Skip to main content

Recent

Using sing-box Tun Mode to Implement a Transparent Proxy for V2rayU

Using sing-box Tun Mode to Implement a Transparent Proxy for V2rayU

This post documents the troubleshooting process for a gemini-cli OAuth login failure on macOS. Since V2rayU lacks a native Tun mode, it cannot proxy the gemini-cli’s random port callback. This article introduces a clever solution: using sing-box to enable Tun mode for transparent proxying, intercepting all system traffic, and forwarding it back to V2rayU’s SOCKS port, perfectly solving the proxy challenge for CLI tools.
A Brief Analysis of Claude Code's Execution and Prompts

A Brief Analysis of Claude Code's Execution and Prompts

Through reverse engineering, this article provides a deep dive into the internal architecture and working principles of Anthropic’s AI coding assistant, Claude Code. It breaks down the collaborative mechanisms of its Main and Sub-Agents, system prompts, toolset definitions, and context management strategies, helping you to fully understand the autonomous execution flow of this powerful AI tool.
From paper to source code: a detailed explanation of the RAG algorithm

From paper to source code: a detailed explanation of the RAG algorithm

·9744 words·46 mins
This article aims to explore the architectural design and specific code implementation of the RAG algorithm through the interpretation of papers and source code. This article mainly discusses GraphRAG, LightRAG and RAPTOR RAG, and also mentions Contextual Retrieval proposed by Anthropic and the evaluation method of the RAG algorithm. In the end, it is recommended that different methods be selected according to the size of the knowledge base document.
Rerank Models

Rerank Models

·2454 words·12 mins
With the popularity of the Transformer architecture, many Embedding and Rerank models are now based on this architecture. Taking this opportunity, we will sort out the process and history of the research, and take stock of the architectures adopted by several well-known Rerank models and the companies that developed them. Finally, we will return to the topic and briefly discuss whether Rerank should be used in RAG scenarios.
HTTP/2 and CONTINUATION Flood

HTTP/2 and CONTINUATION Flood

·2348 words·12 mins
This article mainly introduces the HTTP/2 protocol and its CONTINUATION Flood problem. The article shows how to parse the Frame structure in Http2-related code through the golang.org/x/net source code, and analyzes in detail the three security risks of the CONTINUATION Flood attack and the corresponding solutions.