Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Well, be careful. You mmight think that a restricted shell is the answer, but restricted shells are still too difficult to constrain. But if you over-constrain the tools then the LLMs won't be that useful. Whatever middle ground you find may well have injection vulnerabilities if you're not careful.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: