logoalt Hacker News

lenwoodtoday at 6:21 PM2 repliesview on HN

Awesome to see a project deal with prompt injection. Using a WASM is clever. How does this ensure that tools adhere to capability-based permissions without breaking the sandbox?


Replies

frolvladtoday at 6:45 PM

Instead of expecting the tools to adhere, they are enforced. For example, to make an HTTP call with a secret key, the tool must use the proxy service that will enforce that the secret key is only used for the specific domain, if that is allowed, then the proxy service will make the call, thus the secret never leaks outside of the service.

However, this design is still under development as it creates quite a bit of challenges.

show 1 reply
jonny_ehtoday at 6:49 PM

> Using a WASM is clever

Every time a project is shared that uses WASM.