Feed aggregator

Show HN: 0x – A language that compiles to React, Vue, and Svelte (80% less code)

Hacker News - Tue, 02/10/2026 - 7:47am

I kept running into the same problem with AI-generated frontend code: most tokens go to boilerplate, and the AI can never pick a consistent pattern. So I built a language where there's only one way to write things.

0x is indentation-based (think Python), declarative, and compiles to React JSX, Vue 3 SFC, or Svelte 5. A counter component is 18 lines in 0x vs 96 in production React.

page Counter: state count: int = 0 fn increment(): count += 1 layout col gap=16 padding=24 center: text "{count}" size=4xl color=cyan button "+1" style=primary -> increment() The compiler is ~3K lines of TypeScript, zero dependencies. Pipeline: Lexer → Parser → AST → CodeGen (one pass per target). It handles state, derived values, typed variables, functions, flexbox layouts, control flow (if/elif/else, each, match), lifecycle hooks, API calls with loading/error states.

I chose indentation-based syntax because it's the most token-efficient structure I could find. No curly braces, no semicolons, no JSX closing tags, no import boilerplate. For an LLM, fewer structural decisions = fewer hallucinations.

There's a built-in MCP server so Claude and Cursor can compile inline. Also works as a library:

import { compile } from '0x-lang/compiler'; const result = compile(source, { target: 'react' }); I'm curious about two things:

Is "designed for AI" a real market, or is this too niche?

For folks who've built compilers — any obvious mistakes you see in the architecture?

Website: https://0xlang.com GitHub: https://github.com/hankimis/0x-lang npm: https://www.npmjs.com/package/0x-lang

Comments URL: https://news.ycombinator.com/item?id=46959021

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Selling an AI interview assistant with ~2k users (no revenue)

Hacker News - Tue, 02/10/2026 - 7:44am

Hi HN,

I’m the solo builder of Natively, an AI-powered interview and productivity assistant.

I built it as a product-first experiment and focused entirely on usage and feedback before monetization.

Current state

~2,000 users

Organic growth (GitHub + word of mouth)

No revenue yet (no pricing, no Stripe, no paywalls)

Actively used by developers and students

Why I’m selling I’m shifting focus to another product idea and don’t have the bandwidth to properly monetize or scale this. The product works, users are there, but it deserves more attention than I can give right now.

What’s there

Working product

Clean, maintainable codebase

Modern AI stack

No legal or IP complications

What’s not

No paid plans

No marketing funnel

No growth hacks

This might be interesting to someone who:

Enjoys productizing early traction

Wants users before revenue

Is comfortable shipping pricing and onboarding quickly

Happy to answer questions here. If you’re seriously interested, feel free to email/DM and I can share the product link, analytics, and repo.

Thanks for reading.

Comments URL: https://news.ycombinator.com/item?id=46958991

Points: 1

# Comments: 0

Categories: Hacker News

The Best Expert-Recommended Smart Scales for the Most Accurate Results

CNET Feed - Tue, 02/10/2026 - 7:30am
These are the scales to consider if you want the best data.&
Categories: CNET

The Best Way to Prevent Fraud: A Guide to Freezing Your Social Security Number

CNET Feed - Tue, 02/10/2026 - 7:02am
Stop scammers in their tracks by locking your SSN. It's quick and easy.&
Categories: CNET

CISA Adds Six Known Exploited Vulnerabilities to Catalog

US-Cert Current Activity - Tue, 02/10/2026 - 7:00am

CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. 

  • CVE-2026-21510 Microsoft Windows Shell Protection Mechanism Failure Vulnerability
  • CVE-2026-21513 Microsoft MSHTML Framework Security Feature Bypass Vulnerability
  • CVE-2026-21514 Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability
  • CVE-2026-21519 Microsoft Windows Type Confusion Vulnerability
  • CVE-2026-21525 Microsoft Windows NULL Pointer Dereference Vulnerability
  • CVE-2026-21533 Windows Remote Desktop Services Elevation of Privilege Vulnerability 

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. 

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. 

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

Categories: US-CERT Feed

Poland Energy Sector Cyber Incident Highlights OT and ICS Security Gaps

US-Cert Current Activity - Tue, 02/10/2026 - 7:00am

The purpose of this Alert is to amplify Poland’s Computer Emergency Response Team (CERT Polska’s) Energy Sector Incident Report published on Jan. 30, 2026, and highlight key mitigations for Energy Sector stakeholders. 

In December 2025, a malicious cyber actor(s) targeted and compromised operational technology (OT) and industrial control systems (ICS) in Poland’s Energy Sector—specifically renewable energy plants, a combined heat and power plant, and a manufacturing sector company—in a cyber incident. The malicious cyber activity highlights the need for critical infrastructure entities with vulnerable edge devices to act now to strengthen their cybersecurity posture against cyber threat activities targeting OT and ICS.

A malicious cyber actor(s) gained initial access in this incident through vulnerable internet-facing edge devices, subsequently deploying wiper malware and causing damage to remote terminal units (RTUs). The malicious cyber activity caused loss of view and control between facilities and distribution system operators, destroyed data on human machine interfaces (HMIs), and corrupted system firmware on OT devices. While the affected renewable energy systems continued production, the system operator could not control or monitor them according to their intended design.1

CERT Polska’s incident report highlights:

  • Vulnerable edge devices remain a prime target for threat actors.
  • OT devices without firmware verification can be permanently damaged.
    • Operators should prioritize updates that allow firmware verification when available; if updates are not immediately feasible, ensure that cyber incident response plans account for inoperative OT devices to mitigate prolonged outages.
  • Threat actors leveraged default credentials, a vulnerability not limited to specific vendors, to pivot onto the HMI and RTUs.
    • Operators should immediately change default passwords and establish requirements for integrators or OT suppliers to enforce password changes in the future.

CISA and the Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response (DOE CESER) urge OT asset owners and operators to review the following resources for more information about the malicious activity and mitigations:

Acknowledgements

DOE CESER and CERT Polska contributed to this Alert.

Disclaimer 

The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA. 

Notes
  1. CERT Polska, “Energy Sector Incident Report - 29 December 2025,” Naukowa i Akademicka Sieć Komputerowa Poland, last modified January 30, 2026, https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/.
Categories: US-CERT Feed

Show HN: Hookaido – "Caddy for Webhooks"

Hacker News - Tue, 02/10/2026 - 6:53am

Hi HN, we built Hookaido, a self-hosted webhook gateway that aims to be the “Caddy for webhooks”: one single Go binary, production-ready defaults, minimal ops.

Key bits:

durable SQLite/WAL-backed queue (survives restarts)

retries + dead-letter queue + requeue support

HMAC signature verification + replay protection + secret rotation

pull mode (useful for DMZ setups)

Prometheus metrics + OpenTelemetry tracing

hot reload for config changes

Repo + docs: https://github.com/nuetzliches/hookaido

Would love feedback on the model (push vs pull), operational ergonomics, and any missing “must-have” features for running this in production.

Comments URL: https://news.ycombinator.com/item?id=46958502

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Creating PDF documents with rotativa.io templates

Hacker News - Tue, 02/10/2026 - 6:50am

Rotativa.io’s template editor makes it easy to create, manage, and preview PDF templates using the powerful Liquid templating language. The Rotativa.io API will then serve your dynamic PDF documents, you’ll just need to send your data as a JSON document. In this guide, we’ll walk you through everything you need to know to get started.

Comments URL: https://news.ycombinator.com/item?id=46958487

Points: 1

# Comments: 0

Categories: Hacker News

Android App Builder

Hacker News - Tue, 02/10/2026 - 6:49am

Article URL: https://sketchware.pro/

Comments URL: https://news.ycombinator.com/item?id=46958477

Points: 1

# Comments: 0

Categories: Hacker News

Pages