Wednesday, February 18, 2026

Show HN: I curated 130 US PDF forms and made them fillable in browser https://ift.tt/btBDCNH

Show HN: I curated 130 US PDF forms and made them fillable in browser Hi HN! I built SimplePDF 7 years ago, with the vision from day one to help get rid of bureaucracy (I'm from France, I know what I'm talking about) Fast forward to this week where I finally released something I had on my mind for a long time: a repository of the main US forms that are ready to be filled, straight from the browser, as opposed to having to find a PDF tool online (or local). I focused on healthcare, ED, HR, Legal and IRS/Tax for now. On the tech-side, it's SimplePDF all the way down: client-side processing (the data / documents stay in your browser). I hope you find the resource useful! NiP https://ift.tt/OIQgl8y February 18, 2026 at 12:03AM

Show HN: Self-Hosted Task Scheduling System (Back End and UI and Python SDK) https://ift.tt/7Y5wKvQ

Show HN: Self-Hosted Task Scheduling System (Back End and UI and Python SDK) Hey HN, I’ve been working on a small side project called Cratos and wanted to share it to get feedback. Cratos is a self-hosted task scheduling system. You configure a URL, define when it should be called, and Cratos handles scheduling, retries, execution history, and real-time updates. The goal was to have something lightweight and fully owned - no SaaS dependency, no external cron service. It’s split into three repositories: Backend service: https://ift.tt/xXB4p3N Web dashboard: https://ift.tt/Kkw9OnT Python SDK: https://ift.tt/7ZBmz3T Why I built it: In a few projects, I repeatedly needed reliable scheduled webhooks with: Retry logic Execution logs/history A dashboard to inspect runs Easy local deployment I didn’t want to depend on external services or re-implement job scheduling from scratch every time. The goal was simple deployment (docker compose up) and full control. It’s still early, but usable. I’d especially appreciate feedback from people who’ve built or operated schedulers, cron replacements, or internal job runners I would love some feedback, or tell me how it would be useful to you https://ift.tt/Kkw9OnT February 17, 2026 at 10:39PM

Tuesday, February 17, 2026

Show HN: Claude-engram – Brain-inspired persistent memory, runs inside Claude.ai https://ift.tt/iLD1c9H

Show HN: Claude-engram – Brain-inspired persistent memory, runs inside Claude.ai Claude.ai artifacts can call the Anthropic API and have persistent storage (5MB via window.storage). I used these two capabilities to build a memory system modeled on how human memory actually works — salience scoring, forgetting curves, and sleep consolidation — all running inside a single React artifact with no external dependencies. Just add artifact to your chat and paste instructions into your personal preferences setting. https://ift.tt/cDrm4aC February 16, 2026 at 10:45PM

Monday, February 16, 2026

Show HN: Please hack my C webserver (it's a collaborative whiteboard) https://ift.tt/t5Y4lqe

Show HN: Please hack my C webserver (it's a collaborative whiteboard) Source code: https://ift.tt/MBW38YK https://ced.quest/draw/ February 16, 2026 at 12:27AM

Show HN: An open-source extension to chat with your bookmarks using local LLMs https://ift.tt/RZiOU2T

Show HN: An open-source extension to chat with your bookmarks using local LLMs I read a lot online and constantly bookmark articles, docs, and resources… then forget why I saved them. Also was very bored on Valentines, so I built a browser extension that lets you chat with your bookmarks directly, using local-first AI (WebLLM running entirely in the browser). The extension downloads and indexes your bookmarked pages, stores them locally, and lets you ask questions. No server, no cloud processing, everything stays on your machine. Very early but it works and planning to add a bunch of stuff. Did I mentioned is open-source, MIT licensed? https://ift.tt/r1XRosO February 15, 2026 at 10:31PM

Sunday, February 15, 2026

Show HN: PolyMCP – A framework for building and orchestrating MCP agents https://ift.tt/RVavM3z

Show HN: PolyMCP – A framework for building and orchestrating MCP agents Hi everyone, I’ve been working on PolyMCP, an open-source framework for building and orchestrating agents using the Model Context Protocol (MCP). Most of the tooling around MCP focuses on exposing tools. With PolyMCP, the focus this time is on agents: how to structure them, connect them to multiple MCP servers, and make them reliable in real workflows. PolyMCP provides: • A clean way to define MCP-compatible tool servers in Python or TypeScript • An agent abstraction that can connect to multiple MCP endpoints (stdio, HTTP, etc.) • Built-in orchestration primitives for multi-step tasks • A CLI to scaffold projects and run an inspector UI to debug tools and agent interactions • A modular structure that makes it easier to compose skills and reuse components across projects The main goal is to make agent systems less ad-hoc. Instead of writing glue code around each model + tool combination, PolyMCP gives you a structured way to: • Register tools as MCP servers • Connect them to one or more agents • Control execution flow and state • Inspect and debug interactions It’s MIT licensed and intended for developers building real-world automation, internal copilots, or multi-tool assistants. I’d love feedback on: • The agent abstraction: is it too opinionated or not opinionated enough? • Orchestration patterns for multi-agent setups • Developer experience (CLI, inspector, project layout) Happy to answer questions. February 15, 2026 at 01:41AM

Show HN: Azazel – Lightweight eBPF-based malware analysis sandbox using Docker https://ift.tt/OoxfIgH

Show HN: Azazel – Lightweight eBPF-based malware analysis sandbox using Docker Hey HN, I got frustrated with heavy proprietary sandboxes for malware analysis, so I built my own. Azazel is a single static Go binary that attaches 19 eBPF hook points to an isolated Docker container and captures everything a sample does — syscalls, file I/O, network connections, DNS, process trees — as NDJSON. It uses cgroup-based filtering so it only traces the target container, and CO-RE (BTF) so it works across kernel versions without recompilation. It also has built-in heuristics that flag common malware behaviors: exec from /tmp, sensitive file access, ptrace, W+X mmap, kernel module loading, etc. Stack: Go + cilium/ebpf + Docker Compose. Requires Linux 5.8+ with BTF. This is the first release — it's CLI-only for now. A proper dashboard is planned. Contributions welcome, especially around new detection heuristics and additional syscall hooks. https://ift.tt/68aohSD February 15, 2026 at 12:37AM

Show HN: I curated 130 US PDF forms and made them fillable in browser https://ift.tt/btBDCNH

Show HN: I curated 130 US PDF forms and made them fillable in browser Hi HN! I built SimplePDF 7 years ago, with the vision from day one to ...