logoalt Hacker News

ACCount37last Friday at 11:44 AM0 repliesview on HN

In the same way giving an LLM shell access requires a complete lack of concern.

You can give an LLM a shell into a container sandbox with basically nothing in it, or root shell on a live production server, or anything in between. Same goes for how much database access you want to give an LLM with your MCP shims.