Closing the verification loop, Part 2: autonomous optimization | Dark Hacker News