Feed aggregator

Papers

Hacker News - Sun, 05/04/2025 - 3:18am

Article URL: https://apps.gnome.org/Papers/

Comments URL: https://news.ycombinator.com/item?id=43885133

Points: 2

# Comments: 0

Categories: Hacker News

Erdős Number

Hacker News - Sun, 05/04/2025 - 3:17am
Categories: Hacker News

Robotic Visual Instruction

Hacker News - Sun, 05/04/2025 - 3:06am

Article URL: https://arxiv.org/abs/2505.00693

Comments URL: https://news.ycombinator.com/item?id=43885070

Points: 2

# Comments: 0

Categories: Hacker News

Ask HN: Would you give your Microsoft Azure keychain to an AI agent?

Hacker News - Sun, 05/04/2025 - 2:56am

Hey HN,

I’m Maxime — a product builder and former Head of Product at Qonto (think Brex for Europe, ~$6B valuation). I recently started something new called [Well](https://wellapp.ai/) (https://wellapp.ai/), where we deploy autonomous agents (via remote browsers or Chrome extensions) to collect supplier invoices on behalf of founders. It saves tons of brain cycles for busy operators.

Now, I know I’m EU-based and this might sound like yet another attempt to regulate everything … but bear with me — the core question is:

> Would you give your Microsoft Azure keychain to an AI agent?

Over the years, I’ve built many integrations — some with OAuth2, others via RPA when no official APIs existed. But with this new generation of agents acting autonomously on behalf of users, I’m starting to wonder: how will we manage authentication and define the scope of what an agent is allowed to do?

*Problem 1: Agent Authentication*

My agents act on my behalf — but I’m extremely anti-password proliferation. While it's tempting to just give an agent my password and 2FA codes, that feels fundamentally broken.

Ideally, I want agents to request access to credentials with a specific scope, duration, and purpose — and I want to manage that access centrally. If I change my password or revoke permissions, the agent should lose access instantly.

*Problem 2: Agent Scope & Consent*

Let’s say an agent gets valid SaaS credentials and starts crawling an account. How do I know it's only collecting invoices, and not poking around in sensitive settings or triggering a password reset?

OAuth solved this with scopes and explicit user consent. But agents today don’t seem to have an equivalent. There’s no "collect-invoices-only" checkbox.

My open question: Should this kind of permissioning live inside a password manager? Or is it the responsibility of agent platforms to build a consent-aware vault? Or should we be thinking about something entirely new — like an MCP (Multi-Agent Control Protocol)?

Would love to hear if anyone has seen serious work or proposals in this space — or if you're tackling similar challenges in your vertical.

Thanks!

Comments URL: https://news.ycombinator.com/item?id=43885036

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: Time to Hack

Hacker News - Sun, 05/04/2025 - 2:54am

Most websites suck at telling you if your password is actually secure. They are still stuck in the 2000s, using outdated password rules. They check for symbols, numbers, uppercase letters—then rate Password1! as “strong”. But any real attacker cracks that in minutes.

I got tired of these outdated rules that don’t reflect actual security. So I built Time To Hack. This Chrome extension estimates how long it would actually take to crack your password (as you type), across realistic attack scenarios using entropy analysis, pattern recognition, and modern cracking models.

Comments URL: https://news.ycombinator.com/item?id=43885029

Points: 3

# Comments: 0

Categories: Hacker News

Pages