Comment by kristopolous
2 months ago
https://9ol.es/tmp/fizzbuzz.webm
Finally kind of working. There's the first demo video
I escape out three times: once for basic shell help, the next while I'm inside of vim and finally at the python interpreter. The recent input and output are the context clues to solve the query, which is the part in reverse video.
Then the code is injected into the proxy wrapper
https://github.com/kristopolous/llmehelp/tree/main/shellwrap is the code.
No comments yet
Contribute on Hacker News ↗