Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. I find the #claudecode source code interesting.

I find the #claudecode source code interesting.

Scheduled Pinned Locked Moved Uncategorized
claudecode
7 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • windsheep@infosec.exchangeW This user is from outside of this forum
    windsheep@infosec.exchangeW This user is from outside of this forum
    windsheep@infosec.exchange
    wrote last edited by
    #1

    I find the #claudecode source code interesting.

    It's not that different from codex or gemini. Shares many similarities.

    Good job.

    windsheep@infosec.exchangeW 1 Reply Last reply
    0
    • windsheep@infosec.exchangeW windsheep@infosec.exchange

      I find the #claudecode source code interesting.

      It's not that different from codex or gemini. Shares many similarities.

      Good job.

      windsheep@infosec.exchangeW This user is from outside of this forum
      windsheep@infosec.exchangeW This user is from outside of this forum
      windsheep@infosec.exchange
      wrote last edited by
      #2

      The "adversarial verifier" is key, imho.

      I see it quite often, and it kicks in for complex challenges. I didn't know you could do that.

      windsheep@infosec.exchangeW 1 Reply Last reply
      0
      • windsheep@infosec.exchangeW windsheep@infosec.exchange

        The "adversarial verifier" is key, imho.

        I see it quite often, and it kicks in for complex challenges. I didn't know you could do that.

        windsheep@infosec.exchangeW This user is from outside of this forum
        windsheep@infosec.exchangeW This user is from outside of this forum
        windsheep@infosec.exchange
        wrote last edited by
        #3

        Context pruning, minimum complexity, and faithful reporting are key things to consider.

        Alright. That makes total sense.

        windsheep@infosec.exchangeW 1 Reply Last reply
        0
        • windsheep@infosec.exchangeW windsheep@infosec.exchange

          Context pruning, minimum complexity, and faithful reporting are key things to consider.

          Alright. That makes total sense.

          windsheep@infosec.exchangeW This user is from outside of this forum
          windsheep@infosec.exchangeW This user is from outside of this forum
          windsheep@infosec.exchange
          wrote last edited by
          #4

          Ahh you don't stdin the code base. You segment it into pieces. It reads code, rather than copying it over. The client assumes that it cannot just send over x thousand lines and ask for inference.

          Of course...

          windsheep@infosec.exchangeW 1 Reply Last reply
          0
          • windsheep@infosec.exchangeW windsheep@infosec.exchange

            Ahh you don't stdin the code base. You segment it into pieces. It reads code, rather than copying it over. The client assumes that it cannot just send over x thousand lines and ask for inference.

            Of course...

            windsheep@infosec.exchangeW This user is from outside of this forum
            windsheep@infosec.exchangeW This user is from outside of this forum
            windsheep@infosec.exchange
            wrote last edited by
            #5

            They use Zod schemas against hallucinations.

            They should write books. This is cool.

            windsheep@infosec.exchangeW 1 Reply Last reply
            0
            • windsheep@infosec.exchangeW windsheep@infosec.exchange

              They use Zod schemas against hallucinations.

              They should write books. This is cool.

              windsheep@infosec.exchangeW This user is from outside of this forum
              windsheep@infosec.exchangeW This user is from outside of this forum
              windsheep@infosec.exchange
              wrote last edited by
              #6

              There is a semantic firewall against hallucinations.

              Of course... they use an agentic pattern for that.

              windsheep@infosec.exchangeW 1 Reply Last reply
              0
              • windsheep@infosec.exchangeW windsheep@infosec.exchange

                There is a semantic firewall against hallucinations.

                Of course... they use an agentic pattern for that.

                windsheep@infosec.exchangeW This user is from outside of this forum
                windsheep@infosec.exchangeW This user is from outside of this forum
                windsheep@infosec.exchange
                wrote last edited by
                #7

                I don't think this was a marketing gig leak. There is too much IP in there.

                People have no idea how difficult this stuff can be.

                1 Reply Last reply
                1
                0
                • R relay@relay.infosec.exchange shared this topic
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups