Show HN: Titan โ JavaScript-first framework that compiles into a Rust server
Hacker News (score: 27)Description
I built Titan, a backend framework where you write routes and logic in JavaScript, and the CLI compiles everything into a single Rust + Axum binary using the Boa JS engine. No Node.js is required in production.
The idea is to keep JS developer experience while getting Rust performance and a self-contained deployable server.
Current features:
JS route DSL
Action system mapped to Rust
esbuild bundling
Generated Rust server with Axum
Hot-reload dev server
Single-binary output
Repo: https://github.com/ezet-galaxy/-ezetgalaxy-titan
Would love feedback on the architecture, DX, and whether this hybrid JSโRust approach is useful.
Thanks for reading!
More from Hacker
Show HN: pgwire-replication - pure rust client for Postgres CDC
Show HN: pgwire-replication - pure rust client for Postgres CDC
Show HN: VaultSandbox โ Test your real MailGun/SES/etc. integration
Show HN: VaultSandbox โ Test your real MailGun/SES/etc. integration I've spent the last few months working on something I wish I'd had years ago. I kept running into the same issue: CI green, production mail broken. TLS handshake failures, DKIM alignment mismatches, SPF soft-fails ... the stuff that only surfaces when real mail servers are involved. Most test tools (Mailpit, MailHog) are catch-alls. They confirm "an email was sent" but don't validate the protocol. They also aren't designed for network-exposed environments: no auth, unprotected Web UI, easy to enumerate messages.<p>VaultSandbox is my attempt at fixing that. It's a self-hosted SMTP gateway (AGPLv3) that validates SPF, DKIM, DMARC, and rDNS on every incoming message. You keep your production email provider (Postmark, SendGrid, SES) in tests and you just change the recipient domain. No mocking, no config changes. There are client SDKs (Node, Python, Go, Java, .NET), plus a Web UI and a CLI for manual testing.<p>Some technical details:<p>Deterministic Tests Instead of polling or sleep loops, the SDKs use Server-Sent Events (SSE) so test assertions trigger the moment the mail hits the gateway.<p>Minimal infrastructure footprint Built with NestJS and Angular, with no external database dependency to keep the container footprint small and easier to reason about.<p>Post-Quantum Encryption I use ML-KEM-768 for the encryption layer. Incoming mail is encrypted immediately using a client-generated public key and the plaintext is discarded. The server only ever stores encrypted message data and cannot decrypt it. I chose PQ because I wanted to build something I wouldn't have to revisit in five years. If it handles large PQ keys reliably, everything else is easy.<p>Quick start: <a href="https://vaultsandbox.dev/getting-started/quickstart/" rel="nofollow">https://vaultsandbox.dev/getting-started/quickstart/</a><p>Site: <a href="https://vaultsandbox.com" rel="nofollow">https://vaultsandbox.com</a><p>I'd love feedback, especially on whether AGPLv3 would be a blocker for something you'd self-host in dev.
Zero-Code Instrumentation of an Envoy TCP Proxy Using eBPF
Zero-Code Instrumentation of an Envoy TCP Proxy Using eBPF
List, inspect and explore OCI container images, their layers and contents
List, inspect and explore OCI container images, their layers and contents
No other tools from this source yet.