articles: https://fasterthanli.me
videos: https://youtube.com/@fasterthanlime
podcast: https://sdr-podcast.com
if we let third-party binaries supply schemas, that means we need to exec them to dump their schema which is a security issue, so we need to design a consent flow... => NO WE DON'T we can just SCAN THE BINARY for a marker and exfiltrate the schemas without risking anything 😎
if we let third-party binaries supply schemas, that means we need to exec them to dump their schema which is a security issue, so we need to design a consent flow... => NO WE DON'T we can just SCAN THE BINARY for a marker and exfiltrate the schemas without risking anything 😎
fuck you—how about instead of making your sweng applicants balance a red-black tree on a whiteboard you make sure they know about trimming whitespace
fuck you—how about instead of making your sweng applicants balance a red-black tree on a whiteboard you make sure they know about trimming whitespace
What is it?
What is it?
Like playwright for browsers it's drivable by code agents. Tell them to "manually test using steve".
→ github.com/mikker/steve
Like playwright for browsers it's drivable by code agents. Tell them to "manually test using steve".
→ github.com/mikker/steve
LIES. slander. fallacy!
LIES. slander. fallacy!