logoalt Hacker News

rukuu001today at 12:43 AM0 repliesview on HN

This is the answer, and this strategy can be used on lots of otherwise unsafe activities - put a tool between the LLM and the service you want to use, and bake the guardrails into the tool (or make them configurable)