Feed aggregator

Show HN: Happen We Discovered This Minimal Framework of Glue with Superpowers

Hacker News - Tue, 04/22/2025 - 7:43am

We have been exploring ways to coordinate AI agents and services cleanly, observably, and without turning everything into YAML spaghetti. We came across this repo Happen, how good will it be cause we have We’ve tried the usual stuff: LangChain (too bloated, too magic) Autogen (chat loop hell) CrewAI (fun, but brittle when workflows grow) https://github.com/RobAntunes/Happen/tree/main/examples

Comments URL: https://news.ycombinator.com/item?id=43760976

Points: 1

# Comments: 0

Categories: Hacker News

NIST Uncertainty Machine

Hacker News - Tue, 04/22/2025 - 7:42am

Article URL: https://uncertainty.nist.gov/

Comments URL: https://news.ycombinator.com/item?id=43760970

Points: 1

# Comments: 0

Categories: Hacker News

Magi-1: Autoregressive Video Generation at Scale

Hacker News - Tue, 04/22/2025 - 7:38am

Article URL: https://www.magi1.ai/

Comments URL: https://news.ycombinator.com/item?id=43760953

Points: 1

# Comments: 0

Categories: Hacker News

Prompt Coded 3D Asteroids

Hacker News - Tue, 04/22/2025 - 7:32am
Categories: Hacker News

Many Malware Campaigns Linked to Proton66 Network

Security Week - Tue, 04/22/2025 - 7:31am

Security researchers detail various malware campaigns that use bulletproof services linked to Proton66 ASN.

The post Many Malware Campaigns Linked to Proton66 Network appeared first on SecurityWeek.

Categories: SecurityWeek

Show HN: I made a documentation tool for Jira projects

Hacker News - Tue, 04/22/2025 - 7:20am

For the past 6 months, I’ve been building Docai, a tool to automate project documentation from Jira.

As a dev, I’ve worked on too many projects where documentation was missing, outdated, or written too late. Most of the time, we had to dig through Jira tickets to understand what was built and why. It was painful.

So I decided to fix that.

Docai reads your Jira releases and generates clean, structured documentation automatically.

Here’s what it does:

- Generates documentation from Jira tickets (based on versions/releases) - Builds an incremental feature tree to follow the evolution of your product - Multi-language support (docs can be generated in English, French, Spanish, German… more to come) - Everything is editable — both the tree and the textual docs - PDF export for sharing outside your org - Syncs with Jira — no need to copy/paste anything

We’re still early so would love your feedback and opinions. Feel free to try us out for free (free trial/no credit card needed) – and there’s a demo project so you can test the tool before connecting your Jira.

Website: https://docai.so Demo video: https://www.youtube.com/watch?v=Y25e1RhkwSI

Comments URL: https://news.ycombinator.com/item?id=43760866

Points: 2

# Comments: 0

Categories: Hacker News

Show HN: I made a multiplayer Minesweeper game

Hacker News - Tue, 04/22/2025 - 7:17am

Hi everyone!

After much revision here is MinesweeperPro:

• Live games allowing multiple simultaneous players.

• Scoring system rewarding correct actions and penalizing incorrect ones.

• Three playing speeds: Casual, Intermediate, and Lightning.

Hope you enjoy!

Comments URL: https://news.ycombinator.com/item?id=43760852

Points: 1

# Comments: 0

Categories: Hacker News

Legacy Google Service Abused in Phishing Attacks

Security Week - Tue, 04/22/2025 - 7:14am

A sophisticated phishing campaign abuses weakness in Google Sites to spoof Google no-reply addresses and bypass protections.

The post Legacy Google Service Abused in Phishing Attacks appeared first on SecurityWeek.

Categories: SecurityWeek

The growth of AI is proving a double-edged sword for API security, presenting opportunities for defenders to enhance their resilience, but also more risks from AI-powered attacks, according to report

Computer Weekly Feed - Tue, 04/22/2025 - 7:04am
The growth of AI is proving a double-edged sword for API security, presenting opportunities for defenders to enhance their resilience, but also more risks from AI-powered attacks, according to report
Categories: Computer Weekly

Pages