Claude Code (subscription) has Agent Teams built in. Teams of Agents communicate with local files that they use as inboxes and task list. Has tmux and iTerm 2 integration.
https://code.claude.com/docs/en/agent-teams
They can rack up some extra tokens if you leave agents going idle. Because they loop, checking for new messages for them.
Obsidian shows a warning about this. But the only issue it's pointing out is that mixing Obsidian's built-in sync with something that syncs your files is likely to cause problems. Otherwise it's a perfectly safe and normal way to sync.
Using Claude Channels can make it easy to inject prompts and get just the response back without having to identify it in the terminal output or fight with the TUI.
But they're not well designed, and some things just have to go in through the terminal interface like slash commands (i.e. `/clear`)
The law of Software Envelopment. Jamie Zawinski in 1995 stated that "software inevitably expands to include email functionality, or it is replaced by software that does"
Clearly, that's not the case anymore. Nowadays you just swap out "email" for "LLM"
> As software engineers, I get the feeling we’re moving almost entirely away from code.
Wille-Driven Development — I prefer the word from Schopenhauer's Die Welt als Wille und Vorstellung (The World as Will and Representation).
What we will begins to matter more. The gap between desire and existence is collapsing. In Genesis, creation is a pure speech-act: fiat lux, and it was so — no implementation details, no build step, will and result simultaneous. We're not there yet. But I find the distance is measurable and shrinking.
The Representation — code, syntax, toolchains — is receding. The Will asserts itself more directly. Welcome to the future.
That still needs a way to change users, and OpenSSH already has privilege separation. That hardens the process somewhat to reduce the amount of code running in the process which can change the uid for a session but fundamentally something needs permission to call setuid() or the equivalent.
Yea, but then we’ve recreated this CVE which is caused by calling login(1) unsafely. The point was that the person I was replying to misunderstood the problem and largely seemed to be conflating telnetd with OpenSSH.
Congratulations, you've created a server that lets people have shells running as the user running telnetd.
You presumably want them to run as any (non root) user. The capability you need for that, to impersonate arbitrary (non-root) users on the system, is pretty damn close to being root.
I'm not sure that you need root because of the port - I think login itself needs to run as root, otherwise it cant login to anything other than the account its running under.
reply