Remix.run Logo
richardw 4 hours ago

I found that when I have “infinite” tokens my behaviour changed. 3-5 tabs so I’m not waiting, free side quests, huge review skills over whole codebase, skills that wrap 10 other skills. It’s like going from expensive data to uncapped.

I think these token doubles are there to kick you into a abundance mindset (for want of a better term) so going back feels painful. Stop counting tokens, focus on your project and the cost of your own time.

rednafi 3 hours ago | parent | next [-]

I use the enterprise plan for work and often burn ~150$ worth of tokens per day. I have noticed exhibiting similar behaviors here.

When you say nearly unlimited token, do you mean the 100 or 200$ subscription?

richardw an hour ago | parent [-]

$200, over December it was doubled. I tried my best in between family time and friends to burn a hole in it. Never got near doing so.

crashabr 3 hours ago | parent | prev [-]

Is it possible to link/wrap several skills together? I haven't managed to get Claude to react to a reference to another skill within a skill.

richardw an hour ago | parent [-]

I have this as a skill Claude created to run the rest. It mentions each skill in turn, see below. It’s not deterministic but it definitely runs each skill and it’s raised a bunch of issues, which I then selectively deal with. Where I can, once an issue is identified, I make deterministic tests.

Text includes:

Invoke each review/audit skill in sequence. Each skill runs its own comprehensive checks and returns findings. Capture the findings from each and incorporate them into the final report.

IMPORTANT: Invoke each skill using the Skill tool. Each skill is independently runnable and will produce its own detailed output. Summarize findings per skill into the unified report format.

4. Architecture Health

Invoke: Skill(architecture-review)

Covers: module boundaries, cross-module communication, dependency direction, infrastructure layer rules, hexagonal architecture compliance.

5. Security Health

Invoke: Skill(security-review)

Covers: hardcoded secrets, SQL injection, authorization, HTTPS, CORS, input validation, authentication patterns.