Framework Computer Now Sponsoring LVFS / Fwupd Development

Hacker News (score: 25)
Found: November 29, 2025
ID: 2529

Description

Other
Framework Computer Now Sponsoring LVFS / Fwupd Development

More from Hacker

Show HN: HyprMCP – Analytics, logs and auth for MCP servers

Show HN: HyprMCP – Analytics, logs and auth for MCP servers Hi HN, my name is Philip, I’m the co-founder of Glasskube and one of the creators of HyprMCP.<p>This project started when we did what everyone was doing — building a remote MCP server and launching it. Building the first local MCP server for testing was quite simple, and we had our first tools ready within a day. The next step was turning that into a production-ready remote MCP server.<p>As we exposed the MCP server to our users, we wanted to authenticate them with our existing authentication methods. We dove deep into authentication. Our approach was to build an auth proxy and plug it in front of our MCP. It took a while to figure out Dynamic Client Registration (DCR) and the OAuth spec, and especially the gaps between existing OIDC IDPs and what LLM clients needed.<p>We thought authentication would be the hard part — but it wasn’t. When we shared the MCP server with a few friendly startups, we realized that different MCP clients behave differently. Especially if something didn&#x27;t work, it was hard to figure out the root cause. We ended up storing all the raw gRPC method calls to see if the initialization and subsequent requests worked. This is especially useful if you are on a serverless environment with limited debugging functionality, like Cloudflare Workers.<p>Once we solved auth and compatibility, we launched to a small customer base — done, right? Unfortunately, not quite. Technically everything was working, but when we started talking to users, they told us the MCP server didn’t always respond with the right tools for their prompts. We had a working enterprise-grade MCP server — but it wasn’t very smart. After talking to some startup friends, we realized we needed an evaluation layer. That’s when we added prompt analytics — letting us see which prompts triggered which tools and how well they performed. That alone dramatically improved our MCP’s behavior and overall user experience.<p>After building all of this into our proxy, we realized that everyone building a remote MCP was facing the same challenges. So we decided to package it all up and release it to the community.<p>We’re thrilled to launch and open-source HyprMCP. It acts as a proxy that you can plug in front of your MCP server(s) with zero code changes. You get authentication, logging and debugging, prompt analytics, and an MCP connection instructions generator.<p>Under the hood, HyprMCP leverages dynamic Kubernetes Operators (Metacontroller) to automate infrastructure provisioning.<p>On the roadmap: MCP aggregation — combining multiple MCP servers under one single remote URL for large organizations running servers with different lifecycles. All of it without storing end user credentials on the server and connecting the MCP to the organizations existing authentication methods.<p>You can check the project out on GitHub: <a href="https:&#x2F;&#x2F;github.com&#x2F;hyprmcp&#x2F;jetski" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;hyprmcp&#x2F;jetski</a><p>For testing, we also have a hosted version here: <a href="https:&#x2F;&#x2F;app.hyprmcp.com" rel="nofollow">https:&#x2F;&#x2F;app.hyprmcp.com</a><p>We even created a demo video on YouTube: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=m2-YyfjXap4" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=m2-YyfjXap4</a><p>We’d love to get your feedback, hear what features are missing, and learn how you’re building and running your own MCP servers.

QA-use-MCP: MCP for E2E testing

QA-use-MCP: MCP for E2E testing

Property-Based Testing of OCaml 5's Runtime System [pdf]

Property-Based Testing of OCaml 5's Runtime System [pdf]

Show HN: Dagger.js – A buildless, runtime-only JavaScript micro-framework

Show HN: Dagger.js – A buildless, runtime-only JavaScript micro-framework TL;DR: dagger.js is a buildless, runtime-only micro-framework that plays nicely with native Web Components. It uses HTML-first directives (e.g. +click, +load) so you can ship a page by dropping a single &lt;script&gt; from a CDN—no bundlers, no compile step.<p>Why I built it Modern stacks are powerful but often heavy: bundlers, compile steps, framework DSLs, local CLIs. For internal tools, small apps, and edge&#x2F;serverless deployments, I wanted something you can view-source, paste into a page, and ship.<p>What it is:<p>Runtime-only: no build or VDOM compile; hydrate behaviors directly on HTML. HTML directives: e.g. +click, lifecycle +load &#x2F; +loaded &#x2F; +unload &#x2F; +unloaded. Zero APIs: dagger.js works in pure declarative mode, modules and directives provide everything you need to build your application. Web-Components-first: works alongside Custom Elements; keep concerns local. Distributed modules: load small, focused script modules via CDN. Progressive enhancement: the page renders without a build step.<p>Use cases:<p>Admin panels &amp; dashboards that don’t warrant a full toolchain Embed widgets, docs-sites with interactive bits Edge&#x2F;serverless apps where cold start and simplicity matter<p>Links<p>GitHub: <a href="https:&#x2F;&#x2F;github.com&#x2F;dagger8224&#x2F;dagger.js" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;dagger8224&#x2F;dagger.js</a> Docs&#x2F;Guide: <a href="https:&#x2F;&#x2F;daggerjs.org" rel="nofollow">https:&#x2F;&#x2F;daggerjs.org</a> Examples: <a href="https:&#x2F;&#x2F;codepen.io&#x2F;dagger8224&#x2F;pens" rel="nofollow">https:&#x2F;&#x2F;codepen.io&#x2F;dagger8224&#x2F;pens</a><p>I’d love feedback on edge-cases, and where it breaks. Happy to answer tough questions here.

No other tools from this source yet.