Comment by xyzzy123
2 days ago
One tactic I've seen used in various situations is proxies outside the sandbox that augment requests with credentials / secrets etc.
Doesn't help in the case where the LLM is processing actually sensitive data, ofc.
2 days ago
One tactic I've seen used in various situations is proxies outside the sandbox that augment requests with credentials / secrets etc.
Doesn't help in the case where the LLM is processing actually sensitive data, ofc.
No comments yet
Contribute on Hacker News ↗