Show HN: Importguard – Measure and enforce Python import-time behavior in CI
I built a CLI tool to catch slow imports and sneaky side effects before they ship to production.
The problem: Python imports can quietly become a performance trap. Your CLI takes 2 seconds to show --help because importing your package pulls in pandas. Or worse, importing a module makes network calls or writes files as a side effect.
Importguard uses Python's -X importtime flag to measure exactly how long each import takes, then lets you:
- Set time budgets: `importguard check mypkg --max-ms 200` - Ban heavy imports: `importguard check mypkg.cli --ban pandas --ban torch` - Get reliable timing: `--repeat 5` runs multiple times and reports median - Configure per-module rules in `.importguard.toml`
It runs in an isolated subprocess so it doesn't pollute your interpreter, and outputs JSON for CI integration.
Use cases: - Keep CLI startup snappy - Prevent serverless cold start regressions (Lambda/Cloud Functions) - Ensure library hygiene (don't force users to install heavy deps)
pip install importguardpy
GitHub: https://github.com/AryanKumar1401/importguard
Happy to hear feedback on what would make this more useful!
The Cost of a Closure in C: The Rest
The article explores the performance impact of using closures in C++ and provides a follow-up to a previous article on the topic. It discusses the potential overhead associated with closures and offers insights into when and how to use them effectively in C++ code.
Freestyle Linked Lists Tricks
The article discusses the potential impact of technological advances on the job market, suggesting that emerging technologies like artificial intelligence and automation may lead to significant job displacement in the future, and calls for proactive measures to address this challenge.
Washington Childcare Subsidies Raise Fraud Concerns After Minnesota Probe
HTML Scratchpad
QEditor is a powerful online code editor that allows users to write, run, and share code snippets in various programming languages. It offers a range of features, including syntax highlighting, code completion, and real-time collaboration capabilities.
Poor sleep health is associated with older brain age
The article examines the potential of a novel therapeutic approach using engineered T cells to treat advanced solid tumors. The findings suggest this approach could offer a promising alternative to existing cancer treatments.
Building a simple tool to help students explore income options
The article provides a tool to help students estimate their potential future income based on their field of study, location, and other factors. This can assist students in making informed decisions about their educational and career paths.
Taxation in a Strong AI World
The article explores the potential impact of strong AI on taxation, considering how an AI-powered economy could reshape tax systems and government revenue. It discusses the challenges and opportunities that may arise in a world where AI systems play a significant role in economic activities.
'College dropout' has become the most coveted startup founder credential
The article discusses how the college dropout status has become a coveted credential for startup founders, as many successful tech entrepreneurs, such as Bill Gates and Mark Zuckerberg, have famously left college to pursue their business ventures, leading to a perception that a college degree is no longer necessary for entrepreneurial success.
SIGGRAPH2025 Advances in Real-Time Rendering: IdTech8 Global Illumination [video]
UCLA Distinguished Lecturer Series – Alan C. Kay, Apple Computer, April 1993 [video]
When cheating is harder than practicing
Aura – A Ruby-inspired declarative language for AI/ML pipelines and web apps
Aura is a general-purpose, open-source programming language designed to be readable and expressive. It aims to simplify complex tasks, provide powerful metaprogramming capabilities, and integrate seamlessly with other languages and ecosystems.
Spherical Snake
The article explores the development of a 'spherical snake' game, where the player controls a snake that can move across the surface of a sphere. It discusses the unique challenges and insights gained from creating this twist on the classic snake game.
British ethical hacker granted rare visa after finding 'critical vulnerability
A British hacker successfully breached an Australian government website to demonstrate his technical skills and prove he is qualified for a visa. The hacker claims he did not steal or alter any data, but rather accessed the site to highlight potential vulnerabilities in order to help improve the government's cybersecurity measures.
Real-time liquidity and contagion risk monitoring for 24/7 tokenized markets
PatternOS is a modular operating system designed to be highly customizable and adaptable, allowing users to create their own personalized computing environments. The article explores the core principles and features of PatternOS, highlighting its emphasis on flexibility, modularity, and user-centric design.
Generating Human Faces with VAEs
This article explores the use of Variational Autoencoders (VAEs) to generate realistic human faces. It discusses the technical aspects of VAEs and how they can be applied to face generation, while also highlighting the potential implications and ethical considerations of this technology.
Show HN: Neural_covenant – 129-modality AGI stack built for sovereignty
I am a builder, not a researcher. Version 0.6.0 of NEURAL_COVENANT moves beyond standard LLM text prediction into a functional 129-modality AGI implementation.
Repo: https://github.com/AI-Sovereign/Multimodal-AGI-Architecture-...
Key Engineering Specs: * 129-Modality Nexus: Ingests Bio-Physiological (HRV/GSR), Electromagnetic (RF/WiFi), and Semantic data. Handled via Hierarchical Tensor Fusion into a shared latent space Z. * The Neural Trinity: Integrates snntorch (LIF spiking neurons) for event-driven efficiency, torch-geometric (GCN) for relational mapping, and Transformers for high-level cognition. * Performance: Serialized via FlatBuffers and served through a Granian (Rust) backend to maintain sub-millisecond latency. * Mathematical Core: Optimizes for Capacity Φ to maintain intelligence density across streams. Spiking dynamics: U[t+1] = βU[t] + (1-β)I[t] - S[t]U_thresh.
This is a local-first, sovereign architecture. I’m looking for feedback from the community on the normalization efficiency of the 129-modality super-tensor using Polars and the GCN update normalization constants.
Show HN: A small R5RS-ish Scheme interpreter with call/cc
I’ve been building a small Scheme interpreter as a learning project, mainly to understand continuations and core Scheme semantics. It supports mutable pairs and call/cc, and is intentionally minimal rather than production-ready. equal? is allowed to diverge on cyclic structures.
Welcome to the Public Domain in 2026
The article discusses the upcoming public domain expansion in 2026, when a significant number of creative works will become freely available for public use. It highlights the cultural and educational benefits of this transition and the importance of preserving and celebrating the public domain.
Show HN: Ts-bridge, tsserver lsp shim with daemon for Neovim
The article discusses the development of a TypeScript-based bridge application that allows communication between a client-side web application and a server-side application. The bridge application handles message routing, serialization, and deserialization, facilitating seamless data exchange between the two components.
Pidgin 3.0 Experimental 5 (2.94.0) has been released
Pidgin, an open-source multi-protocol instant messaging client, has released a new experimental version 5.2.94.0. This update includes various improvements and bug fixes, providing users with a more stable and enhanced messaging experience.
Apple cuts Vision Pro production and marketing after weak sales
The article discusses the growing number of companies offering 'buy now, pay later' (BNPL) services, which allow consumers to purchase products and pay for them in installments. It explores the potential risks and regulatory challenges associated with the rapid expansion of the BNPL industry.
Block web unless Claude Code is running
The article discusses the development of Claude, an AI assistant, and efforts to block its use in certain situations. It highlights the ethical and practical considerations around the deployment of advanced AI systems.
Bayesian A/B testing is not immune to peeking
The article explores the use of Bayesian A/B testing, which allows for continuous monitoring of experiments and early stopping when sufficient evidence is obtained. It discusses the benefits of this approach compared to traditional A/B testing, such as increased statistical power and reduced sample size requirements.
Why Write Online Now?
The article discusses the benefits of writing and publishing content online, highlighting the accessibility, potential for growth, and ability to build a personal brand that online writing offers. It encourages readers to consider starting an online writing practice as a means of self-expression and professional development.
Show HN: The Best Way to use MCPs with coding agents
Hey folks, I built Jilebi - an MCP server/runtime written in rust that gets its tools from javascript plugins. These plugins run in a deno sandboxed Runtime and need permissions to access file and network resources.
It simplifies creating and installing MCP servers. Give it a try! Right now I'm working on reducing the size of the executable - any tips would be appreciated.
Happy new year!
Scribus – open-source Desktop Publishing
Wan 2.6 Video Generator,role-playing,cinematic AI video creation with Sound
Show HN: Forensic evidence of iOS mesh networking bypassing Airplane Mode
I found evidence of autonomous mesh networking on iOS during Airplane Mode. What am I missing?
Did forensic analysis on my iPhone during Airplane Mode isolation. Kernel stats show 2,657 packets transmitted and 84.5MB processed through mDNSResponder while interfaces report "inactive". Found a parallel utun2 tunnel bound to IDS framework that persists during isolation. Applied Shannon-Hartley theorem to verify the channel capacity supports this volume. Either I'm misunderstanding legitimate system behavior, or this is a covert channel. Reproducible steps and raw evidence included.
https://github.com/JGoyd/NeuralNet