Show HN: Script Snap – Extract code from videos
Show HN (score: 8)Description
The Backstory: I built this out of pure frustration. A while ago, I was trying to figure out a specific configuration for a project, and the only good resource I could find was a 25-minute YouTube video. I had to scrub through endless "smash the like button" intros and sponsor reads just to find a single 5-line JSON payload.
I realized I didn't want an "AI summary" of the video; I just wanted the raw code hidden inside it.
What's different: There are dozens of "YouTube to Text" summarizers out there. Script Snap is different because it is explicitly designed as a technical extraction engine.
It doesn't give you bullet points about how the YouTuber feels. It scans the transcript and on-screen visuals to extract specifically:
Code snippets
Terminal commands
API payloads (JSON/YAML)
Security warnings (like flagging sketchy npm installs)
It strips out the "vibe" and outputs raw, formatted Markdown that you can copy straight into your IDE.
Full disclosure on the launch: Our payment processor (Stripe) flagged us on day one (banks seem to hate AI tools), so I've pivoted to a manual "Concierge Alpha" for onboarding. The extraction engine is fully operational, just doing things the hard way for now.
I'd love to hear your thoughts or harsh feedback on the extraction quality!
More from Show
Show HN: Shibuya – A High-Performance WAF in Rust with eBPF and ML Engine
Show HN: Shibuya – A High-Performance WAF in Rust with eBPF and ML Engine Hi HN,<p>I’ve been working on Shibuya, a next-generation Web Application Firewall (WAF) built from the ground up in Rust.<p>I wanted to build a WAF that didn't just rely on legacy regex signatures but could understand intent and perform at line-rate using modern kernel features.<p>What makes Shibuya different:<p>Multi-Layer Pipeline: It integrates a high-performance proxy (built on Pingora) with rate limiting, bot detection, and threat intelligence.<p>eBPF Kernel Filtering: For volumetric attacks, Shibuya can drop malicious packets at the kernel level using XDP before they consume userspace resources.<p>Dual ML Engine: It uses an ONNX-based engine for anomaly detection and a Random Forest classifier to identify specific attack classes like SQLi, XSS, and RCE.<p>API & GraphQL Protection: Includes deep inspection for GraphQL (depth and complexity analysis) and OpenAPI schema validation.<p>WASM Extensibility: You can write and hot-load custom security logic using WebAssembly plugins.<p>Ashigaru Lab: The project includes a deliberately vulnerable lab environment with 6 different services and a "Red Team Bot" to test the WAF against 100+ simulated payloads.<p>The Dashboard: The dashboard is built with SvelteKit and offers real-time monitoring (ECharts), a "Panic Mode" for instant hardening, and a visual editor for the YAML configuration.<p>I'm looking for feedback on the architecture and the performance of the Rust-eBPF integration.
No other tools from this source yet.