First look # This one came with a very on-theme setup: a tiny CHALL.EXE DOS program and a floppy image containing the same executable. A quick strings pass already told me it was a flag checker:
Status # This page was originally just a template, and I do not have enough real solve artifacts in the repo to turn it into a proper writeup without inventing details.
Setup # The challenge came with a Python-based ><> (Fish) interpreter and a one-line Fish program that checked the input against one huge constant.