The UNIX List

Ask HN: How comfortable are we with agents everywhere?

I just installed Zed editor, it prompts me if I want to use Claude. I say yes, it open a side bar. I ask it "What files can you see?" It runs a series of ls commands and shows me my whole home dir. Including private ssh keys. (It was a free version of Claude, I didn't enter any credentials.)How do we feel about this? Sure, any program can do anything weird, scan for my files etc. But somehow these agents can really do unexpected stuff. When do they decide something has to be uploa

What Hackers Consider Essential (1991)

essentials n. Things necessary to maintain a productive and secure hacking environment. &quot;A jug of wine, a loaf of bread, a 20-megahertz 80386 box with 8 meg of core and a 300-megabyte disk supporting full UNIX with source and X windows and EMACS and UUCP via a &#x27;blazer to a friendly Internet site, and thou.&quot;<p>Raymond, E.S. &amp; Steele, G.L. (eds.), The Jargon File [1991] https:&#x2F;&#x2F;magic-cookie.co.uk&#x2F;jargon&#x2F;mit_jargon.htm#x817

Show HN: Word-doodle – browser-based generative doodle text art engine

word-doodle is a browser-based generative text art engine that takes string of text and transforms them into typographic doodles. word-doodle scatters words across the screen using a simple collision detection algorithm to place words into empty spaces. It includes a control hub where users can input text, change fonts, select text cases, and apply word limits with additional options to generate the doodle, wipe the screen, or take a screenshot.The Engine The word-doodle engine transforms raw te

Why Is Your Operating System Debugging Hackers for Free?

When a current system (even with hardware-level MTE memory tag expansion) successfully intercepts a Buffer Overflow attack, what is its instinctive reaction? It immediately terminates the program, generates a Crash Log in the background, and might even pop up a notification telling the user, &quot;Malicious attack blocked.&quot;This isn&#x27;t defense; it&#x27;s the system acting as a free real-time debugger for APT (Advanced Persistent Threat) groups.In Project Genesis&#x27;s underlying securit

Show HN: OneCamp – Self-Hosted Slack/Asana/Zoom/Notion Alternative

Launching in 6 days (March 7)!OneCamp is a self-hosted unified workspace that combines real-time chat, tasks, video calls, and collaborative docs — no per-user fees, unlimited users, full data control.We open-sourced the entire Next.js frontend so anyone can explore, fork, or contribute:https:&#x2F;&#x2F;github.com&#x2F;OneMana-Soft&#x2F;OneCamp-feKey pieces of the architecture:1. Real-time collaboration - Yjs + Hocuspocus (CRDT sync over WebSockets) - Tiptap editor + custom Node micro

Show HN: AutoTable – One-Click Spreadsheet Cleaner Built with Gemini

I built AutoTable to eliminate repetitive spreadsheet cleanup work.Upload a messy CSV&#x2F;Excel file and it:Normalizes headers (snake_case)Fixes inconsistent data typesRemoves duplicatesStrips hidden Unicode junkStandardizes formattingThe pipeline is deterministic and idempotent. Files are stored ephemerally and auto-purged.The interesting part: I used Google Gemini heavily as an engineering collaborator — not just for boilerplate, but for designing parts of the cleaning logic and app structure

Show HN: I'm building a platform to manage larger projects with AI agents

I started building Frame as a terminal-first, lightweight IDE and open sourced it. Now I&#x27;m pushing it toward becoming a full platform for developing and managing larger projects. What I&#x27;ve been able to build in about a month with Claude Code is honestly insane. Here&#x27;s where Frame is today: Core - Terminal-first platform with up to 9 terminals in a 3x3 grid - Multi-AI support — Claude Code, Codex CLI, and Gemini CLI in one window - Automatic context injection via wrapper scripts fo

Show HN: Zagora, Distributed fine-tuning platform on mixed GPUs over internet

I built Zagora, a distributed fine-tuning platform that turns fragmented or mixed GPUs into a unified training cluster over standard internet (1Gbps).The problem:Most distributed training assumes homogeneous GPUs and high-bandwidth interconnects (NVLink&#x2F;InfiniBand). On heterogeneous fleets over standard internet, tensor&#x2F;data parallel approaches become communication-bound and fragile.What Zagora does under the hood:- Uses pipeline-style parallelism instead of heavy tensor synchronizatio

Show HN: E8-Matrix: open-source physical particle discovery platform

I’d like to share E8-Matrix - a open-source physical particle discovery platform (recent program paper titled “From a High-Symmetry Sector to Testable Observables: An E8-Motivated Projection Program”) and would greatly appreciate any constructive feedback from the community.The work outlines a top‑down computational framework that connects a high‑symmetry ⊇ E8 structure to 3+1D observables via an operational projection Π.Instead of ad‑hoc effective shifts, the goal is to trace predictions back

Bill Joy, creator of vi: I think one of the interesting things is that vi is really a mode-based editor. I think as mode-based...

Bill Joy, creator of vi:I think one of the interesting things is that vi is really a mode-based editor. I think as mode-based editors go, it pretty good. One of the good things about EMACS, though, is its programmability and the modelessness. Those are two ideas which never occurred to me.This doesn&rsquo;t prove anything but it puts vim fanboyism in a funny spot. As if Muhammad heard about Hinduism and said &ldquo;woah I wish I woulda thought of that&rdquo;

Show HN: Unfudged – version control without commits

I built unf after I pasted a prompt into the wrong agent terminal and it overwrote hours of hand-edits across a handful of files. Git couldn&#x27;t help because I hadn&#x27;t finished&#x2F;committed my in progress work. I wanted something that recorded every save automatically so I could rewind to any point in time. I wanted to make it difficult for an agent to permanently screw anything up, even with an errant rm -rfunf is a background daemon that watches directories you choose (via CLI) and sn

Show HN: oosh – Annotation-driven CLI framework for Bash

Hi HN, I built oosh because I was tired of rewriting the same flag parsing, help text, and completion logic every time I needed a bash CLI at work.The initial idea came from 9 years ago: https:&#x2F;&#x2F;gist.github.com&#x2F;bruno-de-queiroz&#x2F;a1c9e5b24b6118e45f4..., and it&#x27;s pretty simple: annotate your functions and oosh gives you flag parsing, help generation, tab completion, and type validation for free. A scaffolder generates a full CLI project in seconds.```bash #@flag -e|--env EN

Show HN: Shannon – Local desktop app to orchestrate Claude Code agent teams

I ran into a problem when using Claude Code CLI on larger projects: I wanted to split work across specialized agents (one writes code, another reviews, another runs tests) and coordinate them with dependency graphs. Managing this across multiple terminal sessions was painful.Shannon solves this:- Create customized agents with different models (Opus&#x2F;Sonnet&#x2F;Haiku) and system prompts - Build team workflows with a drag-and-drop DAG editor (parallel, sequential, or fully custom) - Describe

Show HN: Tswap–Yubikey-backed secret injection for IaC and AI-assisted workflows

I built tswap after noticing that Claude Code, while genuinely useful for managing a Kubernetes cluster, was pulling plaintext secrets from every manifest it touched. I wanted the AI to be able to do its job without ever seeing the actual values.tswap keeps secrets in an AES-encrypted vault file on disk. The decryption key is derived from a YubiKey via HMAC challenge-response. At init you pair two YubiKeys — either unlocks the vault, so you have no single point of hardware failure.Config files u

Show HN: Shannon – Local desktop app to orchestrate Claude Code agent teams

I ran into a problem when using Claude Code CLI on larger projects: I wanted to split work across specialized agents (one writes code, another reviews, another runs tests) and coordinate them with dependency graphs. Managing this across multiple terminal sessions was painful.Shannon solves this:- Create customized agents with different models (Opus&#x2F;Sonnet&#x2F;Haiku) and system prompts - Build team workflows with a drag-and-drop DAG editor (parallel, sequential, or fully custom) - Describe

Who really owns Unix?

Whoever said the first casualty of war is truth would be surprised to find that apothegm quoted in a dispute between systems vendors. But it is an apt description of current events. The SCO Group has ...

All About Linux 2008: Aren't UNIX and Linux the same thing? Yes and no.

The “What’s the difference between UNIX and Linux?” question can be answered similar to the analogy section that many of us had to complete on the SAT test; UNIX is to DOS as Linux is to Windows. That ...

Apple's Operating System Guru Goes Back to His Roots

You may have heard that Macintosh OSX is just Linux with a prettier interface. That's not actually true. But OSX is built in part on an open source Unix derivative called FreeBSD. And until recently, FreeBSD's co-founder Jordan Hubbard served as director of Unix technology at Apple. Now he hopes to bring "the Apple approach" to the open source community.

Preventing Breaches – MFA on Remote Access to Linux, Unix, and Infrastructure Systems

Most breaches don’t start with malware or zero-day exploits. They start with a login.  An attacker gets hold of a password, maybe through phishing, reuse, or a leaked credential dump. They test it against a remote system. An SSH prompt appears. The credentials work. From there, everything unfolds quietly – privilege escalation, lateral movement, persistence. By the time anyone notices, the damage is already done.  The post Preventing Breaches – MFA on Remote Access to Linux, Unix, and Infrastructure Systems appeared first on 12Port.

A Decade of Docker Containers

Docker is a widely used developer tool that first simplifies the assembly of an application stack (docker build), then allows for the rapid distribution of the resulting executabl ...