logoalt Hacker News

mh-yesterday at 7:52 PM2 repliesview on HN

Not the person you're replying to, but: I just use a separate, dedicated Chrome profile that isn't logged into anything except what I'm working on. Then I keep the persistence, but without commingling in a way that dramatically increases the risk.

edit: upon rereading, I now realize the (different) prompt injection risk you were calling out re: the handoff to yt-dlp. Separate profiles won't save you from that, though there are other approaches.


Replies

bartek_gdnyesterday at 10:47 PM

That's also my approach, built quickly a cli for this with lightweight session management

https://news.ycombinator.com/item?id=47207790

sofixayesterday at 8:56 PM

Even without the bash escape risk (which can be mitigated with the various ways of only allowing yt-dlp to be executed), YT Music is a paid service gated behind a Google account, with associated payment method. Even just stealing the auth cookie is pretty serious in terms of damage it could do.

show 1 reply