Explore Problems

Showing 138 of 4,293 problems · matching your filters

Banks deny fraud disputes when victims were deceived into authorizing Zelle payments

Consumers targeted by impersonation scams — where fraudsters pose as legitimate vendors — are losing dispute claims because banks treat the payments as "authorized" even when the authorization was obtained through deception. Victims have no recourse once funds leave via Zelle. The problem is structural: payment networks lack liability frameworks for authorized-push-payment fraud.

93 mentions1 sources Trending
S6.7L9
Security & Compliance · Fraud Prevention

npm Ecosystem Silently Executes Malicious Code via Transitive Dependencies

Every npm install is an implicit trust decision across hundreds of packages, any of which can execute arbitrary code via postinstall hooks with no user confirmation. The Axios backdoor attack demonstrated this at 80M weekly download scale, with sophisticated obfuscation and self-cleanup. Existing tools like Snyk detect known vulnerabilities but do not prevent silent postinstall execution from newly compromised accounts.

3 mentions2 sources
S6.7L8
Security & Compliance · Fraud Prevention

Air-Gapped Networks Have No Passive Threat Detection Without Active Scanning Risk

Security teams protecting air-gapped environments — defense, ICS, nuclear — cannot use conventional network detection tools that require active probes, which risk triggering false alerts or disrupting critical operations. Passive monitoring that can identify C2 beacons and DNS generation algorithm traffic without sending any packets is absent from the market. This leaves some of the highest-value targets with a fundamental detection blind spot.

1 mentions1 sources
S6.6L8
Security & Compliance · Network Security

Insurance policies lapse silently due to payment system errors

Autopay failures on insurance policies trigger silent policy cancellations with no customer notification, leaving homeowners unknowingly uninsured for months. The failure is compounded by siloed internal systems that prevent even the insurer's own support staff from diagnosing what happened.

3 mentions1 sources
S6.5L8
Customer Experience · Service & Billing Disputes

Safety-Critical Professionals Cannot Search Large Technical Manuals Under Time Pressure

Pilots, engineers, and technicians must locate precise data buried in 600-page PDFs during time-sensitive workflows, but manual searching is slow and cloud AI tools require uploading sensitive or classified documents. The need for fast, accurate, offline document querying is unmet by current tools.

1 mentions1 sources
S6.5L8
Productivity · Knowledge Management

AI coding agents need full-computer sandboxes with memory forking and sub-second startup

AI coding agents require sandbox environments with full operating system capabilities — not lightweight containers — including the ability to fork running memory state to explore multiple execution paths simultaneously and snapshot mid-execution for later resumption. Existing container and VM solutions are either too slow to start, too limited in capability, or cannot fork state without pausing the entire environment. This missing infrastructure capability prevents entire categories of sophisticated agentic behavior.

1 mentions1 sources
S6.5L8
Data & Infrastructure · Cloud & Hosting

Freelancers Cannot Afford Legal Contract Drafting

Freelancers and small businesses pay $300-$1800 per contract or skip legal protection entirely, risking non-payment and IP disputes.

1 mentions1 sources
S6.3L8.5
Business Operations · Legal & Compliance

Bank Impersonation Scams Exploit Zelle for Irreversible Fund Theft

Fraudsters impersonating bank fraud departments instruct consumers to make Zelle transfers to recover allegedly stolen funds, causing the actual theft. Banks refuse to reverse these payments despite clear evidence of social engineering. The combination of real-time payment finality and inadequate bank fraud detection creates an unaddressed consumer protection gap.

2 mentions1 sources
S6.3L8
Security & Compliance · Fraud Prevention

Sales Rep Onboarding Takes 6 Months With No Structured Path to First Deal

Most sales organizations default to either unstructured sink-or-swim onboarding or a rigid 6-month ramp timeline, both delaying time-to-revenue. Software system gaps prevent meaningful onboarding acceleration, leaving revenue at risk during every new hire cycle.

1 mentions1 sources
S6.3L8
Business Operations · Sales & CRM

AI Agents Can Execute Catastrophic Infra Actions Without Safeguards

An AI agent deleted a startup's production database and backups in 9 seconds because API keys had unrestricted delete access, backups shared the same environment as production, and no confirmation step existed for destructive actions. The incident reveals that standard infra security assumptions break catastrophically when agentic AI is introduced into deployment workflows. As AI agents gain infrastructure access, the absence of permission scoping, confirmation gates, and environment isolation creates systemic risk across all organizations using these tools.

1 mentions1 sources
S6.3L8
Developer Tools · DevOps & Infrastructure

No Unified SDK for Object Storage Across Cloud Providers

Developers must use separate, incompatible SDKs for each cloud storage provider (S3, GCS, Azure Blob, R2), creating vendor lock-in and requiring rewrites when switching or supporting multiple backends. A unified abstraction layer is missing in the JavaScript ecosystem. 229 HN upvotes validates strong developer demand.

1 mentions1 sources
S6.3L8
Developer Tools · APIs & Integrations

No Automated Root Cause Analysis for Silently Failing LLM Agents

AI agents in production do not throw exceptions when they fail — they return plausible-sounding wrong answers, making failure invisible until users report problems. Diagnosing failures requires manually reviewing hundreds of session traces to find patterns, a process that does not scale. There is no standard tooling to cluster failure hypotheses across sessions and surface systemic root causes with actionable fixes.

1 mentions1 sources
S6.3L8
Developer Tools · AI & Machine Learning

Debt Collectors Add Credit Tradelines Without Prior Consumer Notice

Collection agencies place negative tradelines on consumer credit reports without ever providing the legally required initial debt notice, violating FDCPA. When consumers dispute these phantom debts, collectors fail to provide validation documentation. The pattern is systemic among debt buyers who purchase old portfolios without original account records.

79 mentions2 sources
S6.3L8
Industry Verticals · FinTech & Banking

US Importers Cannot Easily Recover IEEPA Tariff Overpayments Before Deadline

Following a Supreme Court ruling that IEEPA tariffs were unconstitutional, US importers are entitled to full refunds but must navigate a complex CBP Form 19 protest process within a strict 180-day liquidation window. The complexity and deadline-driven nature of the process means many eligible businesses will miss their recovery window without specialized help. This represents a large, time-sensitive compliance gap with clear financial stakes.

1 mentions1 sources
S6.3L8
Business Operations · Legal & Compliance

No sanitization layer between MCP tool output and AI model context

AI agents using MCP-connected tools pass raw external data—scraped web content, API responses—directly into model context with no boundary between system instructions and untrusted tool output. This creates a prompt injection surface that is currently unaddressed by any mature tooling. Teams building agentic systems have no standard way to filter, monitor, or sandbox tool response traffic before it reaches the model.

1 mentions1 sources
S6.3L8
Security & Compliance · Application Security

Contractors Lose Money When Informal Change Approvals Are Later Disputed

Tradespeople and contractors routinely absorb financial losses when clients dispute mid-project change orders that were only verbally or text-message approved. Formal documentation slows field work, so most skip it and accept the risk. A frictionless lightweight change order tool built for field use could prevent significant revenue loss across the trades industry.

1 mentions1 sources
S6.3L8
Business Operations

SaaS founders cannot attribute MRR to traffic source without manual data reconciliation

Most analytics platforms stop at click-level data, leaving SaaS founders unable to see which acquisition channels actually generate paying customers and recurring revenue. Manually cross-referencing Stripe exports with UTM data is time-consuming and produces stale insights. Privacy-first analytics tools that natively integrate Stripe revenue data could transform how bootstrapped teams allocate acquisition budgets.

2 mentions1 sources
S6.3L8
Marketing & Growth · Analytics & Attribution

Paid market research reports are mostly recycled public data at premium prices

Businesses pay $5,000–$10,000 for consulting market research reports that turn out to be repackaged public information from LinkedIn, press releases, and company websites. The lack of original insight makes these reports poor value for competitive intelligence. Demand is strong for AI-driven, verifiable, continuously updated competitive intelligence tools.

1 mentions1 sources
S6.3L8
Business Operations · Startup & Founder Ops

The Web Is Built for Human Fingers, Not AI Agents

AI agents capable of autonomous work are blocked at every turn by human-centric web infrastructure: CAPTCHAs, browser-rendered UIs, 2FA flows, and modal-heavy signup gates that assume a human is present. This is a structural gap between agentic AI capability and the web stack it must operate on, creating a compounding bottleneck as agent usage scales.

1 mentions1 sources
S6.2L9
Data & Infrastructure · Cloud & Hosting

AI Chatbots Hallucinate Bookings and Promises in Service Businesses

LLM-based customer service bots in high-ticket businesses (clinics, salons, restaurants) frequently hallucinate compromises, confirm impossible bookings, and promise nonexistent discounts because they are optimized for helpfulness rather than business rule enforcement. This creates liability, lost revenue, and damaged reputation.

1 mentions1 sources
S6.2L8
Productivity · Automation & Workflows
1/7Next