j2p2 🟧

4.9K posts

j2p2 🟧 banner
j2p2 🟧

j2p2 🟧

@_jiga

recursively defined; i'm a GEEK - GEEK Engineer Exploring Knowledge

انضم Şubat 2008
1.4K يتبع670 المتابعون
تغريدة مثبتة
j2p2 🟧
j2p2 🟧@_jiga·
🤖 You won't believe these 100 ways GPT-4 can make your life easier! Say hello to your new AI best friend! 👋 A thread: #GPT4 #AILifeHack
English
2
0
8
1K
Zhengyao Jiang
Zhengyao Jiang@zhengyaojiang·
Autoresearch has been out for 2 weeks. The community is trying to apply it to everything with a measurable metric, here are some successful attempts: 🧵 (1/6)
English
35
138
1.7K
293.2K
j2p2 🟧
j2p2 🟧@_jiga·
@gregisenberg No GPU needed. I just ran 30 experiments on a CLI tool's lint rules using Gemini Flash. $0.15, 12 minutes, +14% quality improvement — shipped to GitHub automatically. The pattern works on anything measurable. Here's the full breakdown 🧵 x.com/_jiga/status/2…
j2p2 🟧@_jiga

I let an AI run 30 experiments on my CLI tool overnight. It found 2 hidden bugs, fixed them, and shipped a better version to GitHub while I slept. Cost: $0.15 Time: 12 minutes F1 score: 0.83 → 0.95 Here's exactly how it worked 🧵

English
1
0
0
428
GREG ISENBERG
GREG ISENBERG@gregisenberg·
karpathy just broke the internet with something called auto research it’s basically an ai research agent that runs experiments for you 24/7 you give it a goal like “make this model better” “find a higher converting landing page” “lower customer acquisition cost” then it runs a loop: 1) plan an experiment 2) edit the code or config 3) run a short test on a gpu 4) read the metrics 5) keep the winner 6) try again over and over while you sleep by the morning you wake up to the best version actual tested improvements think of it like a robot research intern that runs hundreds of experiments and only keeps the winners this is link to his repo github.com/karpathy/autor… for your to mess around with it in the latest episode of @startupideaspod i break down: • what auto research actually is • how it works step by step • 10 business ideas you can build with it • how to install it and start using it this one is saucy because tools like this change how startups get built watch
English
193
425
4.1K
429.3K
j2p2 🟧
j2p2 🟧@_jiga·
@karpathy ctxm is open source: github.com/jiga/ctxm Autoresearch harness included. Swap in your eval. 30 experiments. $0.15. 12 min. What system are you pointing this at?
English
0
1
0
62
j2p2 🟧
j2p2 🟧@_jiga·
@karpathy What got shipped: - too_generic_threshold: 100 → 60 chars - llm_phrase_threshold: 2 → 3 matches - antipattern_min_strength: 1 → 2 matches Committed and pushed while I was in morning standup. Overall F1: 0.8333 → 0.9500. Precision and recall both 1.0.
English
2
0
0
62
j2p2 🟧
j2p2 🟧@_jiga·
I let an AI run 30 experiments on my CLI tool overnight. It found 2 hidden bugs, fixed them, and shipped a better version to GitHub while I slept. Cost: $0.15 Time: 12 minutes F1 score: 0.83 → 0.95 Here's exactly how it worked 🧵
English
1
0
4
545
j2p2 🟧
j2p2 🟧@_jiga·
@karpathy ctxm is open source: github.com/jiga/ctxm Auto research harness included. Swap in your eval. 30 experiments. $0.15. 12 min. What system are you pointing this at?
English
0
0
0
40
Andrej Karpathy
Andrej Karpathy@karpathy·
Human orgs are not legible, the CEO can’t see/feel/zoom in on any activity in their company, with real time stats etc. I have no doubt that it will be possible to control orgs on mobile, with voice etc., but with this level of legibility will that be optimal? Not in principle and asymptotically but in practice and for at least the next round of play.
English
88
49
1.3K
229K
Andrej Karpathy
Andrej Karpathy@karpathy·
Expectation: the age of the IDE is over Reality: we’re going to need a bigger IDE (imo). It just looks very different because humans now move upwards and program at a higher level - the basic unit of interest is not one file but one agent. It’s still programming.
Andrej Karpathy@karpathy

@nummanali tmux grids are awesome, but i feel a need to have a proper "agent command center" IDE for teams of them, which I could maximize per monitor. E.g. I want to see/hide toggle them, see if any are idle, pop open related tools (e.g. terminal), stats (usage), etc.

English
817
837
10.6K
2.4M
j2p2 🟧
j2p2 🟧@_jiga·
@thibaultroux_ @karpathy it was simple enough- “explain this code using interactive visual infographics. be through and creative so anyone can understand”
English
0
2
36
4.1K
Andrej Karpathy
Andrej Karpathy@karpathy·
New art project. Train and inference GPT in 243 lines of pure, dependency-free Python. This is the *full* algorithmic content of what is needed. Everything else is just for efficiency. I cannot simplify this any further. gist.github.com/karpathy/8627f…
English
652
3.2K
25.2K
5.2M
_
_@LNow_·
@obycode @v1n1_c0d35 @alexlmiller @mrwolf_btc @Stacks Tried out... It doesn't look like something that is CPU, network, or disk io bound. It looks more like a sequential process: download block->validate->apply->download block->validate->apply.
English
4
0
1
229
mrwolf
mrwolf@mrwolf_btc·
Do you run a @Stacks node? Curious to see how decentralized we really are 👀
English
5
6
23
2.2K
_
_@LNow_·
@AdrianoDiLuzio I was wrong with my initial assessment of this hack - I didn't understand fully how ALEX contract was meant to work. But now I can confirm it was Stacks limitation that theoretically can be mitigated, but in practice I don't think it is feasible.
English
6
2
25
6.7K
Adriano
Adriano@AdrianoDiLuzio·
I'm glad to see quick action by the ALEX team to resolve the situation for users, but want to be very clear: it is not a Stacks limitation or vulnerability that caused this exploit. Having spoken to multiple experienced, independent Stacks developers, the exploit was likely caused by a lack of verification in the ALEX smart contracts as well as the use of a single contract instead of segregated pools as other apps in the ecosystem use. This is why other DeFi apps in the Stacks ecosystem were not exploited despite offering similar functionality. Again, I'm pleased to see how quickly ALEX is committing to resolving this for their users and taking lessons from this to help all builders build more secure apps, but Stacks users can remain confident in the security and design of the L1.
ALEX 🟧 No. 1 Bitcoin DeFi@ALEXLabBTC

On June 6, 2025, ALEX Protocol was exploited via a flaw in the self-listing verification logic (an on-chain limitation on Stacks). As a result, the attacker drained several asset pools, with the breakdown of lost assets as follows: STX: 8,403,867.57 STX → $ 5,691,255.93 sBTC: 21.85 sBTC → $ 2,244,751.87 USDC/USDT: 149,850 USDC/USDT → $ 149,850.00 WBTC/BTC: 2.80 WBTC → $ 287,369.33 Total USD Value Lost: $ 8,373,227.13 Compensation Plan Full Reimbursement in USDC Using the ALEX Lab Foundation treasury, we will cover 100 % of each affected user’s loss, paid in USDC. To calculate each reimbursement, we will use the average of on-chain exchange rates taken between 10:00 UTC and 14:00 UTC on June 6, 2025. Claim Process & Timeline Notification (by June 8, 2025, 23:59 UTC): All affected wallet addresses will receive a private notification (on-chain) containing a claim form. Submission Deadline (June 10, 2025, 23:59 UTC): Complete the claim form and confirm your receiving wallet address. Distribution (within 7 business days after claim): Once your submission is verified, USDC will be sent to your confirmed wallet. Missing Notice or Questions If you do not receive a claim notification by June 8, 2025, 23:59 UTC, or if you have any questions about your reimbursement, please contact support@alexlab.co immediately. We are fully committed to restoring every affected user’s funds (totaling $ 8,373,227.13) as quickly as possible.

English
5
13
84
32.8K
j2p2 🟧 أُعيد تغريده
Stacks Status
Stacks Status@stacksstatus·
Some independent app builders in the Stacks ecosystem were recently targeted via Github in an effort to insert malicious code in their app repositories. We have found no evidence of an attack or compromise of the sBTC or Stacks Core repositories, but because some of these open-source devs also contributed separately to other ecosystem projects (including sBTC), we are taking the opportunity to review security practices around sBTC and Stacks Core and provide more guidance to contributors about their personal and company setups. Core development (including sBTC) already has extensive security practices in place including least-privilege permissions, branch protections, multi-man rules, MFA, code audits, and more. But as the Stacks ecosystem and sBTC usage grows, attempts on our software development process will become more common. We’re prepared for this increased scrutiny on our Github repositories and continue to strengthen our security practices. Stacks core devs are working with internal and external security experts to further tighten our software development process. We’ll publish a more detailed analysis of the attempted attack and security measures that helped catch it, along with information on upgraded security processes to help prevent future attacks. There are no user-facing changes at this time and no steps that users need to take - sBTC and the Stacks network continue to function as normal. Please note that as part of the sBTC development plan, it has filled its 3,000 BTC cap, and withdrawals are not enabled, so it is not currently possible to peg in or peg out of sBTC. You can always report anything suspicious or find more information on security at stacks.org/security.
English
4
12
60
6.5K
j2p2 🟧
j2p2 🟧@_jiga·
@sama release an open source version? or distributed inference node network?
English
0
0
2
34
Sam Altman
Sam Altman@sama·
insane thing: we are currently losing money on openai pro subscriptions! people use it much more than we expected.
English
3.5K
1.5K
31.3K
6.4M