logoalt Hacker News

tpxllast Friday at 6:37 PM0 repliesview on HN

Create a few insecure implementations, parse them into an AST, then turn them back into code (basically compile/decompile) except rename the variables and reorder stuff where you can without affecting the result.