pretty natlang</p>
]]></description><pubDate>Thu, 12 Mar 2026 16:16:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47353102</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47353102</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47353102</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Real Browser MCP – your AI agent can see your real browser"]]></title><description><![CDATA[
<p>You can just ask Claude to take over your browser session using ~/{chromedir} just tell it, what you want to do, have it POC, then tell it to make a skill. Bespoke web interface, add features or guardrails by asking it.</p>
]]></description><pubDate>Mon, 09 Mar 2026 13:38:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47308929</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=47308929</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47308929</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: JustNotifs – Push notifications for teams, flat $29/mo instead of SMS"]]></title><description><![CDATA[
<p>expensive sms? 29 instead of free apprise, or ntfy?<p>i mean good luck, but you picked a narrow market</p>
]]></description><pubDate>Sat, 31 Jan 2026 13:42:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46836619</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46836619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46836619</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Terminal UI for GCP"]]></title><description><![CDATA[
<p>why do tuis never post screenshots?</p>
]]></description><pubDate>Sun, 11 Jan 2026 14:40:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=46576132</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46576132</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46576132</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Orla, use lightweight, local, open-source agents as Unix tools"]]></title><description><![CDATA[
<p>orla agent "summarize this code" < main.go<p>claude -p   "summarize this code" < main.go<p>crush, opencode.. don't understand what this offers</p>
]]></description><pubDate>Sun, 04 Jan 2026 20:18:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46491766</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46491766</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46491766</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: I built a privacy-first developer toolkit (JSON, cURL, SQL, etc.)"]]></title><description><![CDATA[
<p>or, do it all offline <a href="https://gchq.github.io/CyberChef/" rel="nofollow">https://gchq.github.io/CyberChef/</a></p>
]]></description><pubDate>Sun, 04 Jan 2026 19:56:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46491579</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46491579</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46491579</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Apache TacticalMesh – Open-source tactical mesh networking for defense"]]></title><description><![CDATA[
<p>so...<p>IP?</p>
]]></description><pubDate>Tue, 30 Dec 2025 20:34:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46437672</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46437672</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46437672</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Jotter – A Note Keeping App"]]></title><description><![CDATA[
<p>no idea how this works before turning over my email for spam? no.</p>
]]></description><pubDate>Sat, 27 Dec 2025 16:21:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46402842</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46402842</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46402842</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Spacelist, a TUI for Aerospace window manager"]]></title><description><![CDATA[
<p>well this is awesome. i didnt know i wanted this, thnx!</p>
]]></description><pubDate>Sat, 27 Dec 2025 00:03:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=46397759</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46397759</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46397759</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Ogblocks – Create Jaw Dropping UIs with Simple Drag and Drop"]]></title><description><![CDATA[
<p>-</p>
]]></description><pubDate>Sat, 06 Dec 2025 15:19:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=46173967</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46173967</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46173967</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Holesail – open-source peer-to-peer tunnels"]]></title><description><![CDATA[
<p>i was frustrated by the documentation, so i had claude break this down.<p>it might be wtong but i wouldve had to invest significant time to understand your networking model without it.<p>-----<p>## Holesail Connection & Encryption Architecture<p>### Core Technology Stack<p>Holesail is built on top of *Holepunch’s Hyperswarm* ecosystem, specifically:<p>1. *HyperDHT* - Kademlia-based distributed hash table for peer discovery
1. *Hyperswarm* - High-level P2P networking abstraction
1. *@hyperswarm/secret-stream* - Noise Protocol + libsodium encryption layer
1. *UDX* - Custom UDP transport protocol<p>-----<p>### Connection Technique: UDP Holepunching<p>*How it works:*<p>1. *Peer Discovery via DHT*: When you run `holesail --live <port>`, the server generates an *Ed25519 keypair* and announces its public key to the HyperDHT. The connection string (`hs://...`) is essentially this public key encoded.
1. *NAT Traversal*: The DHT nodes themselves act as holepunch facilitators. Unlike traditional STUN/TURN servers, <i>any peer in the DHT</i> can help coordinate the holepunch between two NAT’d peers. This is what makes it “truly P2P” - no centralized relay infrastructure.
1. *Holepunch Mechanics*:<p>- Both peers send UDP packets to each other’s external IP:port (discovered via DHT)
- The simultaneous outbound packets “punch” holes in both NATs
- The DHT nodes relay timing/coordination metadata
- Once holepunched, a direct UDP connection is established<p>1. *Transport*: Uses *UDX* (custom UDP protocol) for the data plane after holepunching. TCP fallback is available when UDP fails.<p>-----<p>### Encryption Management<p>*Two-layer encryption using Noise Protocol + libsodium secretstream:*<p>|Layer    |Protocol                  |Purpose                             |
|---------|--------------------------|------------------------------------|
|Handshake|*Noise XX pattern*      |Key exchange, mutual authentication |
|Data     |*libsodium secretstream*|Symmetric encryption of all payloads|<p>*Cryptographic Primitives:*<p>- *Key generation*: Ed25519 keypairs (identity/authentication)
- *Key exchange*: Noise Protocol XX pattern (ephemeral DH)
- *Symmetric encryption*: XChaCha20-Poly1305 (via libsodium secretstream)
- *Handshake hash*: Unique per-session identifier (`socket.handshakeHash`) for crypto binding<p>*Secure vs Insecure Mode:*<p>- `hs://s000...` = *Secure* (prefix `s`) - Full Noise handshake with authentication
- `hs://0000...` = *Insecure* - Presumably skips authentication (anonymous connections)<p>*The flow:*<p>```
1. Peer A generates keypair → announces publicKey to DHT
2. Peer B looks up publicKey → initiates holepunch
3. After UDP connection established:
   a. Noise XX handshake begins (ephemeral keys exchanged)
   b. Both sides derive shared secret
   c. secretstream initialized with derived keys
4. All subsequent data encrypted with XChaCha20-Poly1305
```<p>-----<p>### Key Properties<p>- *Identity-based routing*: Peers connect by public key, not IP address - works even if you move networks
- *E2E encrypted by default*: No way for DHT nodes or relays to read your traffic
- *No central servers*: Bootstrap nodes exist but only for DHT entry; traffic never routes through them
- *Firewall support*: Optional `firewall()` callback to accept/reject connections by remotePublicKey<p>-----<p>### References<p>- Holesail: <<a href="https://github.com/holesail/holesail" rel="nofollow">https://github.com/holesail/holesail</a>>
- HyperDHT: <<a href="https://github.com/holepunchto/hyperdht" rel="nofollow">https://github.com/holepunchto/hyperdht</a>>
- Hyperswarm Secret Stream: <<a href="https://github.com/holepunchto/hyperswarm-secret-stream" rel="nofollow">https://github.com/holepunchto/hyperswarm-secret-stream</a>>
- Holepunch docs: <<a href="https://docs.holepunch.to/building-blocks/hyperswarm" rel="nofollow">https://docs.holepunch.to/building-blocks/hyperswarm</a>>
- Hypertele (predecessor): <<a href="https://github.com/bitfinexcom/hypertele" rel="nofollow">https://github.com/bitfinexcom/hypertele</a>></p>
]]></description><pubDate>Sat, 06 Dec 2025 12:16:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=46172735</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46172735</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46172735</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: I made a free log anonymizer in the browser"]]></title><description><![CDATA[
<p>i mocked up some logs, and it missed ssid and a keyword literally "password"<p>ymmv</p>
]]></description><pubDate>Sun, 30 Nov 2025 01:45:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46092766</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46092766</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46092766</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Vibe coded an AI chat app with features I wanted, Poe"]]></title><description><![CDATA[
<p>might be good to get your hands around this early.<p>reading up on how crush, goose, and opencode handle this may be a good idea.<p>i've been trying to build a web native terminal assistant for a while (just a side project) and this is easily the thing that keeps me up at night.<p>### Primary Sources:
- *Anthropic Engineering Blog: "Making Claude Code more secure and autonomous with sandboxing"*  
  Detailed article on Claude Code's sandboxing features, including OS-level primitives (e.g., Linux Bubblewrap, macOS Seatbelt) for filesystem and network isolation.  
  [Read here](<a href="https://www.anthropic.com/engineering/claude-code-sandboxing" rel="nofollow">https://www.anthropic.com/engineering/claude-code-sandboxing</a>) (Published Oct 20, 2025).<p>- *Claude Code Documentation: Sandboxing*  
  Official docs covering setup, configuration, security benefits (e.g., prompt injection protection), and limitations of filesystem/network isolation in Claude Code.  
  [Read here](<a href="https://code.claude.com/docs/en/sandboxing" rel="nofollow">https://code.claude.com/docs/en/sandboxing</a>).<p>- *Claude Blog: "Beyond permission prompts: making Claude Code more secure and autonomous"*  
  Overview of sandboxing in Claude Code, emphasizing boundaries for safer agent execution.  
  [Read here](<a href="https://claude.com/blog/beyond-permission-prompts-making-claude-code-more-secure-and-autonomous" rel="nofollow">https://claude.com/blog/beyond-permission-prompts-making-cla...</a>) (Published Oct 31, 2025).<p>### Additional Resources:
For broader context on sandboxing agentic AI:
- *arXiv Paper: "Securing AI Agent Execution"*  
  Research on isolation techniques for AI agents, including risk assessment.  
  [Read here](<a href="https://arxiv.org/abs/2510.21236" rel="nofollow">https://arxiv.org/abs/2510.21236</a>) (Published Oct 24, 2025).
- *HopX Documentation*  
  Practical guide to sandboxing for AI agents (e.g., using Firecracker micro-VMs).  
  [Read here](<a href="https://hopx.ai/" rel="nofollow">https://hopx.ai/</a>) (Open-source SDK available at [GitHub](<a href="https://github.com/hopx-ai/sdk" rel="nofollow">https://github.com/hopx-ai/sdk</a>)).<p>### Cursor
Cursor uses local-first editing with optional sandboxing via Docker containers for isolated execution (no default vendor-owned sandboxes). It respects user-defined rules without overriding them.<p>- *Skywork AI Blog: Security in Cursor 2.0*  
  Details Cursor's sandboxing for code execution, network protection, and isolation.  
  [Read here](<a href="https://skywork.ai/blog/vibecoding/cursor-2-0-security-privacy/" rel="nofollow">https://skywork.ai/blog/vibecoding/cursor-2-0-security-priva...</a>) (Published Nov 1, 2025).<p>- *Skywork AI Blog: Cursor 2.0 vs Claude Code SDK*  
  Compares isolation techniques, noting Cursor's local sandboxes vs. Claude's cloud-based ones.  
  [Read here](<a href="https://skywork.ai/blog/vibecoding/cursor-2-0-vs-claude-code-sdk/" rel="nofollow">https://skywork.ai/blog/vibecoding/cursor-2-0-vs-claude-code...</a>) (Published Nov 1, 2025).<p>### OpenAI Codex
Codex primarily relies on API-based execution with optional user-managed sandboxes (e.g., via Firecracker or custom proxies). It emphasizes provider retention policies but lacks built-in native sandboxing like Claude Code.<p>- *Render Blog: Testing AI Coding Agents (2025)*  
  Benchmarks Codex's handling of isolation in production tasks, including Docker-based sandboxes.  
  [Read here](<a href="https://render.com/blog/ai-coding-agents-benchmark" rel="nofollow">https://render.com/blog/ai-coding-agents-benchmark</a>) (Published Aug 12, 2025).<p>- *Medium: Claude Code vs Cursor*  
  Indirect comparison noting Codex's API retention and sandbox limitations vs. Cursor/Claude.  
  [Read here](<a href="https://open-data-analytics.medium.com/claude-code-vs-cursor-the-battle-of-ai-coding-agents-in-2025-fea04c4490eb" rel="nofollow">https://open-data-analytics.medium.com/claude-code-vs-cursor...</a>) (Published Aug 6, 2025).<p>### Goose AI (Codename Goose)
Goose uses container-based isolation via tools like Container Use (built on Dagger) for git-branch-isolated environments, emphasizing safe experimentation without affecting the host.<p>- *Goose Blog: Isolated Dev Environments*  
  Explains Goose's container-use for sandboxes, including lifecycle management and rollback.  
  [Read here](<a href="https://block.github.io/goose/blog/2025/06/19/isolated-development-environments/" rel="nofollow">https://block.github.io/goose/blog/2025/06/19/isolated-devel...</a>) (Published Jun 19, 2025).<p>- *GitHub Discussion: Goose vs Claude Code*  
  Community analysis comparing Goose's local isolation to Claude Code's cloud sandboxes.  
  [Read here](<a href="https://github.com/block/goose/discussions/3133" rel="nofollow">https://github.com/block/goose/discussions/3133</a>) (Ongoing, started Jun 27, 2025).<p>- *Slashdot: Compare Claude vs. Goose*  
  High-level comparison including deployment isolation.  
  [Read here](<a href="https://slashdot.org/software/comparison/Claude-vs-codename-goose/" rel="nofollow">https://slashdot.org/software/comparison/Claude-vs-codename-...</a>).<p>also: check out the open-source sandbox runtime from Anthropic: [GitHub Repo](<a href="https://github.com/anthropic-experimental/sandbox-runtime" rel="nofollow">https://github.com/anthropic-experimental/sandbox-runtime</a>).<p>clearly i have a bias on this topic, lol</p>
]]></description><pubDate>Sun, 23 Nov 2025 01:02:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46019771</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46019771</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46019771</guid></item><item><title><![CDATA[New comment by mutant in "Show HN: Vibe coded an AI chat app with features I wanted, Poe"]]></title><description><![CDATA[
<p>would be interested in reading your outlook on the execution model, isolation, guardrails, tool calling. those are some of the baseline things i evaluate before try before trying an agentic env</p>
]]></description><pubDate>Sat, 22 Nov 2025 14:49:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46015212</link><dc:creator>mutant</dc:creator><comments>https://news.ycombinator.com/item?id=46015212</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46015212</guid></item></channel></rss>