Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But isn’t that more which MCP:s you can configure it to use? Do we have any idea which secret sauce stuff they have? Surely it’s not just a raw model that they are executing?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: