logoalt Hacker News

chrysopracetoday at 1:23 AM2 repliesview on HN

To be fair, read-only commands can still read sensitive files and keys, and exfiltrate them via prompt injection.


Replies

hamburglartoday at 1:34 AM

And “find” can easily execute arbitrary subcommands, which may not be readonly.

show 1 reply
raw_anon_1111today at 3:00 AM

Not if you don’t have keys on your computer.

In my case, all of my keys are in AWS Secrets Manager. The temporary AWS access keys that are in environment variables in the Claude terminal session are linked to a role without access to Secrets Manager. My other terminal session has temporary keys to a dev account that has Admin access

The AWS CLI and SDK automatically know to look in those environment variables for credentials.