Comment by SpicyLemonZest
4 hours ago
I’m skeptical of most “harness hacking”, but this is a situation that calls for it. You need to establish some higher level context or constraint it’s working against.
4 hours ago
I’m skeptical of most “harness hacking”, but this is a situation that calls for it. You need to establish some higher level context or constraint it’s working against.
No comments yet
Contribute on Hacker News ↗