A short read on the topic's time range, peak episode, and strongest associations. Use it as the quick orientation before drilling into examples.
source code appears in 9 chunks across 9 episodes, from 2024-11-25 to 2026-04-13.
Its densest episode is Bits and Bobs 11/25/24 (2024-11-25), with 1 observation on this topic.
Semantically it travels with llms, GitHub, and wild west roundup, while by chunk count it sits between side effect and Christopher Alexander; its yearly rank moved from #172 in 2024 to #59 in 2026.
Over time
?
Raw mentions over time. Use this to see absolute attention, not relative rank among all topics.
Range2024-11-25 to 2026-04-13Mean1.0 per episodePeak1 on 2024-11-25
Observations
?
The primary evidence view for this topic. Sort it chronologically when you want concrete examples behind the larger pattern.
Showing 9 observations sorted from latest to earliest.
...nteract with.
Note that the system of record for code is not assembly, it's the source code.
There's a compilation process that deterministically generates software that behaves as you'd expect.
It doesn't have to generate the exact same ass...
...y Let Attackers Hijack AI Agent to Gain Full System Control.
Invisible Threats: Source Code Exfiltration in Google Antigravity.
hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions - Microsoft, DataDog, and CNCF Projects Hit ...
... to create it.
Just like previously, the compiled binary mattered less than the source code to create it.
Now, LLMs can translate specs and ideas into working code.
Some of the most valuable information is what the developer told the LLM in ...
... LLMs you can "fork" any software you can use.
Before, you needed access to the source code.
Most code is commodity, it's just it was tedious to recreate.
But LLMs are very good at doing tedious work.
They're also great at taking a given pie...
...sibility."
Responsibility laundering!
CamoLeak: GitHub Copilot can leak private source code.
An RCE vulnerability in a popular Figma MCP.
AgentKit's Guardrails is vulnerable to prompt injections.
...oding monster"
Manipulating the AST gives leverage over manipulating strings of source code.
AST is hard for humans to understand, but not for LLMs!
LLMs have the patience to deal with complicated types.
Even if they don't understand it at f...
I talked to a developer this week who said he doesn't directly use open source code anymore.
Open source code makes you dependent on the maintainer.
They could add a feature that you don't want, or introduce a bug.
On the flip side, ...
...ut Lion's Commentary on Unix.
It was an annotated copy of the 10k lines of Unix source code back in the 70's.
Apparently it was a highly pirated book--only people with a license to Unix were supposed to be able to see it.
The core 10k lines ...
...w be "compiled" to runnable code by LLMs.
When we make programs, we compile the source code down to an executable binary.
But then we make sure to keep the source code, so when we tweak it in the future we can compile a new binary.
Or, when ...