Claude Code Unleashed: Safe Permissions with Lima VM
Run Claude Code with --dangerously-skip-permissions safely using Lima VM on macOS.
AI/ML engineer passionate about deep learning, system design, and building scalable ML infrastructure. Links: [GitHub](https://github.com/porameht) | [Hugging Face](https://huggingface.co/porameht) | [Medium](https://fr4nk.xyz) | [Blog](https://learnlog.dev)
View all authorsRun Claude Code with --dangerously-skip-permissions safely using Lima VM on macOS.
Building production ML inference services that run anywhere—from Raspberry Pi to cloud edge—requires a different approach. This article walks through a complete implementation of a text embedding API using WasmEdge, GGML, and Rust, delivering a 136KB WASM module paired with a 1.8MB async HTTP server that processes embeddings in ~100-200ms per request.
Full implementation: github.com/porameht/wasmedge-ggml-llama-embedding
When scraping websites or testing APIs from multiple IPs, you need a proxy that can rotate source addresses automatically. This article explores how to build a production-ready IP rotation proxy using Cloudflare's Pingora framework, achieving lock-free rotation with atomic operations.
Full implementation: github.com/porameht/pingora-forward-proxy
Reverse engineering can seem intimidating at first. You might imagine hackers hunched over complex assembly code, decoding encrypted messages, or cracking sophisticated protections. But here's a secret: most real-world reverse engineering starts with something incredibly simple—just reading text.
Welcome to Level 1 of reverse engineering: Strings Analysis. This is the most accessible entry point into understanding how programs work, and it's more powerful than you might think.