Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You run the agent in a rootless container, all files are mounted via read-only filesystem mounts and you give the database user only select privileges.

You secure your LLM the same way you’d secure any other user on your system.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: