Comment by SpicyLemonZest
6 hours ago
I’m skeptical of most “harness hacking”, but this is a situation that calls for it. You need to establish some higher level context or constraint it’s working against.
6 hours ago
I’m skeptical of most “harness hacking”, but this is a situation that calls for it. You need to establish some higher level context or constraint it’s working against.
No comments yet
Contribute on Hacker News ↗