Comment by lifetimerubyist
5 days ago
You run the agent in a rootless container, all files are mounted via read-only filesystem mounts and you give the database user only select privileges.
You secure your LLM the same way you’d secure any other user on your system.
No comments yet
Contribute on Hacker News ↗