/z80 Unlocked: How Geoff Huntley’s AI-Mixer Turns LLMs into a SaaS-Cloning Engine

Geoff Huntley has publicly released a technique dubbed **/z80**, which fundamentally reimagines Large Language Models (LLMs) as "Bitcoin mixers" for i...

Deep Research AI

Author’s note:

Question: What is /z80? What’s Geoff proposing here?

Context: Context:


Executive Summary

Geoff Huntley has publicly released a technique dubbed /z80, which fundamentally reimagines Large Language Models (LLMs) as “Bitcoin mixers” for intellectual property. By feeding an LLM a stream of transformed code artifacts—such as converting C code to Assembly, then to specifications, and finally to a Z80 tape format—developers can strip away original copyright markers and regenerate functional source code in modern languages 1.

This is not theoretical. Huntley has demonstrated the capability by cloning the source code for Atlassian’s “Rovo” AI assistant using only its public command-line interface 2. Furthermore, a “Model Context Protocol” (MCP) server built using this technique achieved production-grade latency (sub-100ms) within five months 1.

Key Strategic Implications:

  • IP Vulnerability: The barrier to cloning “source-available” or even proprietary software with public interfaces has collapsed. Huntley asserts that “since /z80 is public… it’s possible to essentially clone any company” 3.
  • New Tooling Ecosystem: The release includes Loom, a Rust-based AI coding agent, and Ralph loops, an orchestration layer designed to autonomously repair and evolve the generated code 3 4.
  • Regulatory Gray Zones: This technique explicitly treats code generation like a “mixer,” raising immediate legal questions regarding copyright laundering and derivative works 1.

Defining /z80: The “Bitcoin Mixer” for Code

The term /z80 refers to a specific prompt engineering and data transformation pipeline that treats an LLM as an obfuscation and regeneration engine. Huntley describes the core concept as “Running the LLM like a Bitcoin mixer for intellectual property and cloning software” 1.

The Core Concept

In the cryptocurrency world, a mixer blends potentially identifiable funds with others to obscure their origin. Similarly, /z80 takes existing software binaries or code, transforms them through multiple intermediate representations (IRs) that LLMs understand well (like Assembly or Z80 tape data), and then asks the model to “re-imagine” or “port” that logic into a clean, modern codebase.

This process effectively “washes” the code of its original syntax, comments, and specific implementation details, leaving only the functional logic, which is then reconstructed by the AI.


Technical Workflow: From Binary to Rust

The /z80 pipeline is a multi-stage process that moves from low-level machine code to high-level abstraction and back to code.

The Transformation Pipeline

  1. Ingestion: Take a compiled binary or C code.
  2. Disassembly: Convert the binary to Assembly (ASM) or an intermediate object dump.
  3. Specification Generation: Ask the LLM to analyze the ASM and generate a high-level functional specification.
  4. Obfuscation/Translation: (Optional but core to the metaphor) Convert this spec into a format like a “Z/80 Speccy tape” representation—a format the LLM knows from its training data but which is completely divorced from the original source context 1.
  5. Regeneration: Prompt the LLM to write new code (e.g., in Rust) based solely on the generated specification or tape data.

Comparison: Traditional Reverse Engineering vs. /z80

FeatureTraditional Reverse Engineering/z80 Technique
Primary AgentHuman SpecialistLLM + Orchestration Agent (Loom)
SpeedWeeks/Months per moduleMinutes/Hours per loop
OutputPseudo-code or patched binariesClean, idiomatic source code (e.g., Rust)
ScalabilityLinear (constrained by human talent)Exponential (constrained by compute/tokens)
GoalUnderstand or patch softwareClone and re-implement software

Demonstrations & Proof-Points

The /z80 technique has moved beyond theory into verifiable proofs of concept.

1. Atlassian Rovo Clone

Huntley applied the /z80 technique to the Atlassian Command Line Interface (ACLI). By running the pipeline against the interface, he claimed to reveal the source code for Atlassian’s “Rovo” AI assistant, describing the result as “one of the most powerful meta’s I’ve shared in public” 2.

2. Porting ls to Rust

Community member Daniel Joyce used the technique to port the standard unix utility ls to Rust. The process involved taking the objdump of the original utility and feeding it through the pipeline to generate a working Rust implementation, now hosted on GitHub 1.

3. Production MCP Server

A “Model Context Protocol” (MCP) server was built using this method. Huntley reports that after five months of development, the server was “productionised” and a paper was published, proving the generated code could perform in a real-world environment 1.


The Ecosystem: Loom and Ralph Loops

To operationalize /z80, Huntley released Loom, an orchestration tool that automates the recursive prompting required to generate high-quality code.

Loom: The Orchestrator

Loom is an AI-powered coding agent built in Rust. It provides a Read-Eval-Print Loop (REPL) interface that allows agents to execute file system operations and code analysis 4.

  • Modularity: Separates core abstractions from LLM providers.
  • Extensibility: Allows new tools to be added via trait implementations.
  • Status: Explicitly marked as “experimental” and “unstable” 4.

Ralph Loops: The Repair Mechanism

The generated code is rarely perfect on the first pass. Ralph loops are recursive feedback loops where the agent:

  1. Generates code.
  2. Attempts to compile/run it.
  3. Analyzes errors.
  4. Self-corrects and redeploys.

Huntley notes that “everything will change wildly and at almost zero notice via ralph loops,” suggesting these agents have sudo access to deploy and modify their own environments 3.


The public release of /z80 creates significant friction for existing software business models.

The “Clone Any Company” Threat

Huntley explicitly states, “since /z80 is public and now it’s possible to essentially clone any company i don’t see any benefit to hide source code” 3. This suggests that “security through obscurity” or even “moats” based on proprietary code logic are now obsolete. If an LLM can observe the inputs and outputs (or the binary), it can reconstruct the source.

Regulatory Exposure

The description of the technique as a “Bitcoin mixer for intellectual property” 1 is a direct challenge to copyright law. It implies that the technique is designed to strip provenance from code, potentially allowing companies to bypass licensing restrictions (like GPL or proprietary licenses) by “washing” the code through an LLM.


Risks, Limitations & Failure Cases

While powerful, the technique is not magic and carries distinct risks.

  • Quality & Hallucination: The technique relies entirely on the LLM’s training data and context window. If the model misunderstands the intermediate ASM representation, the generated specification—and thus the final code—will be flawed.
  • “Repair Loop” Dependency: The system relies on “Ralph loops” to fix issues. Huntley admits that “any such issues can be solved with another highly targeted ralph loop,” implying that the initial output is often broken and requires iterative automated fixing 3.
  • Experimental Stability: The Loom tool itself warns that “APIs will change without notice” and “features may be incomplete or broken” 4.

Bottom Line

Geoff Huntley’s /z80 proposal is a wake-up call for the software industry. It demonstrates that the barrier to reverse-engineering and cloning software has been lowered by orders of magnitude through the creative application of LLMs.

Key Takeaways:

  1. Code is no longer a moat: Proprietary logic hidden in binaries or behind APIs can be reconstructed with high fidelity.
  2. Automated Evolution is here: Tools like Loom and Ralph loops move us toward “self-healing” and “self-writing” software pipelines.
  3. Legal battles are imminent: The explicit goal of “washing” IP will likely trigger aggressive legal responses from major software vendors.

Action Plan:

  • For Developers: Experiment with Loom in sandboxed environments to understand the capabilities of automated refactoring.
  • For CTOs: Assume your binaries can be reversed. Shift value propositions toward data, network effects, and brand—assets that cannot be cloned by an LLM.
  • For Legal Teams: Review the implications of “clean room” implementations generated by AI, as this technique blurs the line between reverse engineering and copyright infringement.

References

Footnotes

  1. since /z80 is public and now it’s possible to essentially … 2 3 4 5 6 7 8

  2. the z80 technique reveals the source code for Atlassian’s ‘rovo’ AI assistant 2

  3. Igal Tabachnik (@hmemcpy) / Posts / X 2 3 4 5

  4. Can a LLM convert C, to ASM to specs and then to a working Z/80 Speccy tape? Yes. 2 3 4