zlacker

[return to "Superhuman AI Exfiltrates Emails"]
1. 0xferr+TI[view] [source] 2026-01-12 22:39:36
>>takira+(OP)
The primary exfiltration vector for LLMs is making network requests via images with sensitive data as parameters.

As Claude Code increasingly uses browser tools, we may need to move away from .env files to something encrypted, kind of like rails credentials, but without the secret key in the .env

◧◩
2. SahAss+iQ[view] [source] 2026-01-12 23:39:02
>>0xferr+TI
So you are going to take the untrusted tool that kept leaking your secrets, keep the secrets away from it but still use it to code the thing that uses the secrets? Are you actually reviewing the code it produces? In 99% of cases that's a "no" or a soft "sometimes".
◧◩◪
3. TeMPOr+Ln4[view] [source] 2026-01-13 22:30:24
>>SahAss+iQ
That's exactly what one does with their employees when one deploys "credential vaults", so?
◧◩◪◨
4. SahAss+Eo4[view] [source] 2026-01-13 22:35:05
>>TeMPOr+Ln4
Employees are under contract and are screened for basic competence. LLMs aren't and can't be.
◧◩◪◨⬒
5. TeMPOr+So4[view] [source] 2026-01-13 22:36:43
>>SahAss+Eo4
> Employees are under contract and are screened for basic competence. LLMs aren't

So perhaps they should be.

> and can't be.

Ah but they must, because there's not much else you can do.

You can't secure LLMs like they were just regular, narrow-purpose software, because they aren't. They're by nature more like little people on a chip (this is an explicit design goal) - and need to be treated accordingly.

◧◩◪◨⬒⬓
6. SahAss+fq4[view] [source] 2026-01-13 22:43:10
>>TeMPOr+So4
> So perhaps they should be.

Unless both the legalities and technology radically change they will not be. And the companies building them will not take on the burden since the technology has proved to be so unpredictable (partially by design) and unsafe.

> designed to be more like little people on a chip - and need to be treated accordingly

Deeply unpredictable and unsafe people on a chip, so not the sort that I generally want to trust secrets with.

I don't think it's that complex, you can have secure systems or you can have current gen LLMs. You can't have both in the same place.

[go to top]