ads

Friday, March 27, 2026

Show HN: Open-Source Animal Crossing–Style UI for Claude Code Agents https://ift.tt/gYAhy1w

Show HN: Open-Source Animal Crossing–Style UI for Claude Code Agents We posted here on Monday and got some great feedback. We’ve implemented a few of the most requested updates: - iMessage channel support (agents can text people and you can text agents) Other channels are simple to extend. - A built-in browser (agents can navigate and interact with websites) - Scheduling (run tasks on a timer / cron/ in the future) - Built in tunneling so that the agents can share local stuff with you over the internet - More robust MCP and Skills support so anyone can extend it - Auto approval for agent requests If you didn’t see the original: Outworked is a desktop app where Claude Code agents work as a small “team.” You give it a goal, and an orchestrator breaks it into tasks and assigns them across agents. Agents can run in parallel, talk to each other, write code, and now also browse the web and send messages. It runs locally and plugs into your existing Claude Code setup. Would love to hear what we should build next. Thanks again! https://ift.tt/EQxDVak March 28, 2026 at 12:25AM

Thursday, March 26, 2026

Show HN: Orloj – agent infrastructure as code (YAML and GitOps) https://ift.tt/4UQXoVI

Show HN: Orloj – agent infrastructure as code (YAML and GitOps) Hey HN, we're Jon and Kristiane, and we're building Orloj ( https://orloj.dev ), an open-source (Apache 2.0) orchestration runtime for multi-agent AI systems. You define agents, tools, policies, and workflows in declarative YAML manifests, and Orloj handles scheduling, execution, governance, and reliability. We built this because running AI agents in production today looks a lot like running containers before Kubernetes: ad-hoc scripts, no governance, no observability, no standard way to manage the lifecycle of an agent fleet. Everyone we talked to was writing the same messy glue code to wire agents together, and nobody had a good answer for "which agent called which tool, and was it supposed to?" Orloj treats agents the way infrastructure-as-code treats cloud resources. You write a manifest that declares an agent's model, tools, permissions, and execution limits. You compose agents into directed graphs — pipelines, hierarchies, or swarm loops. The part we're most excited about is governance. AgentPolicy, AgentRole, and ToolPermission are evaluated inline during execution, before every agent turn and tool call. Instead of prompt instructions that the model might ignore, these policies are a runtime gate. Unauthorized actions fail closed with structured errors and full audit trails. You can set token budgets per run, whitelist models, block specific tools, and scope policies to individual agent systems. For reliability, we built lease-based task ownership (so crashed workers don't leave orphan tasks), capped exponential retry with jitter, idempotent replay, and dead-letter handling. The scheduler supports cron triggers and webhook-driven task creation. The architecture is a server/worker split. orlojd hosts the API, resource store (in-memory for dev, Postgres for production), and task scheduler. orlojworker instances claim and execute tasks, route model requests through a gateway (OpenAI, Anthropic, Ollama, etc.), and run tools in configurable isolation — direct, sandboxed, container, or WASM. For local development, you can run everything in a single process with orlojd --embedded-worker --storage-backend=memory. Tool isolation was important to us. A web search tool probably doesn't need sandboxing, but a code execution tool should run in a container with no network, a read-only filesystem, and a memory cap. You configure this per tool based on risk level, and the runtime enforces it. We also added native MCP support. You register an MCP server (stdio or HTTP), Orloj auto-discovers its tools, and they become first-class resources with governance applied. So you can connect something like the GitHub MCP server and still have policy enforcement over what agents are allowed to do with it. Three starter blueprints are included (pipeline, hierarchical, swarm-loop). Docs: https://docs.orloj.dev We're also building out starter templates for operational workflows where governance really matters. First on the roadmap: 1. Incident response triage, 2. Compliance evidence collector, 3. CVE investigation pipeline, and 4. Secret rotation auditor. We have 20 templates in mind and community contributions are welcome. We're a small team and this is v0.1.0, so there's a lot still on the roadmap — hosted cloud, compliance packaging, and more. But the full runtime is open source today and we'd love feedback on what we've built so far. What would you use this for? What's missing? https://ift.tt/Z6CJVkI March 26, 2026 at 12:07PM

Show HN: Vizier – A physical design advisor for DuckDB https://ift.tt/Hi1J9RS

Show HN: Vizier – A physical design advisor for DuckDB Hi, I've made an early version of a physical design advisor (called Vizier) for DuckDB. It can analyze a collection of queries (using a set of heuristics) and recommend changes to the physical design/layout of the database (for example, sort orders, Parquet layouts, indexes, etc.), in order to make those queries run faster. Vizier is implemented as a DuckDB extension in Zig and supports DuckDB version 1.2.0 and newer. The project is very early-stage, but if you're interested in learning more about Vizier or trying it out, you can check out the links below: Project's GitHub repo: https://ift.tt/nOxGjMp Vizier documentation: https://cogitatortech.github.io/vizier/ March 26, 2026 at 11:46PM

Show HN: Micro – apps without ads, algorithms or tracking https://ift.tt/fwGhYIJ

Show HN: Micro – apps without ads, algorithms or tracking For over 10 years I've been trying to accomplish something that took Claude Code and a lot of failure to realise. We need alternatives to big tech and we're not working hard enough to make that happen. In an era of addiction, usury and exploitation it's now time we seriously consider alternatives. Proton and the like worked on privacy focused individual services and a pain stakingly slow pace. Maybe for good reason. But it was also in an era pre AI. 10 years ago I was convinced the super app model would work. And that a platform needed to exist to facilitate that. Today I realised the tech doesn't matter, the idea and execution from the top down does. I put aside my technical perfectionism to try pull together a solution to some of the problems that plagued my own life with tech addiction and I rewrote and threw away this thing multiple times over the years pre AI and after. I burned VC funding, I burned bridges, I burned community trust in an open source project. But it was all in the pursuit of something I was compelled needed to exist. I used this on a daily basis probably 10+ times a day. Every person has different use cases but for me what's key is to try pull all the digital daily habits in one place and then be able to build on that. I can't replace my own google usage for mail yet but I also saw a need for something in between by private email and a work email. There's so much more I could say but essentially Micro and the app Mu ( https://mu.xyz ) is the culmination of many years of work. And it's also open source. https://ift.tt/0mBc5FE . Please provide feedback. Please tear it apart. Please poke holes in my theory. I'm not looking for hype. I really do just think we need an alternative to big tech. https://micro.mu March 26, 2026 at 11:14PM

Show HN: NerdFlair, a Claude Code QoL Plugin https://ift.tt/pXZ9deM

Show HN: NerdFlair, a Claude Code QoL Plugin NerdFlair is a configurable bash statusline and chimes/spinner pack for Claude Code. Cursor extension (chimes only) also included. https://ift.tt/2Al8HTz March 26, 2026 at 10:51PM

Wednesday, March 25, 2026

Show HN: Pgsemantic – Point at your Postgres DB, get vector search instantly https://ift.tt/HeNdoBT

Show HN: Pgsemantic – Point at your Postgres DB, get vector search instantly https://ift.tt/9ZJcHMo March 26, 2026 at 01:41AM

Show HN: I built an integration for RL training of browser agents for everyone https://ift.tt/qOlzHGw

Show HN: I built an integration for RL training of browser agents for everyone This integration allows for scalable evals and training of browser agents with hosted Prime Intellect eval + training pipelines and headless browser infrastructure on Browserbase to RL train browser agents with LoRA. https://ift.tt/PFf28oC March 26, 2026 at 12:11AM

Show HN: I built a site that maps the web from a bounty hunter's perspective https://ift.tt/MJrz1xT

Show HN: I built a site that maps the web from a bounty hunter's perspective I built this because I wanted my own directory of public companies running bug bounty programs — where I could see their infrastructure in one place and have a real idea of where to start poking holes. Neobotnet collects intel data from companies on HackerOne and Bugcrowd — subdomains, DNS records, web servers with status codes, indexed/crawled URLs, JS files, and exposed secrets/paths (still building this last part). The data is already there when you need it. No scans to run. Currently tracking 41 companies, 63,878 web servers, and 1.8M+ URLs. Long term I want to expand this to startups that depend on cloud infrastructure so they can see what's publicly accessible. Made a free sample with Capital One's data (and other companies) so you can see what it looks like without signing up: https://freerecon.com Original Page: https://neobotnet.com Feedback very welcome. https://ift.tt/l4hLMRK March 24, 2026 at 01:49AM

Tuesday, March 24, 2026

Show HN: I built a party game that makes fun of corporate culture https://ift.tt/A42YhlR

Show HN: I built a party game that makes fun of corporate culture Made the first party game that makes fun of corporate culture! Would love for you to try it out. https://ift.tt/AYs8tbg March 25, 2026 at 01:39AM

Show HN: Jelly – SSH Social Hangout https://ift.tt/JAlxHuD

Show HN: Jelly – SSH Social Hangout built a social network you connect to over SSH. no signup, no browser, just open your terminal and you're in. channels, profiles, guestbook, shared blackboard, Top 8. your identity is your SSH key fingerprint so no passwords needed. to connect: ssh-keygen -t ed25519 (just hit enter through all the prompts) ssh jellyshell.dev built with Go, Bubble Tea, and Wish. i wanted to make something that maintains privacy and gets away from the brain rot and algorithms pushing rage bait. lmk what you think. March 24, 2026 at 11:08PM

Monday, March 23, 2026

Show HN: JulIDE – Lightweight Julia IDE Built with Tauri https://ift.tt/CL9i05c

Show HN: JulIDE – Lightweight Julia IDE Built with Tauri Hi HN! I built JulIDE - a lightweight Julia IDE using Tauri and Rust. Features: 10MB install (vs VSCode's 300MB) Full LSP, debugger, Git integration Built-in dev containers with X11 forwarding Tauri/Rust backend, React frontend Monaco based editor It's beta but functional. Built this for fun and to solve a real need in the Julia community. Tech stack: Tauri 2, Rust, React, Monaco, LanguageServer.jl GitHub: https://ift.tt/NzVKsSM Would love feedback! https://ift.tt/NzVKsSM March 24, 2026 at 12:55AM

Show HN: Minimalist library to generate SVG views of scientific data https://ift.tt/WVSQ2s7

Show HN: Minimalist library to generate SVG views of scientific data Just wanted to share with HN a simple/minimal open source Python library that generates SVG files visualizing two dimensional data and distributions, in case others find it useful or interesting. I wrote it as a fun project, mostly because I found that the standard libraries in Python generated unnecessarily large SVG files. One nice property is that I can configure the visuals through CSS, which allows me to support dark/light mode browser settings. The graphs are specified as JSON files (the repository includes a few examples). It supports scatterplots, line plots, histograms, and box plots, and I collected examples here: https://ift.tt/LzWSibD... I did this mostly for the graphs in an article in my blog ( https://alejo.ch/3jj ). Would love to hear opinions. :-) https://ift.tt/0VPA8k5 March 24, 2026 at 12:54AM

Show HN: Threadprocs – executables sharing one address space (0-copy pointers) https://ift.tt/6B9ZybA

Show HN: Threadprocs – executables sharing one address space (0-copy pointers) This project launches multiple independent programs into a single shared virtual address space, while still behaving like separate processes (independent binaries, globals, and lifetimes). When threadprocs share their address space, pointers are valid across them with no code changes for well-behaved Linux binaries. Unlike threads, each threadproc is a standalone and semi-isolated process. Unlike dlopen-based plugin systems, threadprocs run traditional executables with a `main()` function. Unlike POSIX processes, pointers remain valid across threadprocs because they share the same address space. This means that idiomatic pointer-based data structures like `std::string` or `std::unordered_map` can be passed between threadprocs and accessed directly (with the usual data race considerations). This accomplishes a programming model somewhere between pthreads and multi-process shared memory IPC. The implementation relies on directing ASLR and virtual address layout at load time and implementing a user-space analogue of `exec()`, as well as careful manipulation of threadproc file descriptors, signals, etc. It is implemented entirely in unprivileged user space code: < https://github.com/jer-irl/threadprocs/blob/main/docs/02-imp... >. There is a simple demo demonstrating “cross-threadproc” memory dereferencing at < https://github.com/jer-irl/threadprocs/tree/main?tab=readme-... >, including a high-level diagram. This is relevant to systems of multiple processes with shared memory (often ring buffers or flat tables). These designs often require serialization or copying, and tend away from idiomatic C++ or Rust data structures. Pointer-based data structures cannot be passed directly. There are significant limitations and edge cases, and it’s not clear this is a practical model, but the project explores a way to relax traditional process memory boundaries while still structuring a system as independently launched components. https://ift.tt/4oKiJCI March 23, 2026 at 11:08PM