Sr. Content Developer at Microsoft, working remotely in PA, TechBash conference organizer, former Microsoft MVP, Husband, Dad and Geek.
147667 stories
·
33 followers

How I Built My 10 Agent OpenClaw Team

1 Share
From: AIDailyBrief
Duration: 19:00
Views: 508

A 10-agent OpenClaw mission control built to test digital employees, persistent memory, heartbeats, and scheduled CR jobs. Agent roster includes a mobile builder, continuous research agents powering AI maturity maps and opportunity radars, project managers, a chief of staff, and an NLW Tasks interactive to-do agent. Practical takeaways cover Mac Mini and Tailscale setup, Claude as build partner, heartbeat reliability, security calibration, and the upfront time investment versus long-term automation gains.

The AI Daily Brief helps you understand the most important news and discussions in AI.
Subscribe to the podcast version of The AI Daily Brief wherever you listen: https://pod.link/1680633614
Get it ad free at http://patreon.com/aidailybrief
Learn more about the show https://aidailybrief.ai/

Read the whole story
alvinashcraft
12 seconds ago
reply
Pennsylvania, USA
Share this story
Delete

Android Weekly Issue #714

1 Share
Articles & Tutorials
Sponsored
Vega OS delivers cross-device development with native performance, hot reloading, and built-in focus management. Vega Developer Tools provides you with the resources you need to develop, test, and distribute apps on Vega OS-powered devices. 
alt
Jaewoong Eum dives deep into the internal mechanisms of the kotlinx.serialization compiler plugin.
Abhi says Compose "retain" lets you drop ViewModel ceremony by retaining simple injectable presenters and cleaning them up via RetainObserver.
Sponsored
Code 10x faster. Tell Firebender to create full screens, ship features, or fix bugs - and watch it do the work for you. It's been battle tested by the best android teams at companies like Tinder, Adobe, and Instacart.
alt
Oğuzhan Aslan takes a closer look at the new Embedded Photo Picker.
Miguel Montemayor says Android 17 targeting forces large screen resizability and orientation support, pushing apps to adopt adaptive layouts, resilient camera previews, and robust state handling.
Leonidas Partsas implements a custom TopAppBarScrollBehavior that translates RecyclerView scroll into smooth collapse and expansion without partial rendering.
Pamela Hill says iOS-targeted multi-module KMP apps need an umbrella framework to prevent stdlib duplication and incompatible binaries across modules.
Mark Murphy warns that Android 17 Beta 1 mainly adds behavior hardening that can break apps using a small set of rare features.
Place a sponsored post
We reach out to more than 80k Android developers around the world, every week, through our email newsletter and social media channels. Advertise your Android development related service or product!
alt
News
Google says Android 17 Beta 1 mostly advances adaptability and media, connectivity, and companion device tooling alongside ongoing privacy, security, and performance work.
Videos & Podcasts
Dave Leeds explores a Kotlin feature change allowing return keywords in expression bodies.
alt
Amit Shekhar provides a detailed comparison of Retrofit and OkHttp, two popular libraries used by Android developers for networking.
Philipp Lackner explores the Media3 library along with its Jetpack Compose toolkit to build a custom-styled video player with our own UI letting you control media playback.
Alan Viverette and Aurimas Liutikas discuss the challenges and evolution of API design, particularly within the Android ecosystem.
Stevdza-San examines the new Koin Kotlin compiler plugin, which brings auto-detect constructor parameter features and compile-time code transformation, catching errors during the build process
Peter Friese and Marina Coelho attempting to port their "Make It So" to-do list app from iOS to Android using AI-powered coding agents, specifically Antigravity and Stitch
Daniel Atitienei presents a detailed AI-powered workflow for developing and launching profitable apps as a solo developer
Philipp Lackner explains structured concurrency in Kotlin coroutines, using a cooking analogy to illustrate concurrency concepts.
Read the whole story
alvinashcraft
23 seconds ago
reply
Pennsylvania, USA
Share this story
Delete

The CAP Theorem Is Why Your Cloud App Sometimes Feels Off

1 Share
There is a moment every cloud engineer seemingly has, whether they admit it or not. You open an application and something feels strange. A record you just saved is not there yet, a dashboard shows two different answers depending on where you look, or a system insists an action never happened even though you just performed it. At some point, a smart sounding person says “eventual consistency,” everyone nods, and the conversation moves on without anyone actually feeling satisfied by the...

Read the whole story
alvinashcraft
3 hours ago
reply
Pennsylvania, USA
Share this story
Delete

OpenClaw is being called a security “Dumpster fire,” but there is a way to stay safe

1 Share
Conceptual 3D render of a row of dark protective shields with one shield glowing in bright gold, symbolizing advanced cybersecurity, data protection, and secure sandboxing.

In a blog earlier this February, Snyk engineers said they scanned the entire ClawHub (the OpenClaw marketplace) and found that over 7 percent of the skills contained flaws that expose sensitive credentials. “They are functional, popular agent skills that instruct AI agents to mishandle secrets, forcing them to pass API keys, passwords, and even credit card numbers through the LLM’s context window and output logs in plaintext,” they reported.

OK, so we know OpenClaw is a security “Dumpster fire” right now, as we have reported.

I looked at Deno sometime ago; it treats TypeScript as a first-class citizen. I couldn’t help notice this detail in their recent Sandbox update:

You don’t want to run untrusted code (generated by your LLMs, your users’ LLMs, or even handwritten by users) directly on your server. It will compromise your system, steal your API keys, and call out to evil dot com. You need isolation.

Deno Sandbox gives you lightweight Linux microVMs (running in the Deno Deploy cloud) to run untrusted code with defense-in-depth security.

OK, sandboxes aren’t new, but Deno’s deployment environment caught my attention.

Deno and Deno Deploy

Well, it’s been a while since my last article about Deno and TypeScript, so I’ll speed through my example just to make sure I still remember everything before we check out the new sandbox stuff.

So let’s install Deno on my Mac. Fortunately, this looks the same as before:

As before, Deno correctly detected my shell. After restarting it, I checked everything was hunky dory:

So I’m not a TypeScript guy, and yet in that article, I wrote a bit of code to persuade myself that TypeScript is just looking at contents for equivalence. (Checkout the post for more on how an OOP developer can grok TypeScript)

class Car {
  drive() {
    // hit the pedal to the floor
  }
}
class Golfer {
  drive() {
    // hit the ball far
  }
}
// No error?
let w: Car = new Golfer();


So let’s do what we did last time and use a project initializer to run a TypeScript test.

I replace the main.ts with my drive method example from above, and run it:

So Deno handles my TypeScript as a first-class object, and proves it is a structural type system. But let’s get to the good stuff, and sign into Deno itself:

Before we can use a sandbox, we need to hop through a small verification hoop:

Don’t worry — it just checks your credit card exists, using the handy StripeLink that appears on your phone like a phishing request. Now we can set up — I’ll be following the right-hand column with code integration:

Now, we have the typical problem of connecting our identity to our requests. You can create a sandbox directly in code, which is neat — but first, we need a token.

So I’ll create an organisation token to connect my identity to Deno. I installed the SDK as the panel above suggested and created a token using the nice blue button. One small gripe here is that the terms “access token”, “organisation token”, and “deploy token” seemed to be used interchangeably.

OK, after setting the DENO_DEPLOY_TOKEN environment variable in my shell, we should be ready to run some code and create our very own sandbox on Deno’s cloud.

I save the following code as main.ts . I’m going to assume await is some sort of promise, as this is clearly asynchronous code. (The term “await” is also familiar enough in Victorian prose.)

import { Sandbox } from "@deno/sandbox"; 
await using sandbox = await Sandbox.create(); 
await sandbox.sh`echo "Hello, world!"`;


Remember to prove this happened, Deno will have to retain a record of the sandbox even after it has expired. As we are dealing with a security solution, we do need to tell Deno that we are happy use networking with the right flags:

OK, depending on how the statements are called, that appeared to work. Better proof must come in the appearance of the sandbox in my records:

We can see a little more detail in the instance from a nice filterable event log on the dashboard:

Well, that was just fine. I wrote some code on my laptop and ran it in a sandbox on Deno’s cloud. But we need to do a bit more to avoid the horrors of exfiltration.

Exfiltration shooter

What exactly is exfiltration? Of course, I could give the example of popular multiplayer games (you know them, or you don’t) whose very purpose is to appear as an avatar in the game server, steal things, then escape. This can happen accidentally in real life, too; you have seen this when the press manages to see notes a politician made in a private meeting, only to walk confidently outside, exposing the notes they are holding. In this case, the politician has misunderstood their safe boundaries—or has never used their camera’s zoom function.

This isn’t a security article, and I’m not Bruce Schneier — but you get the idea. You don’t want to run code in your cosy sandbox that captures and escapes with secrets. One way to combat this is to restrict exit points, but another is to obfuscate your private data while it resides within the sandbox. This is what Deno refers to as secret redaction and substitution.

Configured secrets never enter the sandbox environment variables. Instead, Deno Deploy substitutes them, only to reveal them when the sandbox makes outbound requests to an approved host.

I’ll show this process partway. We can set up a secret simply enough, and the approved host where it will be revealed to:

await using sandbox = await Sandbox.create({
  secrets: {
    ANTHROPIC_API_KEY: {
      hosts: ["api.anthropic.com"],
      value: process.env.ANTHROPIC_API_KEY,
    },
  },
});


So this means that the Deno will obfuscate the environment key that it finds in my laptop, but send it to Anthropic, revealed only after it leaves the sandbox:

I won’t make a real call to the LLM in the Sandbox (I certainly could, as I can access the Sandbox via the CLI and have it last for as long as I need), but I’ll set up a secret on my laptop environment as if I were:

And with my code altered:

I’ll run the code and see what the value of the secret is in the Sandbox:

As I said, to fully prove this, I’d have to contact Anthropic with my key to prove the process — but I’ll leave that to you.

From a Deno tutorial video. The diagram appears under the hosts as they demonstrate sandboxes.

Conclusion

I focused on just one aspect, obfuscation, but you can also control the allowed outgoing addresses just as easily. And we’ve already looked at other aspects of the Deno Deploy service.

Obviously, the timing couldn’t be better. With the exponential increase in generated and untrusted code (that people nevertheless wish to trust), this type of service is gold dust. I’m sure it will be appearing in different services pretty soon.

The post OpenClaw is being called a security “Dumpster fire,” but there is a way to stay safe appeared first on The New Stack.

Read the whole story
alvinashcraft
3 hours ago
reply
Pennsylvania, USA
Share this story
Delete

Fake Job Recruiters Hid Malware In Developer Coding Challenges

2 Shares
"A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks," reports the Register. Researchers at software supply-chain security company ReversingLabs say that the threat actor creates fake companies in the blockchain and crypto-trading sectors and publishes job offerings on various platforms, like LinkedIn, Facebook, and Reddit. Developers applying for the job are required to show their skills by running, debugging, and improving a given project. However, the attacker's purpose is to make the applicant run the code... [The campaign involves 192 malicious packages published in the npm and PyPi registries. The packages download a remote access trojan that can exfiltrate files, drop additional payloads, or execute arbitrary commands sent from a command-and-control server.] In one case highlighted in the ReversingLabs report, a package named 'bigmathutils,' with 10,000 downloads, was benign until it reached version 1.1.0, which introduced malicious payloads. Shortly after, the threat actor removed the package, marking it as deprecated, likely to conceal the activity... The RAT checks whether the MetaMask cryptocurrency extension is installed on the victim's browser, a clear indication of its money-stealing goals... ReversingLabs has found multiple variants written in JavaScript, Python, and VBS, showing an intention to cover all possible targets. The campaign has been ongoing since at least May 2025...

Read more of this story at Slashdot.

Read the whole story
alvinashcraft
3 hours ago
reply
Pennsylvania, USA
Share this story
Delete

Sequoia CEO coach: Why it’s never been easier to start a company, and never been harder to scale one | Brian Halligan (co-founder, HubSpot)

1 Share

Brian Halligan co-founded HubSpot, ran it as CEO for about 15 years, and now coaches Sequoia’s fastest-growing founders as their in-house CEO coach.

We discuss:

1. His LOCKS framework for evaluating founders

2. Why you should build your team like the 2004 Red Sox

3. Why hiring “spicy” candidates beats consensus picks

4. Why enterprise sales will be the last white-collar job AI replaces

5. Some of my favorite “Halliganisms”

Brought to you by:

Sentry—Code breaks, fix it faster: http://sentry.io/lenny

Datadog—Now home to Eppo, the leading experimentation and feature flagging platform: https://www.datadoghq.com/lenny

WorkOS—Modern identity platform for B2B SaaS, free up to 1 million MAUs: https://workos.com/lenny

Episode transcript: https://www.lennysnewsletter.com/p/sequoia-ceo-coach-why-its-never-been

Archive of all Lenny's Podcast transcripts: https://www.dropbox.com/scl/fo/yxi4s2w998p1gvtpu4193/AMdNPR8AOw0lMklwtnC0TrQ?rlkey=j06x0nipoti519e0xgm23zsn9&st=ahz0fj11&dl=0

Where to find Brian Halligan

• X: https://x.com/bhalligan

• LinkedIn: linkedin.com/in/brianhalligan

• Delphi: https://www.delphi.ai/bhalligan

• Podcast: https://sequoiacap.com/series/long-strange-trip

Where to find Lenny:

• Newsletter: https://www.lennysnewsletter.com

• X: https://twitter.com/lennysan

• LinkedIn: https://www.linkedin.com/in/lennyrachitsky/

In this episode, we cover:

(00:00) Introduction to Brian Halligan

(03:56) The perpetual state of constructive dissatisfaction

(05:25) Coaching CEOs

(07:49) The art of interviewing and hiring

(11:21) Getting the most out of reference calls

(13:10) Homegrown talent vs. big company hires

(16:31) Traits of successful CEOs

(19:40) Brian’s LOCKS framework for evaluating founders

(21:34) Are great CEO’s born or made?

(23:41) Giving effective feedback

(25:54) The future of go-to-market strategies

(31:56) Understanding forward deployed engineers

(34:17) How the CEO role has evolved over the last 20 years

(38:10) Halliganisms

(01:01:18) The CEO’s role in scaling a company

(01:02:41) Lightning round and final thoughts

Referenced:

• Dev Ittycheria on LinkedIn: https://www.linkedin.com/in/dittycheria

• HubSpot: https://www.hubspot.com

• Parker Conrad on LinkedIn: https://www.linkedin.com/in/parkerconrad

• McKinsey & Company: https://www.mckinsey.com

• Brian Chesky’s new playbook: https://www.lennysnewsletter.com/p/brian-cheskys-contrarian-approach

• Jensen Huang on LinkedIn: https://www.linkedin.com/in/jenhsunhuang

• Winston Weinberg on LinkedIn: https://www.linkedin.com/in/winston-weinberg

• James Cadwallader on LinkedIn: https://www.linkedin.com/in/jsca

• Gabriel Stengel on LinkedIn: https://www.linkedin.com/in/gabestengel

• He saved OpenAI, invented the “Like” button, and built Google Maps: Bret Taylor on the future of careers, coding, agents, and more: https://www.lennysnewsletter.com/p/he-saved-openai-bret-taylor

• Scaling Entrepreneurial Ventures: https://orbit.mit.edu/classes/scaling-entrepreneurial-ventures-15.392

• OpenClaw: https://openclaw.ai

• Ruth Porat on LinkedIn: https://www.linkedin.com/in/ruth-porat

• Mike Krzyzewski: https://goduke.com/sports/mens-basketball/roster/coaches/mike-krzyzewski/4159

• Dalai Lama’s 18 Rules for Living: https://www.prm.nau.edu/prm205/Dalai-Lama-18-rules-for-living.htm

• Zigging vs. zagging: How HubSpot built a $30B company | Dharmesh Shah (co-founder/CTO): https://www.lennysnewsletter.com/p/lessons-from-30-years-of-building

• Kareem Amin on LinkedIn: https://www.linkedin.com/in/kareemamin

• Glassdoor: https://www.glassdoor.com

• Tobi Lütke’s leadership playbook: Playing infinite games, operating from first principles, and maximizing human potential (founder and CEO of Shopify): https://www.lennysnewsletter.com/p/tobi-lutkes-leadership-playbook

• Katie Burke on LinkedIn: https://www.linkedin.com/in/katie-burke-965767a

• Jerry Garcia: https://en.wikipedia.org/wiki/Jerry_Garcia

• Bob Weir: https://en.wikipedia.org/wiki/Bob_Weir

• Phil Lesh: https://en.wikipedia.org/wiki/Phil_Lesh

• Ron “Pigpen” McKernan: https://en.wikipedia.org/wiki/Ron_%22Pigpen%22_McKernan

• Marc Andreessen: The real AI boom hasn’t even started yet: https://www.lennysnewsletter.com/p/marc-andreessen-the-real-ai-boom

The American Revolution: https://www.pbs.org/kenburns/the-american-revolution

• Delphi: https://www.delphi.ai

• Sonos: https://www.sonos.com

• Yamini Rangan on LinkedIn: https://www.linkedin.com/in/yaminirangan

• The Boston Red Sox: https://www.mlb.com/redsox

Recommended book:

Marketing Lessons from the Grateful Dead: What Every Business Can Learn from the Most Iconic Band in History: https://www.amazon.com/Marketing-Lessons-Grateful-Dead-Business/dp/0470900520

Production and marketing by https://penname.co/. For inquiries about sponsoring the podcast, email podcast@lennyrachitsky.com.

Lenny may be an investor in the companies discussed.



To hear more, visit www.lennysnewsletter.com



Download audio: https://api.substack.com/feed/podcast/187154837/0c611c6487a4ace2157de90893760367.mp3
Read the whole story
alvinashcraft
3 hours ago
reply
Pennsylvania, USA
Share this story
Delete
Next Page of Stories