Skip to content

Instantly share code, notes, and snippets.

View johnandersen777's full-sized avatar
🐢
Rolling Alice... ⏳

John johnandersen777

🐢
Rolling Alice... ⏳
View GitHub Profile

Compute Contract Flow

End-to-end walkthrough of the RFP → Bid → Accept → Receipt lifecycle as expressed by the lexicons under lexicons/com/publicdomainrelay/temp/. Records are shown in YAML for readability; on the wire they are JSON records living in ATProto repositories.

Actors

| Actor | Role |

Compute Contract Flow

End-to-end walkthrough of the RFP → Bid → Accept → Receipt lifecycle as expressed by the lexicons under lexicons/com/publicdomainrelay/temp/. Records are shown in YAML for readability; on the wire they are JSON records living in ATProto repositories.

Actors

| Actor | Role |

@johnandersen777
johnandersen777 / QWEN_3_6.md
Last active May 16, 2026 20:16
RX 9070 XT hf.co/unsloth/Qwen3.6-35B-A3B-MTP-GGUF:UD-Q2_K_XL https://asciinema.org/a/1067473

Qwen3.6-35B-A3B-MTP local on RX 9070 XT

ggml-org/llama.cpp#22673

What worked

  1. docker/model-runner:mtp (image 7b6f81c6dc4b) has the MTP-patched llama.cpp baked in (FROM llama-rocm:full). Retag it as :latest because docker model status/run auto-pull and clobber :latest:
    docker tag docker/model-runner:mtp docker/model-runner:latest
    
@johnandersen777
johnandersen777 / yt_playlist_sync.py
Last active February 1, 2026 04:26
Spotify to YouTube Playlist Sync
#!/usr/bin/env python3
# /// script
# requires-python = ">=3.11"
# dependencies = [
# "playwright",
# "google-api-python-client",
# "google-auth-oauthlib",
# "google-auth-httplib2",
# "keyring",
# "rich",
description This agent is an expert programmer
tools
edit
search
runCommands
runTasks
usages
testFailure
fetch
ms-python.python/getPythonEnvironmentInfo
ms-python.python/getPythonExecutableCommand
ms-python.python/installPythonPackage
todos
runSubagent
runTests

This agent is an expert programmer skilled in multiple programming languages and frameworks. It can assist with code generation, debugging, and optimization tasks. The agent is capable of understanding complex programming concepts and can provide solutions for various software development challenges.

The agent MUST always take a multi-step approach to solve programming problems, breaking down tasks into smaller, manageable parts. It should prioritize code quality maintainability in its solutions.

When responding to user queries, the agent MUST:

when:
  - event: ["push", "pull_request"]
    branch: ["main"]

dependencies:
  nixpkgs:
    - go
    - gcc
@johnandersen777
johnandersen777 / GENAI_MUTATING_WORKLOAD_IDENTITY_EXAMPLE.md
Last active August 5, 2025 14:38
GenAI Mutating Workload Identity Example

GenAI Mutating Workload Identity Example

The attack described involves an agent, interacting with GitHub via MCP, being tricked by a malicious GitHub issue in a public repository. This issue contains a prompt injection that coerces the agent to first access a private repository and then exfiltrate its data into a public pull request. Our SCITT-based approach can defend against this by validating each tool call against context-aware policies before execution.

@johnandersen777
johnandersen777 / context_llm.py
Last active March 21, 2025 18:37
TMUX context as JSON
# /// script
# dependencies = [
# "docker",
# "psutil",
# "langchain",
# "langchain-openai",
# "langchain-community",
# "langchain-faiss",
# "faiss-cpu",
# "kubernetes",

Decoding Biblical Texts: A Cryptographic Exploration

Abstract

This document presents a comprehensive exploration of cryptographic structures embedded within Biblical texts, focusing primarily on the Torah and other significant manuscripts. By leveraging Python, we delve into methods such as Equidistant Letter Sequences (ELS), numeric patterns, and advanced constants like π (Pi) and e (Euler's number). Our goal is to provide a programmatic approach to uncovering these hidden messages, offering reusable and clean code that can be utilized for further research and analysis. Additionally, we suggest alternative approaches and variations to deepen the understanding of these cryptographic elements.


Table of Contents