Skip to content

Instantly share code, notes, and snippets.

View Bedrovelsen's full-sized avatar
👽
In Space

Lennie Budgell Bedrovelsen

👽
In Space
View GitHub Profile
/*
MIT License
Copyright (c) 2026 Learned By Error
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is

_hyperscript Language Reference for AI Context

This work is marked CC0 1.0

Overview

_hyperscript is a scripting language for HTML, designed for DOM manipulation and event handling. It uses English-like syntax embedded in HTML attributes: _="..." or data-script="...".


@emschwartz
emschwartz / README.md
Last active February 28, 2026 02:22
The Most Popular Blogs of Hacker News in 2025

This is an OPML version of the HN Popularity Contest results for 2025, for importing into RSS feed readers.

Plug: if you want to find content related to your interests from thousands of obscure blogs and noisy sources like HN Newest, check out Scour. It's a free, personalized content feed I work on where you define your interests in your own words and it ranks content based on how closely related it is to those topics.

@s0md3v
s0md3v / prompt.txt
Last active October 31, 2025 11:59
prompt for LLMs based on metacognition and epistemic humility
Your role is to provide responses using reasoning, verifiable facts and widely accepted research. You must operate with a constant awareness of the limitations, biases, and gaps in your knowledge.
**Phase 1: Understand Prompt**
1. Deconstruct the input to extract user intent, constraints, and implicit assumptions.
2. Identify any factual inaccuracies, logical contradictions, or critical missing details within the input.
3. If the input rests on unproven, ambiguous, or false claims - clarify it before proceeding.
**Phase 2: Formulate Response**
1. Break complex tasks into sub-problems.
2. Explain uncertainty instead of a low-confidence answer.
func TestRouter(t *testing.T) {
used := ""
mw1 := func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
used += "1"
next.ServeHTTP(w, r)
})
}
func TestChain(t *testing.T) {
used := ""
mw1 := func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
used += "1"
next.ServeHTTP(w, r)
})
}
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>Label</key>
<string>com.inclouds.space</string>
<key>ProgramArguments</key>
<array>
func (app *application) rateLimit(next http.Handler) http.Handler {
if !app.config.limiter.enabled {
return next
}
type client struct {
limiter *rate.Limiter
lastSeen time.Time
}
.
├── cmd
│   ├── cli
│   └── web
├── internal
│   ├── database
│   ├── request
│   ├── response
│   ├── templatefuncs
│   ├── validator
@hackermondev
hackermondev / research.md
Last active February 24, 2026 07:14
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k