Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is the answer, and this strategy can be used on lots of otherwise unsafe activities - put a tool between the LLM and the service you want to use, and bake the guardrails into the tool (or make them configurable)




Well, be careful. You mmight think that a restricted shell is the answer, but restricted shells are still too difficult to constrain. But if you over-constrain the tools then the LLMs won't be that useful. Whatever middle ground you find may well have injection vulnerabilities if you're not careful.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: