logoalt Hacker News

steelbrainyesterday at 8:56 PM0 repliesview on HN

Thank you for your comment!

The usecase for something like this is when you control both sides, server & client. There is some basic HMAC auth built into each request.

> I would recommend to sandbox if at all possible.

Since the server is a standard binary that doesn't need any special permissions, you could create the most locked down user in your server that only has access to a limit set of files and the GPUs and it'll work just fine. This is encouraged.