<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[I find the #claudecode source code interesting.]]></title><description><![CDATA[<p>I find the <a href="https://infosec.exchange/tags/claudecode" rel="tag">#<span>claudecode</span></a> source code interesting. </p><p>It's not that different from codex or gemini. Shares many similarities.</p><p>Good job.</p>]]></description><link>https://board.circlewithadot.net/topic/8ff27c2c-3ef0-4f80-b56e-ceed230cb830/i-find-the-claudecode-source-code-interesting.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 20:51:11 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/8ff27c2c-3ef0-4f80-b56e-ceed230cb830.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 01 Apr 2026 17:59:29 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to I find the #claudecode source code interesting. on Wed, 01 Apr 2026 18:31:09 GMT]]></title><description><![CDATA[<p>I don't think this was a marketing gig leak. There is too much IP in there. </p><p>People have no idea how difficult this stuff can be.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330874132898658</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330874132898658</guid><dc:creator><![CDATA[windsheep@infosec.exchange]]></dc:creator><pubDate>Wed, 01 Apr 2026 18:31:09 GMT</pubDate></item><item><title><![CDATA[Reply to I find the #claudecode source code interesting. on Wed, 01 Apr 2026 18:28:45 GMT]]></title><description><![CDATA[<p>There is a semantic firewall against hallucinations.</p><p>Of course... they use an agentic pattern for that.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330864684281804</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330864684281804</guid><dc:creator><![CDATA[windsheep@infosec.exchange]]></dc:creator><pubDate>Wed, 01 Apr 2026 18:28:45 GMT</pubDate></item><item><title><![CDATA[Reply to I find the #claudecode source code interesting. on Wed, 01 Apr 2026 18:25:45 GMT]]></title><description><![CDATA[<p>They use Zod schemas against hallucinations.</p><p>They should write books. This is cool.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330852849444021</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330852849444021</guid><dc:creator><![CDATA[windsheep@infosec.exchange]]></dc:creator><pubDate>Wed, 01 Apr 2026 18:25:45 GMT</pubDate></item><item><title><![CDATA[Reply to I find the #claudecode source code interesting. on Wed, 01 Apr 2026 18:23:59 GMT]]></title><description><![CDATA[<p>Ahh you don't stdin the code base. You segment it into pieces. It reads code, rather than copying it over. The client assumes that it cannot just send over x thousand lines and ask for inference. </p><p>Of course...</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330845950434705</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330845950434705</guid><dc:creator><![CDATA[windsheep@infosec.exchange]]></dc:creator><pubDate>Wed, 01 Apr 2026 18:23:59 GMT</pubDate></item><item><title><![CDATA[Reply to I find the #claudecode source code interesting. on Wed, 01 Apr 2026 18:20:47 GMT]]></title><description><![CDATA[<p>Context pruning, minimum complexity, and faithful reporting are key things to consider. </p><p>Alright. That makes total sense.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330833357650394</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330833357650394</guid><dc:creator><![CDATA[windsheep@infosec.exchange]]></dc:creator><pubDate>Wed, 01 Apr 2026 18:20:47 GMT</pubDate></item><item><title><![CDATA[Reply to I find the #claudecode source code interesting. on Wed, 01 Apr 2026 18:16:05 GMT]]></title><description><![CDATA[<p>The "adversarial verifier" is key, imho.</p><p>I see it quite often, and it kicks in for complex challenges. I didn't know you could do that.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330814846405598</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/windsheep/statuses/116330814846405598</guid><dc:creator><![CDATA[windsheep@infosec.exchange]]></dc:creator><pubDate>Wed, 01 Apr 2026 18:16:05 GMT</pubDate></item></channel></rss>