Skip to content

Instantly share code, notes, and snippets.

LLM Wiki

A pattern for building personal knowledge bases using LLMs.

This is an idea file, it is designed to be copy pasted to your own LLM Agent (e.g. OpenAI Codex, Claude Code, OpenCode / Pi, or etc.). Its goal is to communicate the high level idea, but your agent will build out the specifics in collaboration with you.

The core idea

Most people's experience with LLMs and documents looks like RAG: you upload a collection of files, the LLM retrieves relevant chunks at query time, and generates an answer. This works, but the LLM is rediscovering knowledge from scratch on every question. There's no accumulation. Ask a subtle question that requires synthesizing five documents, and the LLM has to find and piece together the relevant fragments every time. Nothing is built up. NotebookLM, ChatGPT file uploads, and most RAG systems work this way.

@tykurtz
tykurtz / grokking_to_leetcode.md
Last active May 11, 2026 10:13
Grokking the coding interview equivalent leetcode problems

GROKKING NOTES

I liked the way Grokking the coding interview organized problems into learnable patterns. However, the course is expensive and the majority of the time the problems are copy-pasted from leetcode. As the explanations on leetcode are usually just as good, the course really boils down to being a glorified curated list of leetcode problems.

So below I made a list of leetcode problems that are as close to grokking problems as possible.

Pattern: Sliding Window

@marfillaster
marfillaster / 00-tldr-ipv6-over-wireguard-vultr-mikrotik.md
Last active May 11, 2026 10:09
MikroTik RouterOS v7 — IPv6-over-WireGuard Relay via Vultr Reserved /64

TL;DR: IPv6-over-WireGuard relay — Vultr VPS + MikroTik

This paste assumes a Vultr Ubuntu cloud-compute instance with default Vultr-issued IPv6 and a home MikroTik RouterOS v7 in roughly the standard defconf state (LAN bridge, IPv6 firewall defconf rules). It gives the home LAN a globally routable IPv6 /64 over a WireGuard tunnel without NAT66 and without DHCPv6-PD.

If your VPS is on a different cloud, your home router is not MikroTik, or the LAN is not behind a single bridge, read the full guide and substitute. The validation report shows the actual end-to-end captures.

For the DNS-over-HTTPS + IPv6 RA RDNSS setup, use the companion DNS gist: https://gist.github.com/marfillaster/d34bd199b9e265ccd74af6d31fd9df85

Resulting layout after the paste:

@BunsDev
BunsDev / no-harness-tool-calls-real-weather-api.md
Created May 11, 2026 10:07 — forked from romgenie/no-harness-tool-calls-real-weather-api.md
Tool Calls Without a Harness: Real Weather API

Tool Calls Without a Harness: From Mock Data to a Real Weather API

This is a slow walkthrough of OpenAI tool calling using only raw API calls and PowerShell.

The point:

  • No agent framework is required.
  • No harness is required.
  • The model does not execute your code.
  • The model asks for a tool call.
@velvet-shark
velvet-shark / openclaw-50-day-prompts.md
Last active May 11, 2026 10:05
OpenClaw after 50 days: all prompts for 20 real workflows (companion to YouTube video)

OpenClaw after 50 days: all prompts

Companion prompts for the video: OpenClaw after 50 days: 20 real workflows (honest review)

These are the actual prompts I use for each use case shown in the video. Copy-paste them into your agent and adjust for your setup. Most will work as-is or the agent will ask you clarifying questions.

Each prompt describes the intent clearly enough that the agent can figure out the implementation details. You don't need to hand-hold it through every step.

My setup: OpenClaw running on a VPS, Discord as primary interface (separate channels per workflow), Obsidian for notes (markdown-first), Coolify for self-hosted services.

@justincjahn
justincjahn / 10-cisco-elasticsearch.conf
Last active May 11, 2026 10:03
Logstash: Processing Cisco Logs
#
# INPUT - Logstash listens on port 8514 for these logs.
#
input {
udp {
port => "8514"
type => "syslog-cisco"
}
@LinuxSBC
LinuxSBC / 1password-flatpak-browser-integration.sh
Last active May 11, 2026 10:01
1Password Integration with Flatpak Browsers
#!/bin/bash
set -oue pipefail
INFO='\033[0;36m' # Cyan for general information
SUCCESS='\033[0;32m' # Green for success messages
WARN='\033[0;33m' # Yellow for warnings
ERROR='\033[0;31m' # Red for errors
NC='\033[0m' # No Color
echo "This script will help you set up 1Password in a Flatpak browser."