Feed

Next.js

Monitor Next.js framework releases, SSR evolutions, App Router updates, and React Server Components. Our AI-curated digest aggregates full-stack React developments, streaming SSR patterns, and server actions from Hacker News, Reddit, and Dev.to trending posts.

Articles from the last 30 days

Untapped Way to Learn a Codebase: Build a Visualizer
02Friday, February 20, 2026

Untapped Way to Learn a Codebase: Build a Visualizer

An experienced developer explains their process for learning unfamiliar codebases using Next.js and its Rust-based bundler, Turbopack, as a case study. The approach emphasizes debugging specific issues, utilizing custom visualization tools, and understanding core architectural components like ValueCells (Vc) rather than trying to comprehend the entire project at once.

Sources:Hacker News211 pts
How to Build a Research Assistant using Deep Agents
03Friday, February 20, 2026

How to Build a Research Assistant using Deep Agents

This guide demonstrates building a structured, multi-agent research assistant using LangChain's Deep Agents and CopilotKit. It features a Python FastAPI backend for planning and web searching via Tavily, and a Next.js frontend that streams the agent's internal state—including checklists, files, and sources—to the UI in real-time for better visibility and trust.

Sources:Dev.to113 pts
Show HN: JavaScript-first, open-source WYSIWYG DOCX editor
04Monday, February 9, 2026

Show HN: JavaScript-first, open-source WYSIWYG DOCX editor

@eigenpal/docx-js-editor is an open-source, client-side WYSIWYG editor for React, allowing users to open, edit, and save .docx files directly in the browser. It features Microsoft Word fidelity, a plugin system, and zero server dependencies. Integration requires dynamic imports for Next.js and supports formatting, tables, and images under the MIT license.

Sources:Hacker News113 pts
Developer-targeting campaign using malicious Next.js repositories
05Tuesday, February 24, 2026

Developer-targeting campaign using malicious Next.js repositories

Microsoft Defender Experts uncovered a malicious campaign targeting developers through fake Next.js repositories and job-themed lures. The attackers use Visual Studio Code workspace automation and trojanized assets to execute in-memory JavaScript. This multi-stage threat facilitates command-and-control, environment variable exfiltration, and persistent access to sensitive developer infrastructure and source code.

Sources:Lobsters42 pts