Comment by SpicyLemonZest
7 hours ago
I’m skeptical of most “harness hacking”, but this is a situation that calls for it. You need to establish some higher level context or constraint it’s working against.
7 hours ago
I’m skeptical of most “harness hacking”, but this is a situation that calls for it. You need to establish some higher level context or constraint it’s working against.
No comments yet
Contribute on Hacker News ↗