Show HN: Axe – A 12MB binary that replaces your AI framework
Overall Concept and Positioning
- Axe is a small Go binary that treats LLM “agents” like Unix commands: each agent is defined in TOML, does one focused job, and is composed via the shell (pipes, files, scripts).
- It is not an LLM itself but a runtime that calls LLM APIs (including OpenAI-compatible ones, and others like Gemini planned).
- Compared to other tools:
- Different from in-code prompt templates (e.g., dotprompt) because it’s a CLI execution layer, not an app framework.
- Closer to shell-based “tiny agents” or
claude -pworkflows, but with a more structured agent/config and chaining model. - Seen as more automation-oriented than interactive tools like sgpt, Pi, Codex, or Claude’s full IDE integrations.
Use Cases and Pipelines
- Several multi-step flows described:
- YouTube transcript → blog-style post → Instapaper.
- Voice notes → related note lookup → blog draft → cleanup (e.g., remove em dashes).
- “Ghost blog” with each step saving artifacts to files between agents.
- People propose:
- Code refactoring, test generation, build harnesses, and PR prep as a “junior dev in the repo.”
- Git commit message generation.
- RPG character creation workflows and invoice-like processing.
State, Artifacts, and “Memory”
- Agents commonly pass data via files between steps; some users archive and summarize artifacts with git integration.
- Session support is requested but not yet implemented; current use skews toward explicit file-based state.
- Some enthusiasm for “persistent memory”; others criticize the term as vague and potentially overcomplicated, asking for clearer, minimal explanations.
Cost Control
- Single-purpose agents are seen as helpful for keeping prompts small and behavior predictable.
- Concerns raised about accidentally fanning out many agents and cost explosions; token or budget limits per agent are discussed but not yet fully designed.
Security and Safety
- Prompt injection and destructive actions (e.g., with calendars, email, GitLab) are core worries.
- Suggested mitigations:
- Running agents in containers (e.g., Docker) and path-sandboxed file skills.
- Network egress allowlists for outbound connections.
- Some skepticism about relying on
chrootor similar as true security boundaries; security primitives at this layer are still evolving.
Implementation Details and Trade-offs
- 12MB binary size triggers debate:
- Some see it as large compared to ultra-small Zig binaries.
- Others note Go’s runtime overhead and consider 12MB acceptable or minor.
- Config details:
- Uses TOML; a few would prefer JSON5.
- Default agent location under
~/.configfeels wrong to some; they want per-repo agents for better versioning.
- Mixed preferences on UX:
- Some prefer chat interfaces for iterative planning, then Axe-like tools for deterministic execution.
- Desire expressed for a chat-based helper that generates Axe configs and for a shared “Awesome Axe” agent catalog.
Conceptual Debates
- Debate over very fine-grained agents for coding:
- Critics argue human analogues would be inefficient.
- Supporters counter that narrow LLM responsibilities increase reliability and trust.
- Terminology disputes appear (e.g., “clankers” for AIs), with some finding it funny and others off-putting.