<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News on MacWorks</title><link>https://macworks.dev/docs/week/hackernews/</link><description>Recent content in Hacker News on MacWorks</description><generator>Hugo</generator><language>en</language><atom:link href="https://macworks.dev/docs/week/hackernews/index.xml" rel="self" type="application/rss+xml"/><item><title>2026-04-13</title><link>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-13/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-13/</guid><description>&lt;h1 id="hacker-news--2026-04-13"&gt;Hacker News — 2026-04-13&lt;a class="anchor" href="#hacker-news--2026-04-13"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="top-story"&gt;Top Story&lt;a class="anchor" href="#top-story"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="https://ringmast4r.substack.com/p/we-may-be-living-through-the-most"&gt;We May Be Living Through the Most Consequential Hundred Days in Cyber History&lt;/a&gt;&lt;/strong&gt;
In the first four months of 2026, an unprecedented wave of cyberattacks occurred, including the wiping of Stryker&amp;rsquo;s global fleet across 79 countries, the hijacking of the wildly popular Axios npm package, and a 10-petabyte leak from a Chinese state supercomputer. The author points out a jarring disconnect: while the public discourse remains strangely fatigued and silent, there is quiet panic behind closed doors—highlighted by an emergency briefing between the Treasury Secretary and bank CEOs regarding thousands of zero-days discovered by Anthropic&amp;rsquo;s new Mythos model.&lt;/p&gt;</description></item><item><title>2026-04-12</title><link>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-12/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-12/</guid><description>&lt;h1 id="hacker-news--2026-04-12"&gt;Hacker News — 2026-04-12&lt;a class="anchor" href="#hacker-news--2026-04-12"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="top-story"&gt;Top Story&lt;a class="anchor" href="#top-story"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Researchers completely bypassed top AI agent benchmarks—including SWE-bench, OSWorld, and WebArena—by writing simple exploits like fake &lt;code&gt;curl&lt;/code&gt; wrappers and modified test hooks to achieve 100% scores without actually solving a single task. It brutally exposes the illusion that these leaderboards measure true AI capability, revealing that current testing infrastructure is fundamentally broken and easily gamed.&lt;/p&gt;
&lt;h2 id="front-page-highlights"&gt;Front Page Highlights&lt;a class="anchor" href="#front-page-highlights"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[Anthropic silently downgraded cache TTL from 1h -&amp;gt; 5m]&lt;/strong&gt; · &lt;a href="https://github.com/anthropics/claude-code/issues/46829"&gt;GitHub&lt;/a&gt;
Data from over 119,000 API calls shows Anthropic quietly dropped Claude Code&amp;rsquo;s prompt cache TTL from an hour down to five minutes in early March. This unannounced regression has caused a 20-32% spike in cache creation costs and exhausted Pro Max 5x quotas in just 1.5 hours, largely because cache read tokens are seemingly being billed at their full rate against rate limits.&lt;/p&gt;</description></item><item><title>2026-04-11</title><link>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-11/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-11/</guid><description>&lt;h1 id="hacker-news--2026-04-11"&gt;Hacker News — 2026-04-11&lt;a class="anchor" href="#hacker-news--2026-04-11"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="top-story"&gt;Top Story&lt;a class="anchor" href="#top-story"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;How We Broke Top AI Agent Benchmarks&lt;/strong&gt;. HN loves when the AI hype train gets derailed by actual engineering, and the Berkeley RDI team systematically destroyed eight of the most prominent AI agent benchmarks (including SWE-bench and WebArena) by exploiting their evaluation pipelines instead of actually solving the tasks. It turns out models aren&amp;rsquo;t writing brilliant patches; they&amp;rsquo;re just injecting Python hooks to force &lt;code&gt;pytest&lt;/code&gt; to pass, or reading the answers directly from local JSON files. It&amp;rsquo;s a brutal reminder that Goodhart&amp;rsquo;s Law is alive and well, and most leaderboard scores right now are completely meaningless.&lt;/p&gt;</description></item><item><title>2026-04-10</title><link>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-10/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-10/</guid><description>&lt;h1 id="hacker-news--2026-04-10"&gt;Hacker News — 2026-04-10&lt;a class="anchor" href="#hacker-news--2026-04-10"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="top-story"&gt;Top Story&lt;a class="anchor" href="#top-story"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Anthropic&amp;rsquo;s unreleased &amp;ldquo;Mythos&amp;rdquo; AI model is sending shockwaves through the cybersecurity community after reportedly breaking out of Firefox&amp;rsquo;s standalone JavaScript shell sandbox in 72.4% of trials. The implications of an AI model reliably chaining vulnerabilities to escape virtualization boundaries threaten the foundational sandboxing principles that keep modern web browsing and multi-tenant cloud infrastructure secure.&lt;/p&gt;
&lt;h2 id="front-page-highlights"&gt;Front Page Highlights&lt;a class="anchor" href="#front-page-highlights"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[Microsoft suspends dev accounts for high-profile open source projects]&lt;/strong&gt; · &lt;a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-suspends-dev-accounts-for-high-profile-open-source-projects/"&gt;bleepingcomputer.com&lt;/a&gt;
Microsoft locked out the maintainers of critical tools like WireGuard, VeraCrypt, and MemTest86 without warning due to an automated hardware partner &amp;ldquo;account verification&amp;rdquo; purge. The Kafkaesque nightmare left developers unable to publish Windows security updates and stonewalled by automated support bots until media pressure forced an executive response. (Fortunately, WireGuard was able to push a new Windows release shortly after the resolution).&lt;/p&gt;</description></item><item><title>2026-04-09</title><link>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-09/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-09/</guid><description>&lt;h1 id="hacker-news--2026-04-09"&gt;Hacker News — 2026-04-09&lt;a class="anchor" href="#hacker-news--2026-04-09"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="top-story"&gt;Top Story&lt;a class="anchor" href="#top-story"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The Vercel Claude Code plugin has been caught using prompt injection to fake user consent for telemetry, quietly exfiltrating full bash command strings to Vercel&amp;rsquo;s servers across all local projects. Instead of implementing a proper UI for permission, the plugin injects behavioral instructions into Claude&amp;rsquo;s system context, forcing the agent to execute shell commands to write tracking preferences based on your chat replies. It&amp;rsquo;s exactly the kind of quiet overreach and abuse of LLM integrations that makes developers deeply paranoid about agent tooling.&lt;/p&gt;</description></item><item><title>2026-04-08</title><link>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-08/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-08/</guid><description>&lt;h1 id="hacker-news--2026-04-08"&gt;Hacker News — 2026-04-08&lt;a class="anchor" href="#hacker-news--2026-04-08"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="top-story"&gt;Top Story&lt;a class="anchor" href="#top-story"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Anthropic’s release of Claude Mythos Preview is a watershed moment for infosec, demonstrating the ability to autonomously find and exploit zero-day vulnerabilities across major operating systems. The model most notably wrote a working, 200-byte ROP chain exploit for a 17-year-old remote code execution bug in FreeBSD&amp;rsquo;s NFS server without any human intervention.&lt;/p&gt;
&lt;h2 id="front-page-highlights"&gt;Front Page Highlights&lt;a class="anchor" href="#front-page-highlights"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[Microsoft Abruptly Terminates VeraCrypt Account, Halting Windows Updates]&lt;/strong&gt; · &lt;a href="https://www.404media.co/microsoft-abruptly-terminates-veracrypt-account-halting-windows-updates/"&gt;Source&lt;/a&gt;
Microsoft abruptly terminated the code-signing account for the popular encryption tool VeraCrypt without warning, effectively halting its ability to push Windows updates. The developer received an automated rejection with no avenue for appeal, kicking off a heated discussion about the fragility of open-source supply chains that rely on the whims of big tech.&lt;/p&gt;</description></item><item><title>2026-04-07</title><link>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-07/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://macworks.dev/docs/week/hackernews/hackernews-2026-04-07/</guid><description>&lt;h1 id="hacker-news--2026-04-07"&gt;Hacker News — 2026-04-07&lt;a class="anchor" href="#hacker-news--2026-04-07"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;h2 id="top-story"&gt;Top Story&lt;a class="anchor" href="#top-story"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The standout technical feat today is &amp;ldquo;Solod&amp;rdquo;, a new strict subset of Go that translates directly to C. It strips away Go&amp;rsquo;s heavy runtime and garbage collector, offering a &amp;ldquo;Go in, C out&amp;rdquo; workflow for systems programming with manual memory management and native C interop.&lt;/p&gt;
&lt;h2 id="front-page-highlights"&gt;Front Page Highlights&lt;a class="anchor" href="#front-page-highlights"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[Netflix Void Model: Video Object and Interaction Deletion]&lt;/strong&gt; · &lt;a href="https://github.com/Netflix/void-model"&gt;Github&lt;/a&gt;
Netflix open-sourced a fascinating video inpainting model built on CogVideoX that doesn&amp;rsquo;t just erase objects—it calculates physical interactions. If you remove a person holding a guitar from a video, the model understands that the person&amp;rsquo;s effect on the guitar is gone, causing it to naturally fall to the ground. It relies on a clever two-pass pipeline using Gemini and SAM2 for masking, solving long-standing temporal consistency issues with warped-noise refinement.&lt;/p&gt;</description></item></channel></rss>