Blogs over at kevinkipp.com
gist.github.com/third774/3ec...
gist.github.com/third774/3ec...
Talk: Vibe Coding a Tamagotchi in Next.js
Speaker: Andrew Njoo
Location: Cloudflare in Austin, TX
RSVP here! www.meetup.com/austin-js/ev...
Talk: Vibe Coding a Tamagotchi in Next.js
Speaker: Andrew Njoo
Location: Cloudflare in Austin, TX
RSVP here! www.meetup.com/austin-js/ev...
docs.anthropic.com/en/docs/agen...
docs.anthropic.com/en/docs/agen...
So the new structure would be:
```
{
"liabilities": {
"react": "^19.0.0",
"typescript": "^5.0.0"
},
"devLiabilities": {...}
}
```
So the new structure would be:
```
{
"liabilities": {
"react": "^19.0.0",
"typescript": "^5.0.0"
},
"devLiabilities": {...}
}
```
Turns out every website is hit for paths that could contain sensitive information if accidentally uploaded. ENV variables, AWS credentials etc.
This is for techpays .com:
en.m.wikipedia.org/wiki/Bedtime...
en.m.wikipedia.org/wiki/Bedtime...
blog.cloudflare.com/media-transf...
blog.cloudflare.com/media-transf...