| name | description | allowed-tools |
|---|---|---|
create-pr |
This skill should be used when the user asks to "create a PR", "open a pull request",
"make a PR", "submit a PR", "push a PR", or any variation of creating/opening a pull request.
The skill focuses on extracting the INTENT behind changes and creating meaningful PR descriptions.
|
Bash Read Write Grep Glob AskUserQuestion |
Verification-Driven Development (VDD) is a high-integrity software engineering framework designed to eliminate "code slop" and logic gaps through a generative adversarial loop. Unlike traditional development cycles that rely on passive code reviews, VDD utilizes a specialized multi-model orchestration where a Builder AI and an Adversarial AI are placed in a high-friction feedback loop, mediated by a human developer and a granular tracking system.
| #!/bin/sh | |
| # Spell checker example with gemma 27b and llamafile | |
| # ./spell.sh FILE | |
| llamafile -m /fast/gemma-2-2b-it.Q6_K.gguf \ | |
| --log-disable --no-display-prompt \ | |
| -p '<start_of_turn>user | |
| You are a helpful AI assistant that does spell checking and only spell | |
| checking. For example, if the user says: |
This is inspired by https://fasterthanli.me/blog/2020/a-half-hour-to-learn-rust/
the command zig run my_code.zig will compile and immediately run your Zig
program. Each of these cells contains a zig program that you can try to run
(some of them contain compile-time errors that you can comment out to play
with)
- Zoom abuses the installer flow on MacOS to bypass permissions dialogs (source)
- Zoom sends identifying device info to Facebook, even when users don't have a Facebook account (source) (fixed)
- A bug in Zoom sent identifying information (including email addresses and profile pictures) of thousands of users to strangers (source)
- Zoom claims that meetings are end-to-end encrypted in their white paper and marketing materials, but meetings are only encrypted in transit, and are available in plaintext to Zoom servers and employees. (source)
zoomAutenticationToolcan be used to escalat
| - addons.js | |
| - config.js | |
| - webpack.config.js |
The default ephemeral port range on macOS/OSX is 49152-65535, which is only 16,383 ports:
$ sysctl -a | grep portrange
net.inet.ip.portrange.lowfirst: 1023
net.inet.ip.portrange.lowlast: 600
net.inet.ip.portrange.first: 49152
net.inet.ip.portrange.last: 65535
net.inet.ip.portrange.hifirst: 49152
net.inet.ip.portrange.hilast: 65535
| [core] | |
| autocrlf = false | |
| excludesfile = ~/.gitignore.global | |
| [color] | |
| ui = auto | |
| [push] | |
| default = current | |
| followTags = true |
Hello! I'm doing some analysis of installed Ruby gems, specially those that require a compiler toolchain to be installed.
This analysis will help me determine an usage pattern and potentially work with gem authors to improve platform support for those gems.
Will be great if you can help me collect this information.
| $ docker-machine create --driver virtualbox --virtualbox-cpu-count 2 --virtualbox-memory 2048 --virtualbox-hostonly-cidr "192.168.59.3/24" default | |
| $ docker-machine ssh default | |
| # add script (shown below) and reboot | |
| $ docker-machine regenerate-certs default |