You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently we're checking in llama.cpp binaries directly into source control. We keep a version tag to indicate which version of llama.cpp we're copy-pasting in here, but that's a layer of trust.
Feels like a good level of cross-checking might be to validate the md5 or other hash sums with the official llama.cpp release binary checksums, to give another layer of verification that a rogue binary didn't actually get slipped into the mix.
We could even make part of the build process to be to take the version code from our version.txt and download / inflate the zip as part of the script.
Could possibly be a feature that would go hand-in-hand with #28 as well.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Currently we're checking in llama.cpp binaries directly into source control. We keep a version tag to indicate which version of llama.cpp we're copy-pasting in here, but that's a layer of trust.
Feels like a good level of cross-checking might be to validate the md5 or other hash sums with the official llama.cpp release binary checksums, to give another layer of verification that a rogue binary didn't actually get slipped into the mix.
We could even make part of the build process to be to take the version code from our version.txt and download / inflate the zip as part of the script.
Could possibly be a feature that would go hand-in-hand with #28 as well.
Beta Was this translation helpful? Give feedback.
All reactions