A minimal multi-agent system with an orchestrator, a planner, a coder, and a designer working together providing orchestration between Claude, Codex and Gemini.
Install all agents listed below into VS Code Insiders...
| Title | Type | Description |
|---|
| from http import HTTPStatus | |
| from typing import Any, Dict, List, Optional, Union, cast | |
| import httpx | |
| from ...client import AuthenticatedClient, Client | |
| from ...types import Response, UNSET | |
| from ... import errors | |
| {% for relative in endpoint.relative_imports %} |
(updated May 2025)
The APs in this list are ordered from highest to lowest performance. However, unless you have a very high number of devices you likely do NOT need to buy the most expensive, highest performance AP. You can also check Ebay for deals, especially on older equipment.
All APs in this list support both wired backhaul and mesh modes. However, wired connections are strongly recommended for better performance and reliability.
Number of spatial streams are listed in order of 2.4GHz, 5GHz, 6GHz.
| "Initial Access","Execution","Persistence","Privilege Escalation","Defense Evasion","Credential Access","Discovery","Lateral Movement","Exfiltration","Impact" | |
| ConsoleLogin,StartInstance,CreateAccessKey,CreateGroup,StopLogging,GetSecretValue,ListUsers,AssumeRole,CreateSnapShot,PutBucketVersioning | |
| PasswordRecoveryRequested,StartInstances,CreateUser,CreateRole,DeleteTrail,GetPasswordData,ListRoles,SwitchRole,ModifySnapshotAttributes ,RunInstances | |
| ,Invoke,CreateNetworkAclEntry,UpdateAccessKey,UpdateTrail,RequestCertificate,ListIdentities,,ModifyImageAttribute,DeleteAccountPublicAccessBlock | |
| ,SendCommand,CreateRoute,PutGroupPolicy,PutEventSelectors,UpdateAssumeRolePolicy,ListAccessKeys,,SharedSnapshotCopyInitiated, | |
| ,,CreateLoginProfile,PutRolePolicy,DeleteFlowLogs,,ListServiceQuotas,,SharedSnapshotVolumeCreated, | |
| ,,AuthorizeSecurityGroupEgress,PutUserPolicy,DeleteDetector,,ListInstanceProfiles,,ModifyDBSnapshotAttribute, | |
| ,,AuthorizeSecurityGroupIngress,AddRoleToInstanceProfile,DeleteMembers,,ListBuckets,,PutBucketP |
This documents everything I needed to get my Proxmox instance to listen to my UPS Server and initiate a shutdown script that would shutdown my UDM Pro. This is needed as the UDM Pro does not have the ability to listen to a NUT server on it's own (what the hell ubiquiti).
I'm using a Synology NAS as a NUT server, but you can point your NUT client to any supported UPS. It's set to alert any clients subscribed to it when the UPS connected to it is in low battery. This all applies regardless of what machine you have a NUT server on, it does not have to be Synology.
Additionally these install steps were on my Proxmox machine, but these steps will probably work on any Debian GNU/Linux OS with little to no modification. YMMV
High level summary of the steps:
In order for the LXC container to have full access the proxmox host directory, a subgid is set as owner of a host directory, and an ACL is used to ensure permissions.
Add the following line to /etc/pve/lxc/<CT_ID>.conf
mp0:/mount/point/on/host,mp=/mount/point/on/lxc
OR
pct set 100 -mp0 /mnt/bindmounts/shared,mp=/shared
| #!/bin/bash | |
| sed 's/$/\/hostname/' | parallel --jobs=12 --pipe -N1000 \ | |
| "curl -s -XPOST -H 'Content-Type: text/plain' --data-binary @- 'ipinfo.io/batch?token=$TOKEN&filter=1'" | \ | |
| grep '"' | sed 's|/hostname||' | cut -d'"' -f2,4 | tr '"' '\t' |
| const cspConfig = { | |
| "default-src": [ | |
| "'self'", | |
| "blob:", | |
| ], | |
| "script-src": [ | |
| "'self'", | |
| "{{cspNonce}}", | |
| ], | |
| "style-src": [ |
| { | |
| "extends": ["stylelint-config-recommended"], | |
| "processors": ["stylelint-processor-ignore-front-matter"], | |
| "rules": { | |
| "at-rule-no-unknown": [true, { | |
| "ignoreAtRules": ["tailwind", "apply", "variants", "responsive", "screen"] | |
| } ], | |
| "declaration-block-trailing-semicolon": "always", | |
| "no-descending-specificity": [true, { "ignore": ["selectors-within-list"] } ], | |
| "no-invalid-double-slash-comments": true |
| function sslsub() { | |
| timeout 3 openssl s_client -showcerts -servername $1 -connect $1:443 <<< "Q" 2>/dev/null | openssl x509 -text -noout | grep DNS | tr ',' '\n' | cut -d ':' -f 2 | sort -fu | |
| } |