<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: tomjwxf</title><link>https://news.ycombinator.com/user?id=tomjwxf</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 24 Apr 2026 21:15:45 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=tomjwxf" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by tomjwxf in "Show HN: Cq – Stack Overflow for AI coding agents"]]></title><description><![CDATA[
<p>my core thesis is that AGI is here, it just needs accountability and efficient frameworks to navigate our arbitrary world</p>
]]></description><pubDate>Sat, 28 Mar 2026 00:43:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47550311</link><dc:creator>tomjwxf</dc:creator><comments>https://news.ycombinator.com/item?id=47550311</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47550311</guid></item><item><title><![CDATA[New comment by tomjwxf in "MCP Security 2026: 30 CVEs in 60 Days"]]></title><description><![CDATA[
<p>The gateway approach (OAuth + RBAC) solves the perimeter problem — who can connect. protect-mcp solves a different layer — what can they do once connected, and how do you prove it.<p>It wraps any MCP server as a stdio proxy. Per-tool policies (block, rate-limit, require human approval). Every decision gets an Ed25519-signed receipt that's verifiable offline — no callbacks, no accounts.<p>The two layers stack: your gateway authenticates the caller, protect-mcp constrains which tools they can call and signs the evidence.<p>npx protect-mcp -- node your-server.js<p>MIT licensed. The receipts protocol has an IETF Internet-Draft: <a href="https://datatracker.ietf.org/doc/draft-farley-acta-signed-receipts/" rel="nofollow">https://datatracker.ietf.org/doc/draft-farley-acta-signed-re...</a><p>npm: <a href="https://npmjs.com/package/protect-mcp" rel="nofollow">https://npmjs.com/package/protect-mcp</a></p>
]]></description><pubDate>Fri, 27 Mar 2026 06:08:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47539539</link><dc:creator>tomjwxf</dc:creator><comments>https://news.ycombinator.com/item?id=47539539</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47539539</guid></item><item><title><![CDATA[New comment by tomjwxf in "Show HN: Automate your workflow in plain English"]]></title><description><![CDATA[
<p>The staged autonomy pattern ("trust is earnable") maps directly to what we built with protect-mcp — shadow mode first (log everything, block nothing), then enforce when you've seen enough data to trust the policies.<p>For the prompt injection concern: protect-mcp wraps MCP tool calls with per-tool policies. Even if the agent gets injected, it can't call tools outside the policy. Every decision is optionally Ed25519-signed and verifiable offline.<p>npmjs.com/package/protect-mcp</p>
]]></description><pubDate>Wed, 25 Mar 2026 23:37:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47524799</link><dc:creator>tomjwxf</dc:creator><comments>https://news.ycombinator.com/item?id=47524799</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47524799</guid></item><item><title><![CDATA[New comment by tomjwxf in "Show HN: Cq – Stack Overflow for AI coding agents"]]></title><description><![CDATA[
<p>This is exactly right. We implemented delegation receipts — Agent A grants scoped authority to Agent B, producing a signed receipt. B's subsequent actions reference A's delegation receipt. An auditor can trace the full chain from human principal to agent action.<p>The fiduciary analogy is spot on. Every receipt in the chain is independently verifiable: npx @veritasacta/verify --self-test</p>
]]></description><pubDate>Wed, 25 Mar 2026 23:36:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=47524788</link><dc:creator>tomjwxf</dc:creator><comments>https://news.ycombinator.com/item?id=47524788</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47524788</guid></item><item><title><![CDATA[Signed receipts for MCP tool calls – prove what your agent did]]></title><description><![CDATA[
<p>Article URL: <a href="https://www.npmjs.com/package/protect-mcp">https://www.npmjs.com/package/protect-mcp</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=47516528">https://news.ycombinator.com/item?id=47516528</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Wed, 25 Mar 2026 12:37:57 +0000</pubDate><link>https://www.npmjs.com/package/protect-mcp</link><dc:creator>tomjwxf</dc:creator><comments>https://news.ycombinator.com/item?id=47516528</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47516528</guid></item></channel></rss>