Creating a Windows Application Using Visual Studio Code, Cline, OpenRouter, and Claude
作者利用Visual Studio Code、Cline、OpenRouter和Claude等工具创建了一个方形屏幕截图应用SquareSnap,并将其开源至GitHub。该应用专为社交平台和YouTube内容设计,尽管未经签名可能导致安全警告,但代码可供审查。
2025-3-25 20:26:0
Author: taosecurity.blogspot.com(查看原文)
阅读量:32
收藏
Creating a Windows Application Using Visual Studio Code, Cline, OpenRouter, and Claude
I just created a Windows 10/11 application that take square screen captures. I did zero coding myself but used Visual Studio Code, Cline, OpenRouter, and Claude.
I got the idea by watching a video on so-called Vibe programming by a YouTuber named Memory. I have zero Windows programming experience although I have recently been playing with simple video game development.

After creating the application I was able to use Cline to help me commit it to GitHub. You can find it at https://github.com/taosecurity/SquareSnap/. Note that if you download the .exe Windows will complain because it is unsigned. If you worry about back doors just look at the code yourself -- or have your own LLM read it!

This was just an experiment to see how these tools work. I decided to try creating a screen capture program that only takes captures in a square or 1:1 format because it's useful for social media, and especially YouTube posts.
I had not found anything prior to this. This is really amazing but I obviously cannot comment on code quality. I'm happy that it's working well enough to take the screen caps in this blog post.
Popular posts from this blog
Just what are "tactics"? Introduction MITRE ATT&CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else. The MITRE ATT&CK Design and Philosophy document from March 2020 says the following: At a high-level, ATT&CK is a behavioral model that consists of the following core components: • Tactics, denoting short-term, tactical adversary goals during an attack; • Techniques, describing the means by which adversaries achieve tactical goals; • Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques; and • Documented adversary usage of techniques, their procedures, and other metadata. My concern is with MITRE's definition of "tactics" as "short-term, tactical adversary goals during an attack," which is oddly recursive. The key word in the tacti...
This is a quick note to point blog readers to my Zeek in Action YouTube video series for the Zeek network security monitoring project . Each video addresses a topic that I think might be of interest to people trying to understand their network using Zeek and adjacent tools and approaches, like Suricata, Wireshark, and so on. I am especially pleased with Video 6 on monitoring wireless networks . It took me several weeks to research material for this video. I had to buy new hardware and experiment with a Linux distro that I had not used before -- Parrot . Please like and subscribe, and let me know if there is a topic you think might make a good video.
I've completed the TaoSecurity Blog book series . The new book is The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship . It's available now for Kindle , and I'm working on the print edition. I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up. I described the new title thus: Go beyond TaoSecurity Blog with this new volume from author Richard Bejtlich. In the first three volumes of the series, Mr. Bejtlich selected and republished the very best entries from 18 years of writing and over 18 million blog views, along with commentaries and additional material. In this title, Mr. Bejtlich collects material that has not been published elsewhere, including articles that are no longer available or are stored in assorted digital or physical archives. Volume 4 offers early white papers that Mr. Bejtlich wrote as a network defender, either for technica...
文章来源: https://taosecurity.blogspot.com/2025/03/creating-windows-application-using.html
如有侵权请联系:admin#unsafe.sh