Skip to content

Instantly share code, notes, and snippets.

View nakedape2000's full-sized avatar

Artem Sichkar nakedape2000

View GitHub Profile
@kibotu
kibotu / INSTALL.md
Last active March 16, 2026 17:52
How to Run Qwen3.5 Locally With Claude Code (No API Bills, Full Agentic Coding)

Run Qwen 3.5 Locally with Claude Code — Zero API Bills, Full Agentic Coding

Your Mac has a GPU. Your Mac has RAM. Why are you paying someone else to think?

This guide gets you a fully local agentic coding setup: Claude Code talking to Qwen 3.5-35B-A3B via llama.cpp, all running on your Apple Silicon Mac. No API keys. No cloud. No surprise invoices. Just you, your M-series chip, and 35 billion parameters doing your bidding on localhost.

Based on this article.


@digitalknk
digitalknk / openclaw-guide.md
Last active February 26, 2026 22:58
Running OpenClaw Without Burning Money, Quotas, or Your Sanity

🚨 This guide has moved 🚨

The OpenClaw guide is now maintained as a proper repository with better structure and actionable examples.

New location: https://github.com/digitalknk/openclaw-runbook

⚠️ The gist version will no longer be updated. The repo includes:

  • Streamlined narrative guide
  • Copy-paste example templates
  • VPS setup instructions
@fabriziosalmi
fabriziosalmi / rules.md
Last active February 3, 2026 20:23
rules.md

Never apply one or more of such methods:

Here is a list of 100 typical "vibecoding" issues—artifacts of coding based on intuition, haste, hype, or LLM copy-pasting without engineering rigor—ranked from critical security flaws to minor aesthetic annoyances.

  1. Hardcoded API Keys and Secrets (Immediate security compromise that bots will scrape in seconds).
  2. Committed .env files (Defeats the entire purpose of environment variables and leaks configuration).
  3. Committed node_modules or vendor folders (Bloats the repository size and causes cross-platform dependency hell).
  4. SQL Injection vulnerabilities via string concatenation (The fastest way to lose your database because you didn't use parameterized queries).
  5. chmod 777 permissions on scripts (Lazy permission handling that opens the door to privilege escalation).
  6. Passwords stored in plain text (Hashing and salting are not optional features).