<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: princeholdings</title><link>https://news.ycombinator.com/user?id=princeholdings</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 11:36:35 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=princeholdings" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by princeholdings in "Ask HN: What Are You Working On? (March 2026)"]]></title><description><![CDATA[
<p>Two things I've been building this year, both trying to solve real problems I care about:<p><a href="https://talonwatch.com" rel="nofollow">https://talonwatch.com</a> : I kept seeing founders discover their Stripe keys were public or their database was wide open, usually after the damage was done. Built a passive security scanner for vibe-coded apps so that's easier to catch early. Free surface scan, no account needed.<p><a href="https://thetracejournal.com" rel="nofollow">https://thetracejournal.com</a> : A small iOS journal that pairs a song with each entry. Music is tied to memory in a way nothing else is, and I wanted a place to capture that.</p>
]]></description><pubDate>Mon, 09 Mar 2026 14:40:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47309765</link><dc:creator>princeholdings</dc:creator><comments>https://news.ycombinator.com/item?id=47309765</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47309765</guid></item><item><title><![CDATA[New comment by princeholdings in "Show HN: Talon - Security scanner for vibe-coded apps"]]></title><description><![CDATA[
<p>I built this because I was scanning my own projects and realised how easy it is to miss basic things when you're moving fast. Exposed keys in a public repo, a .env file indexed by Google, a Firebase database with default rules still on.<p>The free scan is fully passive so it never touches your app directly. It checks public GitHub repos associated with your domain for leaked credentials, looks at your security headers, checks certificate transparency logs, and probes a handful of common debug endpoints like /.git/HEAD and /actuator/env.<p>The deep scan goes further: active endpoint probing, JS bundle analysis for secrets, CORS checks, Firebase and Supabase rule testing, and optional static analysis of a private repo via GitHub OAuth.</p>
]]></description><pubDate>Mon, 09 Mar 2026 14:22:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=47309484</link><dc:creator>princeholdings</dc:creator><comments>https://news.ycombinator.com/item?id=47309484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47309484</guid></item><item><title><![CDATA[Show HN: Talon - Security scanner for vibe-coded apps]]></title><description><![CDATA[
<p>Article URL: <a href="https://talonwatch.com">https://talonwatch.com</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47309478">https://news.ycombinator.com/item?id=47309478</a></p>
<p>Points: 1</p>
<p># Comments: 1</p>
]]></description><pubDate>Mon, 09 Mar 2026 14:21:44 +0000</pubDate><link>https://talonwatch.com</link><dc:creator>princeholdings</dc:creator><comments>https://news.ycombinator.com/item?id=47309478</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47309478</guid></item></channel></rss>