zlacker

[parent] [thread] 1 comments
1. rukuu0+(OP)[view] [source] 2026-01-15 00:43:53
This is the answer, and this strategy can be used on lots of otherwise unsafe activities - put a tool between the LLM and the service you want to use, and bake the guardrails into the tool (or make them configurable)
replies(1): >>crypto+de4
2. crypto+de4[view] [source] 2026-01-16 03:14:08
>>rukuu0+(OP)
Well, be careful. You mmight think that a restricted shell is the answer, but restricted shells are still too difficult to constrain. But if you over-constrain the tools then the LLMs won't be that useful. Whatever middle ground you find may well have injection vulnerabilities if you're not careful.
[go to top]