The 8f is being written into the file as literal characters. when running edit.exe over an SSH session.
IE:
ssh machine
.\edit.exe file.txt
What's happening: Edit.exe uses VT/ANSI terminal escape sequences to draw its interface. Byte 0x8F is the SS3 (Single Shift Three) C1 control code — part of VT100's function key prefix sequences. When Edit.exe initialises its terminal UI over an SSH PTY, the PTY terminal negotiation between OpenSSH on macOS and the Windows console host doesn't align properly. The SS3 initialisation byte leaks into the file buffer instead of being consumed purely as a terminal control sequence.
Edit version 1.2.1
Windows:
PS C:> [System.Environment]::OSVersion.Version
Major Minor Build Revision
10 0 20348 0
PS C:>
The 8f is being written into the file as literal characters. when running edit.exe over an SSH session.
IE:
ssh machine
.\edit.exe file.txt
What's happening: Edit.exe uses VT/ANSI terminal escape sequences to draw its interface. Byte 0x8F is the SS3 (Single Shift Three) C1 control code — part of VT100's function key prefix sequences. When Edit.exe initialises its terminal UI over an SSH PTY, the PTY terminal negotiation between OpenSSH on macOS and the Windows console host doesn't align properly. The SS3 initialisation byte leaks into the file buffer instead of being consumed purely as a terminal control sequence.
Edit version 1.2.1
Windows:
PS C:> [System.Environment]::OSVersion.Version
Major Minor Build Revision
10 0 20348 0
PS C:>