muhdur

269 posts

muhdur

muhdur

@itsmuhdur

Katılım Ekim 2023
35 Takip Edilen5 Takipçiler
muhdur
muhdur@itsmuhdur·
@outsource_ @NousResearch Same here, though I have EMEA enterprise experience with all popular agents (except SlopClaw, ditched it long ago) and Hermes is top of the list. Wishing you luck, maybe we become colleagues !
English
1
0
1
202
Eric ⚡️ Building...
I applied for my dream role... FDE at @NousResearch I think I fit the "power user" description... 15 to 20B+ tokens, daily 9 AM to 2 AM. Been doing this unofficially for months with Hermes-Workspace.com (4,600+ ⭐ / 100K+ clones). Onboarding users to Hermes Agent daily, helping with agent swarms, skills, and orchestration patterns. If given the shot, I'd do it officially.
Tommy@yeahfortommy

looking for someone to help us bring Hermes agent to the world. if you're a hermes agent power user and want to help others become one as well, hit my dms or email us to apply! more info on the forward deployed engineer role: nousresearch.com/forward-deploy…

English
35
7
201
18.4K
muhdur
muhdur@itsmuhdur·
@antigravity Antigravity cli vs gemini cli - are you guys competing with each other?
English
4
0
6
693
Google Antigravity
Google Antigravity@antigravity·
We’re thrilled to announce the Antigravity CLI, a lightweight way to spin up the same Antigravity agents right from the terminal. 💻 It gives you the exact same harness and same models, with a product experience tailored for the command line. It adapts entirely to you: your keybindings, your themes, your workflows. Learn how to get started with the Antigravity CLI: 👇
English
106
115
1.3K
113.3K
muhdur
muhdur@itsmuhdur·
@NousResearch Cool, I immediately submitted an application. @Teknium @yeahfortommy I do believe Hermes is the right fit for enterprise as I have experience with that and already pushing in that direction
English
1
0
3
180
jason
jason@jxnlco·
Let’s vibe code SQLite in rust
English
49
3
343
40.7K
Spettro
Spettro@spettrotoken·
@Teknium @grok I screenshotted the last Hermes version, where is it?
English
6
0
2
1.8K
muhdur
muhdur@itsmuhdur·
@steipete Deslop your Openclaw if you haven‘t yet switched to Hermes.
English
0
0
2
342
muhdur
muhdur@itsmuhdur·
@sudoingX Yes and I hope you learn and improve - use ntm, use Moshi The other points are valid. Private git repo only makes sense if done correctly.
English
0
0
0
100
Sudo su
Sudo su@sudoingX·
be honest, you bookmarked this and still have zero of the five running. no judgment, i did the same for a year. today is a good day to fix that, anon.
Sudo su@sudoingX

anyone thinking about, learning, or already working with agentic systems, you should know this. the first few steps of your setup matter more than any model or framework you pick later. get them right and you never lose your flow. the foundation nobody posts about: > 1. tailscale. a private mesh network across every machine you own. laptop, desktop, rented node, all on one secure tailnet, reachable from anywhere. nothing else works well until this does. > 2. termius, over that tailnet. one SSH client that reaches every node, phone included. you are never away from your stack. > 3. tmux. persistent sessions. disconnect, close the laptop, come back, every session exactly where you left it. agentic work runs long, your terminal has to survive that. > 4. a private git repo. the one i am most glad i found. it is the memory layer across all my agents, they pull, they work, they merge back, the codebase stays alive between sessions. context that would die in a chat window lives in the repo instead. > 5. script everything from day one. ssh aliases for every node, setup scripts, the boring boilerplate automated. if you will do a thing more than twice, it is a script. everything past these five is decorative. know these cold. and the habit that ties it together: ask the AI itself. for the config, for the error, for any of it, let the agent do the lifting, then double check what it hands you. lock the five, build the habit, and you make it. skip it, anon, and you ngmi.

English
17
4
187
31K
muhdur
muhdur@itsmuhdur·
@doodlestein I will give it a try though in some months when the new version gets out
English
0
0
2
15
muhdur
muhdur@itsmuhdur·
@doodlestein Thanks for being honest and sharing your experience, unlike other posts i saw hyping it beyond the clouds, same thing local ai community is doing with local models. Only good models can be trusted to work on real codebases with a certain complexity without the need to babysit
English
1
0
3
152
Jeffrey Emanuel
Jeffrey Emanuel@doodlestein·
Been trying to give the grok coding harness a chance, which is tough because I worry about it doing dumb stuff and screwing up my code. And it's a super high bar because Codex and Claude Code are already working so damned well. And even Gemini-CLI is good for code review. Do I really need another coding agent? Anyway, I decided to give it a shot anyway on a new project. So far, it's really not great. It's exhibiting behavior that I haven't seen from the frontier models/harnesses in a super long time, namely repeatedly saying that it's going to do all this stuff for me but then never actually doing much of anything. At this point it appears to have negative value to me because I feel the need to babysit it to prevent it from doing dumb stuff, and that's basically a deal killer when you have many dozens of agents to tend to at any given time. This all sort of goes back to what I've been saying about the brutality of the Pareto frontier. I joked recently about the line by Alec Baldwin in Glengarry Glen Ross: "As you all know, first prize is a Cadillac Eldorado. Anybody wanna see second prize? Second prize is a set of steak knives. Third prize is you're fired." I already have a third place agent, Gemini-CLI, and it only gets to do code review. Fourth place definitely seems to be "you're fired," for me at least.
Jeffrey Emanuel tweet mediaJeffrey Emanuel tweet media
English
16
1
62
9.6K
Glauber Costa
Glauber Costa@glcst·
After seeing the success of Bun's rewrite, I am considering rewriting Turso in Rust.
English
42
3
458
47.4K
Jeffrey Emanuel
Jeffrey Emanuel@doodlestein·
I mentioned to @jarredsumner that he should try out my new skill on the Bun Rust code, but rather than hope he signs up for my site and tries the skill, I figured that I should run it myself on the Bun repo. It's going right now, using both Claude Code and Codex... will share 🔜
Jeffrey Emanuel tweet media
Jeffrey Emanuel@doodlestein

There's been a lot of discourse on here recently about unsafe Rust code, with people criticizing the Bun Rust port for having a lot of unsafe code, or comparing Bun to uv, which was written by hand in Rust over years rather than in an AI-fueled 1-week porting binge. Unsurprisingly, many of these criticisms are uninformed and unlettered (Theo et al.), based on absurd "string matching and counting" methodology. There is also not a lot of understanding that certain uses of unsafe are unavoidable when you start needing to interact with other systems, such as FFI, syscalls, mmap/io_uring, raw OS handles, custom allocators, etc. And some use of unsafe is done for performance reasons (like using SIMD for math stuff) in a very intentional way, though usually as an optional build flag if you decide that you care more about memory safety than you do about absolute performance. I personally have a strict "no unsafe except where absolutely necessary" rule across my dozens of complex Rust projects, many of which are over 1 million lines of code (and a few over 3 million LoC now!). My reasoning is that, if I'm going to subject myself to the slowness of the Rust compiler, I want something to show for it in the form of strict memory safety. Anyway, I decided to turn my many tens of thousands of historical agent sessions across dozens of projects into a new "super skill" that has encyclopedic knowledge and expertise about Rust and unsafe, how to detect it, when it's unavoidable, and the best way to make unsafe code safe where feasible while preserving correctness and performance as much as possible. I'm happy to introduce my latest skill, called /rust-unsafe-code-exorcist, available now at: jeffreys-skills.md/skills/rust-un… This is one of my most ambitious and sophisticated skills yet, comprising 183 files and 1.4mb of text! That includes 39 scripts, 32 subagents, 83 reference files (split into source, patterns, and methodology), and 26 assets of various kinds (templates, prompts, checklists, etc.) It's about the furthest thing you could imagine from simplistic string searching. It kicks off a symphony of activity across multiple phases that identifies, catalogs, diagnoses, and makes recommendations for resolving any and all unsafe code in your project. It creates artifacts documenting every step of this process that are themselves very handy, but then uses those artifacts to guide an automated process of resolving, mitigating, and addressing all the problems it found. As usual, here is GPT-5.5's take on what makes this skill so innovative, useful, and compelling: --- • The first pass shows it is not a single prompt: it is a full audit operating system with phases, subagents, artifact schemas, verification scripts, templates, and a pattern corpus. • The central idea is already visible: it treats “unsafe” not as a grep target but as a classification and evidence problem. I’m reading the rubric/operator/verification layers next, because that’s where the skill either becomes merely elaborate or genuinely valuable. • The design keeps separating three things that are usually conflated: safety necessity, performance justification, and implementation equivalence. That separation is what lets the skill be hard on unsafe code without becoming dogmatic about deleting every unsafe block. I read it as more than a skill. It is an attempt to turn high-end Rust unsafe-audit judgment into a repeatable operating system. The special core is the three-way classification model: (A) strictly unavoidable, (B) perf-only, (C) refactorable. That sounds simple, but it is the right abstraction. Most unsafe audits collapse into either “unsafe is bad, delete it” or “this is low-level Rust, trust the author.” This skill rejects both. It says the real sin is misclassification: calling perf folklore “unavoidable” freezes debt, while calling an actually unavoidable boundary “refactorable” creates churn and false confidence. What makes it innovative is the falsifiability discipline. (A) needs failed safe alternatives and a steel-man attack (/references/methodology/CLASSIFICATION-RUBRIC.md). (B) needs real benchmark evidence and a safe-only feature path. (C) needs full replacement code plus equivalence evidence, not vibes. That turns an agent from a confident code rewriter into an evidence-producing reviewer. The compelling part is that it understands unsafe code sociotechnically. It produces an audit directory, inventory, per-site writeups, synthesis, classifications, plans, verify .sh, CI templates, beads, and reviewer responses, while keeping project source untouched until explicit authorization. That is maintainer-friendly: it gives people something reviewable before it asks for trust. It is also unusually accretive. The skill is built around a corpus, quote bank, kernel, operators, and validators (/references/methodology/SOURCE-CORPUS.md). Every audit can strengthen the next one. The rejected-patterns catalog is especially mature: it preserves negative knowledge, so agents do not repeatedly propose “safe” refactors that were already measured and rejected. The operator library is another strong idea. “Macro-X-Ray,” “Reachability-From-Safe,” “Profile-Or-It-Didn’t-Happen,” “Allocator-Identity,” “Pre-Existing-UB-Isolator,” and the rest are portable cognitive moves. They teach the agent how to think, not just what command to run. The most profound feature, to me, is the reapply-until-quiet loop. Phase 4 classifies, Phase 6 adversarially attacks the classification, and convergence requires low churn plus no meaningful missed refactorability. That imports a scientific-review mindset into code maintenance: claims survive because they were attacked, not because the first agent sounded sure. The useful practical payoff is huge: it can handle visible unsafe, macro-generated unsafe, dependency-side unsafe, zero-unsafe forbid(unsafe_code) projects, perf-only SIMD paths, FFI, allocators, Pin, lock-free structures, and ongoing drift. Continuous mode is where it becomes a system of record rather than a one-off report (/references/methodology/CONTINUOUS-MODE.md). My blunt take: this is special because it is not “a prompt for auditing unsafe.” It is a crystallized engineering discipline. It converts tacit senior Rust judgment into schemas, review loops, adversarial checks, work queues, verification harnesses, and durable institutional memory. That is exactly what good agent skills should become.

English
6
2
76
16K
muhdur
muhdur@itsmuhdur·
@DanielMiessler They are not 1/100th the cost, most of them are not. Try it out and you will see.. I tried the GLM plan since 4.7; and the Xiamo MiMo V2.5 ultra month plan and I burned through it in almost 4 hours. Quality? 2025 November level „just fine“.
English
0
0
0
172
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 🛡️
What if the American companies are walking a tightrope named token subsidies, and beneath them a net awaits their fall. And that net is Chinese cloud-based opensource models that are 1/100th the cost. Then they parse every request for data and ideas.
English
11
6
44
5.6K
muhdur
muhdur@itsmuhdur·
@doodlestein @qubitium Wait, do you mean Alibaba? I bought a new EPYC in Europe because I was not so sure about Alibaba quality and all threadrippers were GONE from European markets
English
1
0
1
50
Jeffrey Emanuel
Jeffrey Emanuel@doodlestein·
@qubitium Wait wtf, and here I’m slumming it with 128-core threadrippers (but fortunately they only cost $1,800 for a used one from China on eBay… scared to even find out the msrp on the big guys).
English
1
0
1
684
Qubitium
Qubitium@qubitium·
320 cores of AMD Turin, 640 hyperthreads.
Qubitium tweet media
English
90
142
2.4K
160.7K
muhdur
muhdur@itsmuhdur·
@theo I have to mute you; your posts are only aggressive and negative. I really do not know why the X algorithm favors you
English
0
0
0
12
muhdur
muhdur@itsmuhdur·
@theo What is T3 code? An agent harness, or what?
English
0
0
0
1.1K
Theo - t3.gg
Theo - t3.gg@theo·
I can't help but feel personally burned by the Claude Code changes announced today. We put so much work into wrapping the (atrocious) Claude Agent SDK in T3 Code. It was the ONLY path they supported, so we made it work. It was hell. Now our users are getting their rate limits cut by 40x, despite us doing everything right. I listened to the Claude Code team. I had my issues with their direction, but I trusted them and took them at their word. I will never make that mistake again. Until we see significant change, it is safe to assume any statement from an Anthropic employee is a lie on a timer. The rug will be pulled, no matter how many promises are made beforehand.
English
422
312
8.7K
1.6M