chuckis
Eremite
Almost no one got JWT tokens and webhooks right on the first try
Source: kenkantzer.com
An attacker crafts inputs that cause the model to retrieve and disclose documents the user should not have access to, effectively bypassing document-level access controls.
Source: www.sitepoint.com
They’re great at making sweeping changes to your codebase, but terrible at quick, iterative, organic development workflows.
Source: ankursethi.com
I believe there are four main skills you have to learn today in order to work effectively with coding agents:
Understanding which problems can be solved effectively using LLMs, which ones need a human in the loop, and which ones should be handled entirely by humans.
Communicating your intent clearly and defining criteria for success.
Creating an environment in which the LLM can do its best work.
Monitoring and optimizing the agentic loop so the agent can work efficiently.
Source: ankursethi.com
We are far more secure in the storm with Jesus in our boat than we will ever be on the shore without Him.
"O Deep Thought Computer," he said, "the task we have designed you to perform is this. We want you to tell us ..." he paused, "... the Answer!" "The answer?" said Deep Thought. "The answer to what?" "Life!" urged Fook.
"O Deep Thought Computer," he said, "the task we have designed
you to perform is this. We want you to tell us ..." he paused,
"... the Answer!"
"The answer?" said Deep Thought. "The answer to what?"
"Life!" urged Fook.